Viruses and Worms: The Problems and Their Solutions

History and Background

The virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. Bugs and glitches could cause damage unintentionally, but a virus created havoc intentionally, and therefore often caused much more damage then just glitches in software. Technically a virus must be in a host file and spread manually by people, versus a worm which spreads by an automated process and doesn't require a host file, but we will include worms as part of the term virus. Therefore, the threat of viruses quickly multiplied expotentially. One computer infected by a virus is manageable, but a virus spreading uncontrollably and automatically can cause damage to sometimes entire populations. And with the introduction of the Internet, billions of computers worldwide could be accessed with a click of a button. These abilities are what made the virus probably the greatest security to personal computers in the 21st Century.

What kind of damage will it inflict?

Since up to 100 new viruses are discovered every minute by anti-virus industries worldwide, the damage they inflict varies considerably. Some will display an annoying popup. Some will swap your mouse buttons. Some will uninstall Internet Explorer. Some will delete all your personal files. And some, though rare, will slow down your computer fan to the point that your computer processor starts smoking. All have 1 thing in common - they reduce your productivity in some way and they inhibit you from comfortably using your PC. Therefore you must take several precautions to insure you do not to become infected with viruses. With just a few simple security measures, the chances of getting infected with a virus can be cut down by over 90%.

Security Measures

The most important step - Be careful of everything you do on the Internet! It is extremely rare for a computer to get infected by a virus if you only download and browse trustworthy sites and emails. If an email has an attachment and looks suspicious it is very likey to be a virus. If a site is providing illegal or inappropiate content, it should be considered a risk. These are basic rules of safe browsing of the Internet and unfortunately, most people only learn these rules after a disaster. Don't learn from experience! Don't let it happen in the first place. Keep your system up-to-date. Nearly every major virus threat to operating systems are patched soon after discovery. Visit your operating system update website often, which is www.windowsupdate.com for Windows users. Get a reliable antivirus solution. The most common is Norton Antivirus, but I personally do not like its unreliability and incompatibility with many PCs. On the otherhand, it is probably the most user friendly antivirus solution on the market, and is probably best for PC beginners. If you're looking for a free yet extremely reliable and easy-to-use antivirus solution, Avast may be your answer. I am currently running Avast and am very happy with it. I previously tried Norton Antivirus, Norton Client Security, NOD32 Antivirus and McAfee Antivirus, but each had their own individual problems and so I had to constantly change antivirus software until I finally reached Avast.

Some people go overboard and install many other security measures but I don't recommend this. These measures only hog resources, confuse users and cause conflicts with other software. Some of this software includes firewalls, memory explorers and file protection. References

www.wikipedia.org

us.mafee.com

www.netmom.com

www.pcworld.com

Links

Avast Antivirus - www.avast.com

Soroush King is a certified programmer, adept in VB, C++, Delphi, as well as web developer and scripter, having considerable knowledge of both PHP and Perl. He also owns and manages several professional websites.

This article was originally published at http://www.articlesandtools.com/adware.php For more information on computer security visit http://www.articlesandtools.com.

If you would like to use this article anywhere else, please just notify me by sending an email to kingofkings@gmail.com (you don't have to wait for a response, as this is just a notification, not permission). Please refer on the page that the author of the article was I, Soroush King, and also please note that the article was originally published at http://www.articlesandtools.com/adware.php by providing a link.

In The News:


pen paper and inkwell


cat break through


Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

How To Avoid Hackers From Destroying Your Site?

Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through The year is 300A.D.,... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information Identity theft is... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More