Viruses and Worms: The Problems and Their Solutions

History and Background

The virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. Bugs and glitches could cause damage unintentionally, but a virus created havoc intentionally, and therefore often caused much more damage then just glitches in software. Technically a virus must be in a host file and spread manually by people, versus a worm which spreads by an automated process and doesn't require a host file, but we will include worms as part of the term virus. Therefore, the threat of viruses quickly multiplied expotentially. One computer infected by a virus is manageable, but a virus spreading uncontrollably and automatically can cause damage to sometimes entire populations. And with the introduction of the Internet, billions of computers worldwide could be accessed with a click of a button. These abilities are what made the virus probably the greatest security to personal computers in the 21st Century.

What kind of damage will it inflict?

Since up to 100 new viruses are discovered every minute by anti-virus industries worldwide, the damage they inflict varies considerably. Some will display an annoying popup. Some will swap your mouse buttons. Some will uninstall Internet Explorer. Some will delete all your personal files. And some, though rare, will slow down your computer fan to the point that your computer processor starts smoking. All have 1 thing in common - they reduce your productivity in some way and they inhibit you from comfortably using your PC. Therefore you must take several precautions to insure you do not to become infected with viruses. With just a few simple security measures, the chances of getting infected with a virus can be cut down by over 90%.

Security Measures

The most important step - Be careful of everything you do on the Internet! It is extremely rare for a computer to get infected by a virus if you only download and browse trustworthy sites and emails. If an email has an attachment and looks suspicious it is very likey to be a virus. If a site is providing illegal or inappropiate content, it should be considered a risk. These are basic rules of safe browsing of the Internet and unfortunately, most people only learn these rules after a disaster. Don't learn from experience! Don't let it happen in the first place. Keep your system up-to-date. Nearly every major virus threat to operating systems are patched soon after discovery. Visit your operating system update website often, which is www.windowsupdate.com for Windows users. Get a reliable antivirus solution. The most common is Norton Antivirus, but I personally do not like its unreliability and incompatibility with many PCs. On the otherhand, it is probably the most user friendly antivirus solution on the market, and is probably best for PC beginners. If you're looking for a free yet extremely reliable and easy-to-use antivirus solution, Avast may be your answer. I am currently running Avast and am very happy with it. I previously tried Norton Antivirus, Norton Client Security, NOD32 Antivirus and McAfee Antivirus, but each had their own individual problems and so I had to constantly change antivirus software until I finally reached Avast.

Some people go overboard and install many other security measures but I don't recommend this. These measures only hog resources, confuse users and cause conflicts with other software. Some of this software includes firewalls, memory explorers and file protection. References

www.wikipedia.org

us.mafee.com

www.netmom.com

www.pcworld.com

Links

Avast Antivirus - www.avast.com

Soroush King is a certified programmer, adept in VB, C++, Delphi, as well as web developer and scripter, having considerable knowledge of both PHP and Perl. He also owns and manages several professional websites.

This article was originally published at http://www.articlesandtools.com/adware.php For more information on computer security visit http://www.articlesandtools.com.

If you would like to use this article anywhere else, please just notify me by sending an email to kingofkings@gmail.com (you don't have to wait for a response, as this is just a notification, not permission). Please refer on the page that the author of the article was I, Soroush King, and also please note that the article was originally published at http://www.articlesandtools.com/adware.php by providing a link.

In The News:


pen paper and inkwell


cat break through


What Can Be Done About Spyware And Adware

Having a good Spyware eliminator on your computer is vital... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

How To Avoid Hackers From Destroying Your Site?

Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to... Read More

3 Simple Steps to Stay Safe from Spyware

There are several basic concepts to keep in mind when... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

6 Ways To Prevent Identity Theft

These six ways to prevent identity theft offer you valuable... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

Make Money Online - Latest Scam Disclosed

Before we start, I want to make it clear that... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code ------------------------------------- I had... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More