Tip & How-To about Computers & Internet

How to protect Computer from Virus & Spywares

Most people these days understand what a virus is and how harmful it can be, but they are still somewhat unsure how computer viruses spread. The truth is that there are dozens of different ways in which a virus can spread from computer to computer, but let’s take a look at the most frequent ways in which people run into viruses, spyware and Trojans on the Internet.

1. Email attachments: Golden rule is that if you don’t know what an attachment is, don’t open it. You don’t have to take such drastic steps to protect yourself, however; simply use common sense when opening attachments in your email.

2. Rogue Websites: It is depressing to know that you may become infected with spyware or a virus by doing nothing more than simply visiting a website, but it is true. Many adult websites, gambling websites and other less than trustworthy websites will attempt to automatically access your computer when you visit them. They often install adware bugs that will cause a flurry of pop ups to appear on your screen. To stop these rogue websites, adjust the settings on your antivirus software and firewall so that no outside connections can be made and no programs can be installed without your express permission.

3. Networks: If your work computer is part of a larger network, you may find yourself with an infection through no fault of your own. Someone else on the network downloaded a bug by accident, and within minutes, the entire network could be infected. There isn’t much you can do to stop these kinds of infections, short of having your network administrator ensure that everyone’s antivirus software is up to date so that the invading bug can be removed as quickly as possible.

4. Phishing Schemes: Learning how computer viruses spread is important to keep yourself, and your personal information, safe online. Phishing schemes are one of the chief ways in which people end up with their identity stolen and a computer fill of viruses. A phishing scheme starts when you receive an email from a website claiming to be your bank or credit card company. You are asked to click a link and log in, but the truth is that you’ve just given away all of your personal information. Often times, when you visit these sites, spyware, adware and viruses are automatically installed on your computer. smartest thing you can do is to simply call your bank or credit card company if you receive an email saying there is a problem with your account instead of blindly following links in your email.

5. Infected Software: One of the great things about the Internet is how many free games and programs there are out there, but these free programs often come at a price. Too many rogue websites intentionally infect their freeware (like Kazaa) with trojan viruses so that you unknowingly infect your computer every time you download a free game or piece of software. The key here is to only download freeware or shareware from a trusted source like CNet that always ensures your safety.

6. Hackers: The Internet today is a much more law abiding place than it was ten years ago. Not only did most people not have antivirus protection and firewalls that could stop incoming attacks, most people didn’t even know what they were. Today, people understand the value of good online protection, but hackers can still pose a problem if you allow your protection software to lapse. The best way to beat hackers is to ensure that you have a firewall and up to date antivirus software.

7. Instant Messaging: It is difficult to find a computer in this day and age that doesn’t have at least one instant messaging service installed on it. Unfortunately, these programs are often targets of hackers who see an easy way to trick people into clicking links that lead them to rogue websites. Common sense can keep you out of trouble, however. Only chat with people you know and never follow links to sites that you don’t recognize. You should easily be able to keep Internet worms, viruses and other bugs at bay.

8. Fake Anti Virus Software: This is one of the most frustrating ways to become infected with a virus or worm. There are dozens of antivirus and anti spyware programs you can download for free on the Internet and a surprising number of them actually do exactly the opposite of what they claim. The product websites make outrageous claims that their product can protect you from a whole range of threats, when, in reality, their product will only make things a thousand times worse. Only download antivirus programs from trusted sites or from websites that you know are completely legit.

9. From Mobile Devices & External USB Devices: Mobile phones get infected by Bluetooth transfer etc. When u connects the mobile to computer you can be affected by those viruses even if you connect infected external USB flash desk or hard desk. Keep one antivirus software for mobile. Keep your antivirus software up to date at all times and you should be able to wrestle control back from any Internet bug.

10. Friends and Relatives: The social networking site Facebook has had to battle this very problem when their serves get a bug and automatically send out emails to everyone on the system that are infected. Often times, these emails are extremely generic sounding and come with suspicious attachments, but people often open them anyway since they have come from a friend or from a site they trust, like Facebook. Remember, if you get an attachment with an .exe extension or a .dll, don’t ever open it.

Learning how computer viruses spread is the best way we can put an end to their reign of terror online. It is only with the right knowledge and the best antivirus software that Internet users everywhere can beat online bugs for good.

Posted by on

Computers & Internet Logo

Related Topics:

Related Questions:

1 Answer

kinds of computer virus


from your question, what are the kinds of computer viruses, here is the detailed explanation:

Computermag-glass_10x10.gif viruses are generally defined as a program inputted into a computer that allows replication of the program installed. As it replicates, the program intentionally infects the computer, typically without even the user knowing about the damage being done. A virus, unlike worms or Trojan horses, needs an aid to transfer them to computers. Viruses usually take a large amount of computer memory, resulting into system crashes. Viruses are categorized to several parts based on its features.
Macro Viruses A macro virus, often scripted into common application programs such as Word or Excel, is spread by infecting documents. Macro viruses are known to be platform-independent since the virus itself are written in language of the application and not the messagebox_info.png operating system. When the application is running, this allows the macro virus to spread amongst the operating systemsmag-glass_10x10.gif. There are thousands of macro viruses that exists, and each are considered major threats. Examples of these viruses are: Melissa.A and Bablas. pc.
Network Viruses Network viruses rapidly spreads through a Local Network Area ( messagebox_info.png LAN), and sometimes throughout the internet. Generally, network viruses multiply through shared resources, i.e., shared drives and folders. When the virus infects a computer, it searches through the network to attack its new potential prey. When the virus finishes infecting that computer, it moves on to the next and the cycle repeats itself. The most dangerous network viruses are Nimda and SQLSlammer.
Logic Bombs The messagebox_info.png logic bomb virus is a piece of code that are inputted into a software system. When a certain and specific condition is met, such as clicking on an internet browser or opening a particular file, the logic bomb virus is set off. Many programmers set the malicious virus off during days such as April Fools Day or Friday the 13th. When the virus is activated, then various activities will take place. For example, files are permanently deleted.
Companion Viruses Companion viruses takes advantage of MS- messagebox_info.png DOS. This virus creates a new file with typically the messagebox_info.png .COM extensions, but sometimes the .EXD extension as well. When a user manually types in a program they desire without adding .EXE or any other specific extention, DOS will make the assumption that the user want the file with the extension that comes first in alphabetical order, and thus running the virus. The companion virus is rare among Windows XP computers as this particular operating system does not use the MS-DOS.
Boot Sector Viruses messagebox_info.png Boot sector viruses generally hide in the boot sector, either in the bootable disk or the messagebox_info.png hard drive. Unlike most viruses, this virus does not harm the files in the hard disk, but harm the hard disk itself. Boot sector viruses are uncommon at this day and age because these viruses are spread rapidly by floppy disks and not on CD-ROMs.
Multipartite Viruses Multipartite viruses are spreaded through infected media and usually hides in the memory. Gradually, the virus moves to the boot sector of the hard drive and infects executable files on the hard drive and later across the computer system

Oct 04, 2010 | Computers & Internet

2 Answers

how can i get on facebook at school its blocked


It is blocked for several reasons.

1. facebook ads have viruses and once you get a Virus on the computer you are using, it spreads to the entire network.

2. Privacy issues are a big concern on facebook and the schools want no liability for it.

That's just a few. If you were able to get around the block, the IT department would find out and you would get suspended because you signed the Internet usage agreement on the first day of school.

Sep 16, 2010 | Computers & Internet

3 Answers

what is virus and their description


A computer virus is a computer program that infects files, make changes in OS , file system , & edits registry to spread itself for furthur infection. They do it by putting their own code into the exe file & executes as a normal program & creates problems like deleting/hiding data,download programs from particular websites automatically,denial of service,formatting disk & much more.
Commonly we use the term virus for all types of malware,spyware.
A true virus can only spread from one computer to another (in some form of executable code)when its host is taken to the target computer; for instance because auser sent it over a network or the Internet, or carried it on aremovable medium such as a floppy,cd & USB drives(most chances).

Oct 15, 2009 | Mcafee VirusScan 2006 Version 10.0 ...

1 Answer

zlob and virtumonde


The Virtumonde or Vundo Trojan is a Trojan Horse Virus that is one of the most popular and deadly viruses infecting computers these days. It is a widely-spread trojan that shows a large amount of unsolicited pop-up advertisements and also silently downloads harmful files from the internet.

The virus is responsible for decreasing the amount of virtual memory available on your computer and it can considerably slow down the performance of your PC. That is not to mention all the other dangerous forms of activity it can spread across your Computer, such as installing more viruses adware, malware, spyware, and also Stealing private information such as passwords and credit card numbers.

Now If you are looking for a way to completely remove the Virtumonde virus from your computer then you've come to the right place. This page is dedicated to help you remove the virtumonde virus. It will run you through exactly what a Vundo Trojan is, where it comes from, how it effects your computer and how to completely remove it from your computer for good

Jul 15, 2009 | Computers & Internet

1 Answer

computer viruses


Viruses are programs that get into your computer environment without your knowledge and then use your computer to connect to other computers and install a copy of themselves in those computers adn thereby spread. Virus programs are usually not content to just spread. After replicating, a virus program may do a silly prank, harm to your computer by corrupting files or even destroy its ability to serve you. Virus programs may also give a hacker a back door into you computer and thereby allow the hacker to use your computer to clog other sites or to steal your identity. If you think you have one disconnect from the web immmediately and remove it with anti virus pattern recognition tools. Avoid the free ones. Use a major product that large companies depend on. An anti virus program can be a virus itself.

Jan 18, 2009 | Computers & Internet

Not finding what you are looking for?

557 people viewed this tip

Ask a Question

Usually answered in minutes!

Top Computers & Internet Experts

Doctor PC
Doctor PC

Level 3 Expert

7733 Answers

kakima

Level 3 Expert

102366 Answers

David Payne
David Payne

Level 3 Expert

14161 Answers

Are you a Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Loading...