Tip & How-To about Computers & Internet
Each year, the damages against malicious computer software costing American companies billions of dollars. These expenditures are not only in lost productivity and permanent loss of critical business data. Presumably, most if not all infections can be prevented through understanding, education and adequate protection. Do not be the next victim, taking the necessary steps now to ensure the protection and recovery, should the worst happen.
First, try to understand the computer of malware. Often, the term virus is used to describe all malicious code. Technically speaking, there are viruses, rootkits, trojans, worms and spyware. Method of attack can vary, but all types of malware.
A virus is a program that runs itself and copies itself. It can affect the files or the boot sector and erases all your data. The "Melissa" and "I love you" virus has gained the attention of the world.
A rootkit or a Trojan to access your system without your knowledge. often resembles a piece of useful software, but in reality they are back, or traps.
A computer worm is a computer program capable of replicating. It uses a network to send copies of itself to other nodes. When you are on your system, worms do not need to attach to another program can run. Worms cause a denial of service attack by making the network unusable. General network to target and attack the virus files.
Spyware is software that is installed on a personal computer to intercept or take control of your PC. Spyware can hijack a computer and cause serious problems in the collection and transmission of personal data, loading of unwanted software or redirect browsers to malicious sites.
Having a good backup in case you need to restore
Use a firewall
Keep your system updated with the latest security patches
Installing and updating anti-virus and anti-spyware software (see below for choice)
Do not open e-mail in an anonymous, unknown or suspicious sources
Do not download files or software, anonymous, unknown or suspicious sources
Do not have access to suspect sites or promiscuity
Scan your system for malicious software (see below for choice)
It is worth repeating - make sure you have a good backup to restore your entire system if necessary
If you believe you have been assaulted, act quickly to isolate the infected machine and remove the malware.
Posted by gfxcasa on
Jan 29, 2016 | Office Equipment & Supplies
198 people viewed this tip
Usually answered in minutes!