Tip & How-To about Computers & Internet

Tips To Protect your computer from Malware

Each year, the damages against malicious computer software costing American companies billions of dollars. These expenditures are not only in lost productivity and permanent loss of critical business data. Presumably, most if not all infections can be prevented through understanding, education and adequate protection. Do not be the next victim, taking the necessary steps now to ensure the protection and recovery, should the worst happen.

First, try to understand the computer of malware. Often, the term virus is used to describe all malicious code. Technically speaking, there are viruses, rootkits, trojans, worms and spyware. Method of attack can vary, but all types of malware.

A virus is a program that runs itself and copies itself. It can affect the files or the boot sector and erases all your data. The "Melissa" and "I love you" virus has gained the attention of the world.

A rootkit or a Trojan to access your system without your knowledge. often resembles a piece of useful software, but in reality they are back, or traps.
A computer worm is a computer program capable of replicating. It uses a network to send copies of itself to other nodes. When you are on your system, worms do not need to attach to another program can run. Worms cause a denial of service attack by making the network unusable. General network to target and attack the virus files.

Spyware is software that is installed on a personal computer to intercept or take control of your PC. Spyware can hijack a computer and cause serious problems in the collection and transmission of personal data, loading of unwanted software or redirect browsers to malicious sites.

Protect yourself:

Having a good backup in case you need to restore
Use a firewall
Keep your system updated with the latest security patches
Installing and updating anti-virus and anti-spyware software (see below for choice)
Do not open e-mail in an anonymous, unknown or suspicious sources
Do not download files or software, anonymous, unknown or suspicious sources
Do not have access to suspect sites or promiscuity
Scan your system for malicious software (see below for choice)
It is worth repeating - make sure you have a good backup to restore your entire system if necessary
If you believe you have been assaulted, act quickly to isolate the infected machine and remove the malware.

Posted by on

Computers & Internet Logo

Related Topics:

Related Questions:

2 Answers

How much money,since 1980, has been spent on the war on drugs

Tony, Not a realistic question, governments and other officials never let out all the cost of waging war on drugs.

Jan 29, 2016 | Office Equipment & Supplies

2 Answers

Infringement of piracy?

No, cause Microsoft doesn't sale your e-mail or any other personal information to outside companies.

Oct 05, 2009 | Microsoft Computers & Internet

Not finding what you are looking for?

198 people viewed this tip

Ask a Question

Usually answered in minutes!

Top Computers & Internet Experts

Doctor PC
Doctor PC

Level 3 Expert

7733 Answers


Level 3 Expert

102366 Answers

David Payne
David Payne

Level 3 Expert

14161 Answers

Are you a Computer and Internet Expert? Answer questions, earn points and help others

Answer questions