The web is flooded with ideas for protecting Windows computers against viruses. to prevent, even with dozens of ideas virus, it is difficult to prevent new types of online attacks. Viruses remain the most common type of threat, but malicious hackers now use complex attacks such as worms in instant message, linked to a web page infected with a Trojan horse. It calls for safety measures on your part to ensure that the computer problems without the use on a regular basis.
1. An anti-virus is a must
For a first hand protection, an anti-virus software is a must for your Windows system. There is a long list of Internet security suites like Norton, Kaspersky, BitDefender, and McAfee, that offers a variety of tools, spyware and malware detection to real-time protection against infected Web sites with code. Some of these even protect your inbox from infected attachments and phishing mails. If can not afford a security suite, there are several individual free anti-virus software available for download.
However, free versions of these programs do not provide a real-time protection, but they can root for the regular anti-virus programs. They are especially good for the fight against malware and viruses.
Once you run the security software in place and update it regularly can.
For a first hand protection, an anti-virus software is a must for your Windows system. There is a long list of Internet security suites like Norton, Kaspersky, BitDefender, and McAfee, that offers a variety of tools, spyware and malware detection to real-time protection against infected Web sites with code. Some of these even protect your inbox from infected attachments and phishing mails. If can not afford a security suite, there are several individual free anti-virus software available for download.
However, free versions of these programs do not provide a real-time protection, but they can root for the regular anti-virus programs. They are especially good for the fight against malware and viruses.
Once you run the security software in place and update it regularly can.
2. Be careful when placing it in peer-to-peer networks
Peer-to-peer (P2P) networking has grown into a major concern by the viruses. Attacker to gain spyware, viruses, Trojan horses and worms in their free downloads. The host is able to browse one of the most important functions with P2P programs, and the other connected directly to your computer and browse through file shares. Avoid P2P file sharing programs like Limewire, Bearshare, Gnutella, Morpheus, etc.
P2P file sharing may inadvertently access to logins, user IDs and passwords, Quicken files and credit reports and personal information such as letters, chat logs, cookies, and e-mails etc.
Peer-to-peer (P2P) networking has grown into a major concern by the viruses. Attacker to gain spyware, viruses, Trojan horses and worms in their free downloads. The host is able to browse one of the most important functions with P2P programs, and the other connected directly to your computer and browse through file shares. Avoid P2P file sharing programs like Limewire, Bearshare, Gnutella, Morpheus, etc.
P2P file sharing may inadvertently access to logins, user IDs and passwords, Quicken files and credit reports and personal information such as letters, chat logs, cookies, and e-mails etc.
3. How to stop virus infection of pen drive
Most of you know that infected USB flash drive are important sources of virus infection. Even if an anti-virus, they may not have the latest virus to fight or it could be that your anti-virus program is not updated.
Step 1: Change the Files and Settings folder for hidden files
Step 2: Clear the Hide extensions for known file options for expanding the files show. This will reveal what kind of file we have to do.
Step 3: Now you uncheck Hide protected operating system files files.
Note: Most of the script hidden viruses are created and configured as system files.
Step 4: You should not open the pen drive by double clicking on the "Removable Disk" icon, as the script in a way that the double will be written the virus running. Even a right mouse button to open and could carry the virus.
Alternatively, the pen drive using the drop down menu from the address bar of your Explorer.
Step 5: Once the drive is opened delete the autorun.inf and delete the files that you suspect that viruses that you will not be added. It is easy to identify the malicious files, as they are mostly extensions such as. Com,. Bat exe,. And so on.
Step 6: Remove the USB flash drive and connect it
Most of you know that infected USB flash drive are important sources of virus infection. Even if an anti-virus, they may not have the latest virus to fight or it could be that your anti-virus program is not updated.
Step 1: Change the Files and Settings folder for hidden files
Step 2: Clear the Hide extensions for known file options for expanding the files show. This will reveal what kind of file we have to do.
Step 3: Now you uncheck Hide protected operating system files files.
Note: Most of the script hidden viruses are created and configured as system files.
Step 4: You should not open the pen drive by double clicking on the "Removable Disk" icon, as the script in a way that the double will be written the virus running. Even a right mouse button to open and could carry the virus.
Alternatively, the pen drive using the drop down menu from the address bar of your Explorer.
Step 5: Once the drive is opened delete the autorun.inf and delete the files that you suspect that viruses that you will not be added. It is easy to identify the malicious files, as they are mostly extensions such as. Com,. Bat exe,. And so on.
Step 6: Remove the USB flash drive and connect it
4. Avoid installing bootleg or pirated software
Most of the popular software packages have high prices and burn a hole in your pocket. This forces most of you, to the bootleg versions that are freely available on the Internet file sharing programs like Gnutella and Freenet. These bootlegs are a conduit for virus spread via the Internet.
Never install a program directly from the Internet. First, you download it to your hard disk, scan it with your anti-virus and install it. In addition, to download applications from unknown sites.
Most of the popular software packages have high prices and burn a hole in your pocket. This forces most of you, to the bootleg versions that are freely available on the Internet file sharing programs like Gnutella and Freenet. These bootlegs are a conduit for virus spread via the Internet.
Never install a program directly from the Internet. First, you download it to your hard disk, scan it with your anti-virus and install it. In addition, to download applications from unknown sites.
5. Install a Firewall
Configure your firewall to prevent any unwanted incoming or outgoing communications. This is essential to protect against hacker attacks. In addition, several malicious programs and dissemination via the Internet connection to run without your knowledge. By prohibiting such unauthorized outgoing requests you can stop the spread of these programs.
Configure your firewall to prevent any unwanted incoming or outgoing communications. This is essential to protect against hacker attacks. In addition, several malicious programs and dissemination via the Internet connection to run without your knowledge. By prohibiting such unauthorized outgoing requests you can stop the spread of these programs.
6. E-mail attachment, carefully open
Avoid opening email attachments you from an unknown address. If you are not sure you save the attachment to a hard disk and scan it with your anti-virus software. Open it only if you are sure it is clean. Try your e-mail in text format to read instead of HTML.
Avoid opening email attachments you from an unknown address. If you are not sure you save the attachment to a hard disk and scan it with your anti-virus software. Open it only if you are sure it is clean. Try your e-mail in text format to read instead of HTML.
7. Turn off the preview function in e-mail browser
In most email systems, you have the option to "preview" email attachments. For example, you can preview an image without opening double. There can be some computer-virus programs to go ahead and run the program.
To prevent this, go to the settings or options or settings and switch it off.
In most email systems, you have the option to "preview" email attachments. For example, you can preview an image without opening double. There can be some computer-virus programs to go ahead and run the program.
To prevent this, go to the settings or options or settings and switch it off.
8. Passwords safe
Do not enter your user ID or password, if you see the padlock symbol at the bottom of the screen (Internet Explorer) and check that web address begins with https: / /. Change passwords often, to save it from hacker attacks.
Do not enter your user ID or password, if you see the padlock symbol at the bottom of the screen (Internet Explorer) and check that web address begins with https: / /. Change passwords often, to save it from hacker attacks.
9. What to do after a virus attack
Did you notice anything suspicious to your computer as frequent pop-ups, the computer or the connection to slow significantly, repeated reboots, keyboard or mouse frozen, strange news and alerts. Stop what you do, disconnect it from the Internet or other network where you work and run a full system scan for malware scan immediately. Restart the computer and update your Internet Security Suite.
10. Use the secure browserDid you notice anything suspicious to your computer as frequent pop-ups, the computer or the connection to slow significantly, repeated reboots, keyboard or mouse frozen, strange news and alerts. Stop what you do, disconnect it from the Internet or other network where you work and run a full system scan for malware scan immediately. Restart the computer and update your Internet Security Suite.
Update your browser, always use the latest version. When using Internet Explorer, IE8 update, it offers a smart filter screen that allows users to surf sites that are as legitimate or Microsoft database identified malacious. To activate this option, you can go to the Security menu. It also notes the cross-site scripting and other Web sites that are high risk areas.
Very informative post. You have somoe good recommendations to keep your computer secure. Anti-spyware and anti-keylogger software is also extremely important to help keep your computer secure.
ReplyDelete