The computer is a device that make part of our daily life, we us it every day for several tasks, work, game, entertainment etc. More than any other device computer need a good and continues maintenance, to keep it running well and fast, doing all the tasks we need. Actually there are several menaces that can harm our computer. The most of them are coming from the internet, when we connect to the internet we are a target of virus, adware and malwares that can harm our computes, the majority of people that have basic skills in computing thinks that installing an antivirus resole all problems, this is false, even with the best antivirus out there we still in risk.
The proper functioning of any computer depends on the software installed, the memory used and the user itself.
Before talking about the problem of the internet and the virus, we need to know that even without internet we can have problem with our computer. In order to keep your computer healthy and fast you need to do some basics step periodically, if you have programs that you never use uninstall theme.
When you use your computer don´t open a lot of windows, people like let a lot of windows open even they don´t make use of theme, all open windows consume memory so if your computer have a enough memory this can slow down your machine. It is a good practice to defragment your disc to make the file system reorganized for simplifying file access and make it fast when you shut down your computer shut it down with the proper shutdown program and not with unplugging the energy cable, because this can damage your system file and generate a no starting of the system.
Before connecting to the internet it is important to install antivirus to protect your system and your data.
Configure your antivirus to scan your computer periodically; instead you can do it manually on running the antivirus scan. Some sites on the internet are harmful and install a malware script in your computer, it is better to no open this kind of sites (pornographic sites are an example).
Browsers like Google Chrome and Internet Explorer advise you about bad sites.
Internet is not the only place you can get a virus, if you are in a network or you use unknown pen drive or external disk you risk to get your computer infected, so before e connecting any external device to your computer it is recommended to scan it with your antivirus first.
If you are a beginner or do not give winds to your curiosity, don´t try to configure, delete, or change system file (for example register editing) Don´t forget to search for upgrades to keep you system with the last fixes, it is better to set automatic upgrade.
Before Installing any hardware (like camera, mouse or other devices) read the manual and be sure that the device you are installing is compatible with your computer. The use of the computer is personnel; this is why the PC means Personnel computer, so if you let other people use your computer the risk to your computer is damaged is higher.
Periodically it is a good practice to delete temporary and unused files.
If your computer run several services that you never use in the startup, it is better to deactivate those services or programs, this make your computer startup faster. On installing new software read carefully the instruction during the installation, because some software comes with third party plugin like browser toolbars that are checked by default and that will be installed with the software even you will never use them.
It is not recommended to install toolbars in the browser if you do not use theme for any purpose. When you navigate on the web do not install downloaded programs if you done know the publisher.
Following these steps you will keep your computer healthy for a long time without any problem, and if you have trouble with your computer download this tool and let it fix your computer for you automatically.
Similar to the way that people catch a virus your computer can also be very vulnerable to viruses. These days there are people out there whose sole intent is to spread them and it is rather easy to get a virus on your computer. Luckily Microsoft is getting tougher on this junk and I hear rumors that Windows 8 will help protect you much better from this junk getting in as easily.
If you are not sure what a virus is or how to protect yourself please read our article below.
A virus is a malicious piece of code written and designed to enter your PC without your permission and unnoticed. It will then replicate itself and/or possibly cause serious damage to your files and your PC. A virus can come in many forms but they usually come attached to a file, e.g. hidden in Word macros or embedded in executable files or attached to an e-mail, or in the boot sector of a disk.
Once the infected file or disk is introduced to your system, the virus can spread by attaching itself to files on your drives, or by sending infected e-mails to people in your address book. The Internet is a great environment for a virus to spread as downloading and e-mailing and exchanging files and information is common practice. If programmed to do so, the virus will not only spread but also cause damage to your system, such as, but not limited to, deleting files, deleting hard drive boot records resulting in an unbootable system, or erasing CMOS information.
This is a serious threat and should not be taken lightly. Almost every week, a new virus strikes and brings productivity to a grinding halt. The consequences are serious. For a home user, it often results in lost data and a lot of mad friends who received the virus from you. For businesses, a virus can bring down the entire network, often resulting in hours and days without e-mail or online access, corrupted or lost data, productivity loss, etc. Viruses have caused much damage and cost businesses and government agencies billions of dollars in time and money in an effort to recover from a virus attack. Don’t think that you are immune to a virus. Nobody is.
What can we all do to prevent this from happening?
The solution to the problem is two-fold. To prevent virii from spreading, companies install virus scanner software on their mail servers, and home users install virus scanners on their home PCs. Most virus scanning software can be bought in stores for a price, but why pay if there are free alternatives? See the “Security” category of our download section at downloads/security.html for links to several free antivirus solution. Another alternative is to scan your PC online by visiting Trend Micro’s web site, but this option does not offer permanent resident virus protection.
Of course any virus scanner can only work if you have the latest virus definition files installed. These virus definition files, also called DAT files, are being updated on a weekly or even more frequent basis by the maker of each virus scanner software. But it is up to you to download them regularly and update your PC. Most virus scanners either have a feature that let you schedule automatic downloads of new DAT files so that you don’t have to worry about it, or at least offer an easy press-one-button way of doing so. Remember, if your virus scanner does not have the latest DAT files and doesn’t know about the virus, it can’t catch it.
However, the makers of virus scanners are always a step behind since they can’t update their DAT files until they have seen the virus and know how to deal with it. Therefore there is usually a time gap from several hours to several days between the appearance of the virus in the wild and when the cure in the form of new DAT files is available. Since no virus scanner can protect you in that time period, it is up to you to prevent the virus from getting to you.
You are responsible!
The other part of virus protection is prevention. And no system administrator or virus scanner can do that for you. You are the one and only person responsible for exercising caution to prevent this from happening. Here are the top rules of virus prevention. We suggest you print them out, staple them to your forehead, memorize them – anything it takes:
DON’T OPEN ATTACHMENTS FROM UNKNOWN SOURCES! We can’t emphasize this enough.
If you get an e-mail with an attachment from a person you don’t know – DO NOT OPEN IT – DELETE IT!
If you get an e-mail with an attachment from a person you know but you didn’t ask for it and didn’t expect it – DO NOT OPEN IT – DELETE IT!
If it really was legit, the person will follow up with you or send it again and no harm is done. If it was malicious and you deleted it – you’re safe. Virii can only spread if they are activated. As long as the e-mail is not opened and the attachment is not activated, you’re safe.
Virus programmers disguise their malicious software to make it look harmless. Therefore do not assume that an e-mail that is marked “Happy Mother’s Day” or “Funny Joke” or “Great Opportunity” or “Free ” is safe. You need to keep your guard up. If it does not look familiar, if it sounds suspicious – DO NOT OPEN IT – DELETE IT!
A virus can come from anybody – your coworker, your mom, your best friend, anybody! Therefore do not assume that any e-mail you receive from anybody you know is safe. Virii spread by replicating themselves unbeknownst to a user by sending themselves to e-mail addresses found in the user’s address book. This means that virii are most likely to get into your inbox from somebody you know! If somebody you know sends you an attachment that you didn’t ask for and didn’t expect – DO NOT OPEN IT – DELETE IT!
Do not open any attachment that has the extension .vbs or .shs! Virii don’t have to be files ending in .exe to be executed. VBS means Visual Basic Script is another programming language, one of many, that virii are written in. Virii can actually be hidden in many types of files. Often infected files are disguised to look like a text file or a video clip to trick you into thinking they are safe and opening them. Be suspicious of every single attachment you get. If you’re not sure – DO NOT OPEN IT – DELETE IT!
Please use common sense
It is crucial to be suspicious and exercise caution. The number one rule is: Delete any e-mail with attachments that you cannot say with 110% certainty that they are safe. Nobody is safe from virii, but you can help fighting them by using common sense. Remember, a deleted legit e-mail takes only a few seconds to resend. But an opened malicious e-mail can cause hours of downtime, lost productivity, unrecoverable data, and cost a company tens of thousands of dollars as a result. Be responsible, use common sense, and think before you click. The virus threat is real.
The paragraph below has been copied straight from the Spyware Doctor website. The paragraph will be used as a principle to review the truths of the program.
“Spyware Doctor is a top-rated malware & spyware removal utility that detects, removes and protects your PC from thousands of potential spyware, adware, trojans, keyloggers, spybots and tracking threats. Protect your privacy and computing habits from prying eyes and virtual trespassers with the help of Spyware Doctor.”
One thing you immediately notice upon installing the Spyware Doctor is the ease of updating the program. After you install and open the program you are prompted to run the Smart Update feature. This insures that you have the latest version of Spyware Doctor at all times. After the updating is complete you are free to open and use the program.
Before you begin using Spyware Doctor you may be interested in reviewing the Spyware Doctor Quick Start Guide. This is an overview of the most common tools used in Spyware Doctor. The guide shows the buttons of the interface and what each does or represents. The guide also lets you know about the navigation of Spyware Doctor and how to use the Smart Update feature. If you need further assistance on Spyware Doctor you can use their Help option for more detailed information.
The main screen, or the interface, of Spyware Doctor is easy to understand and use. The simplicity is refreshing but also can leave you wanting more. I do enjoy all of the numbers and facts listed under System Status on the interface. For example, when the subscription expires or when your last scan was done. I like that it is very obvious as to whether your protection is on or off, too.
A really great thing about this program is that you are still able to run and operate other programs and such of your computer WHILE running the scan of Spyware Doctor. All too often your computer slows down drastically when a search or scan of this nature is being done. With some, you might as well start the scan and leave the computer until it finishes, but not with this particular program.
Don’t let the straightforward name fool you, Spyware Doctor does much more than watch out for simple spyware. This program uses IntelliGuard to immunize your computer against malicious ActiveX objects. Spyware Doctor will also rid tracking cookies, Trojans, dialers and keyloggers from your PC while IntelliGuard is in the active stage.
I have noted many great features of Spyware Doctor and overall I think it’s a great program to use. This program is not only something I now, personally use, but something I also recommend to any and all PC users. The value of your dollar goes so far when using Spyware Doctor to prevent horrible things from happening to your computer that it would be crazy not to be safe and get this program.
Spammers and hackers today are very sophisticated when it comes to covering their tracks. Instead of sending spam or using their own computers to attack an orginization or individual they now employee Botnets.
A Botnet is a collection of computers (that have been hacked and taken over) which a remote user can use to execute operations such as spam, DOS attacks and other types of mailicious activities.
To quote another article I recently read: “Joe St. Sauver, manager of security programs at the Internet2 networking consortium and the University of Oregon, said there are 5 million to 5.5 million botnets in active rotation at any time.”
Article: Botnets Running Rampant Neal Weinberg, Network World care of PC World
The best way to help prevent this from occuring for an end user is to keep your operating system up to date; Always have an updated virus software running (with a scheduled scan enabled weekly); Employee a good firewall.
I understand many of the computers that are part of Botnets are generally not an end user machines, but rather machines hosted in a public environment such as libraries, campuses and other public domains. Is there no IT staff available to monitor these networks?
Generally speaking the case is that the IT department is so understaffed, overworked, and under budgeted they simply don’t have the time or the money to implement the proper equipment which can detect and prevent this from occuring. That is if they have an IT department at all.
Look…We all know how to prevent most of this from occuring. I am by no means saying it will ever stop, because anything that can be secured can be hacked (it’s all a matter of time), but lets atleast try to secure our own computers.
If you would like more information on how you can secure your computer please follow this link to a previous article over best security practices I previously wrote. I hope it helps.
Last seen in 2006 another virus known as “Ransomeware” is trying to extort US $300 from users. The virus apparently encrypts your personal files.
After your files have been encrypted the virus then copies a file named read_me.txt to the PC. This text file simply contains a ransom note which demands the user buy their software for $300 in order to decrypt the files.
The virus states that it uses a RSA-4096 algorithm with a 4,096-bit key. This is surely just a ply to extort money, but apparently the files do have some sort of encryption.
As well the virus seems to only have a limited shelf life from July 10 to July 15, but knowing the past actions of the hackers that create of these viruses it is likely we will see another variant.
Apparently Kaspersky is working on a decryption scheme to save these files. If you are ever infected by such a variant remember it is vary unlikely that paying the ransom will get the hackers to release your files.
Always keep your virus software up to date and run a frequent full system scan. Backing up your data to a secondary location can save your files as well.