PC 911
Share This Article

Tag Archives for " Malicious Software "

Protect your computer from viruses

Similar to the way that people catch a virus your computer can also be very vulnerable to viruses. These days there are people out there whose sole intent is to spread them and it is rather easy to get a virus on your computer.  Luckily Microsoft is getting tougher on this junk and I hear rumors that Windows 8 will help protect you much better from this junk getting in as easily.

If you are not sure what a virus is or how to protect yourself please read our article below.

A virus is a malicious piece of code written and designed to enter your PC without your permission and unnoticed. It will then replicate itself and/or possibly cause serious damage to your files and your PC. A virus can come in many forms but they usually come attached to a file, e.g. hidden in Word macros or embedded in executable files or attached to an e-mail, or in the boot sector of a disk.

Once the infected file or disk is introduced to your system, the virus can spread by attaching itself to files on your drives, or by sending infected e-mails to people in your address book. The Internet is a great environment for a virus to spread as downloading and e-mailing and exchanging files and information is common practice. If programmed to do so, the virus will not only spread but also cause damage to your system, such as, but not limited to, deleting files, deleting hard drive boot records resulting in an unbootable system, or erasing CMOS information.

This is a serious threat and should not be taken lightly. Almost every week, a new virus strikes and brings productivity to a grinding halt. The consequences are serious. For a home user, it often results in lost data and a lot of mad friends who received the virus from you. For businesses, a virus can bring down the entire network, often resulting in hours and days without e-mail or online access, corrupted or lost data, productivity loss, etc. Viruses have caused much damage and cost businesses and government agencies billions of dollars in time and money in an effort to recover from a virus attack. Don’t think that you are immune to a virus. Nobody is.

What can we all do to prevent this from happening?

The solution to the problem is two-fold. To prevent virii from spreading, companies install virus scanner software on their mail servers, and home users install virus scanners on their home PCs. Most virus scanning software can be bought in stores for a price, but why pay if there are free alternatives? See the “Security” category of our download section at downloads/security.html for links to several free antivirus solution. Another alternative is to scan your PC online by visiting Trend Micro’s web site, but this option does not offer permanent resident virus protection.

Of course any virus scanner can only work if you have the latest virus definition files installed. These virus definition files, also called DAT files, are being updated on a weekly or even more frequent basis by the maker of each virus scanner software. But it is up to you to download them regularly and update your PC. Most virus scanners either have a feature that let you schedule automatic downloads of new DAT files so that you don’t have to worry about it, or at least offer an easy press-one-button way of doing so. Remember, if your virus scanner does not have the latest DAT files and doesn’t know about the virus, it can’t catch it.

However, the makers of virus scanners are always a step behind since they can’t update their DAT files until they have seen the virus and know how to deal with it. Therefore there is usually a time gap from several hours to several days between the appearance of the virus in the wild and when the cure in the form of new DAT files is available. Since no virus scanner can protect you in that time period, it is up to you to prevent the virus from getting to you.

You are responsible!

The other part of virus protection is prevention. And no system administrator or virus scanner can do that for you. You are the one and only person responsible for exercising caution to prevent this from happening. Here are the top rules of virus prevention. We suggest you print them out, staple them to your forehead, memorize them – anything it takes:

DON’T OPEN ATTACHMENTS FROM UNKNOWN SOURCES! We can’t emphasize this enough.
If you get an e-mail with an attachment from a person you don’t know – DO NOT OPEN IT – DELETE IT!
If you get an e-mail with an attachment from a person you know but you didn’t ask for it and didn’t expect it – DO NOT OPEN IT – DELETE IT!
If it really was legit, the person will follow up with you or send it again and no harm is done. If it was malicious and you deleted it – you’re safe. Virii can only spread if they are activated. As long as the e-mail is not opened and the attachment is not activated, you’re safe.

Virus programmers disguise their malicious software to make it look harmless. Therefore do not assume that an e-mail that is marked “Happy Mother’s Day” or “Funny Joke” or “Great Opportunity” or “Free ” is safe. You need to keep your guard up. If it does not look familiar, if it sounds suspicious – DO NOT OPEN IT – DELETE IT!

A virus can come from anybody – your coworker, your mom, your best friend, anybody! Therefore do not assume that any e-mail you receive from anybody you know is safe. Virii spread by replicating themselves unbeknownst to a user by sending themselves to e-mail addresses found in the user’s address book. This means that virii are most likely to get into your inbox from somebody you know! If somebody you know sends you an attachment that you didn’t ask for and didn’t expect – DO NOT OPEN IT – DELETE IT!

Do not open any attachment that has the extension .vbs or .shs! Virii don’t have to be files ending in .exe to be executed. VBS means Visual Basic Script is another programming language, one of many, that virii are written in. Virii can actually be hidden in many types of files. Often infected files are disguised to look like a text file or a video clip to trick you into thinking they are safe and opening them. Be suspicious of every single attachment you get. If you’re not sure – DO NOT OPEN IT – DELETE IT!

Please use common sense

It is crucial to be suspicious and exercise caution. The number one rule is: Delete any e-mail with attachments that you cannot say with 110% certainty that they are safe. Nobody is safe from virii, but you can help fighting them by using common sense. Remember, a deleted legit e-mail takes only a few seconds to resend. But an opened malicious e-mail can cause hours of downtime, lost productivity, unrecoverable data, and cost a company tens of thousands of dollars as a result. Be responsible, use common sense, and think before you click. The virus threat is real.

CyberDefender Review

Due to all the complaints we have received and forwarded to Cyberdefender without a response we have decided to recommend everyone try our suggestions above instead.

The article below will stay on the site for reference.

“CyberDefender Early Alert Center analyzes threats and calculates the risk levels of suspicious files and processes that may contain harmful spyware and viruses or may be phishing sites. This expert system tests and ranks threats on a Universal Severity Scale™, and updates the CyberDefender threat database automatically.”

The above sentence was taken directly from the CyberDefender website. I wanted to use this sentence as a guideline for testing and reporting any faults or positives in the Cyberdefender program.

Interface

First I would like to state that it’s nice a company that produces protection software finally figured out it’s easier to browse and figure out a program when you have access to everything on a single layout interface.

The main interface gives easy access to monitor the status of each protection type. From spyware to scam or phishing protection addressing settings and options is fantastically easy.

Each subcategory is easily viewable and accessed.

Performance

The best thing I can document is the ease of use. Not just the overall ease of use, but how many of you have tried to scan your computer with your current protection software while still retaining the use of the pc? “Sluggish at best” comes to mind right?

Out of the box the greatest piece of design built into CyberDefender is the low impact on resources during scanning and active monitoring. I would enjoy meeting their design team just to congratulate them and shake their hands on this fact.

This isn’t your typical protection suite. Even with all proactive monitoring in use (spam, phishing, spyware, and virus) as well as performing a full system virus scan I noted my CPU load was not over 40%. I am noting the hardware configuration of the laptop that was used to test the functionality below.

Item Value

OS Name Microsoft® Windows Vista™ Home Premium

Version 6.0.6000 Build 6000

System Type X86-based PC

Processor Genuine Intel(R) CPU T2400 @ 1.83GHz, 1833 Mhz, 2 Core(s), 2 Logical Processor(s)

Hardware Abstraction Layer Version = “6.0.6000.16386”

Time Zone Central Standard Time

Total Physical Memory 2,549.82 MB

Available Physical Memory 1.24 GB

Total Virtual Memory 5.17 GB

Available Virtual Memory 3.77 GB

Page File Space 2.78 GB

Protection Available

Just insure you have a complete understanding of the available security and protection I want to list the available features other than virus scanning

  1. Early Spam Protection: The spam protection integrates with your current email client to provide an incoming and outgoing email scanner which provides a more complete security suite.

  2. Early Spy Protection: Active monitoring and protection from spyware and adware software types.

  3. Early Scam: Protects against phishing scams which are used to collect your data.

Additional Security Features

While CyberDefender not only supplies you with virus protection, but as well offers spam, spyware and phishing protection there are a couple of features which I would like to list that you might want to know about.

Early Monitor includes the following features not previously listed.

  1. CyberDefender monitors the Windows update site for patches and updates to the Windows operating system.

  2. It also monitors your firewall status and protection to insure you have the right protection.

  3. Easily access and maintain control of cookies on you systems.

  4. Password protection:CyberDefender shows you the passwords saved by Windows which can be accessed by others. Take control and remove the saved passwords, don’ allow windows to save such information.

Additional Features

Aside from comparing performance, cost and overall effectiveness of CyberDefender against it’s competitors one thing you can note about the software that no other competitor offers is 24/7 PHONE AND EMAIL ANTI-MALWARE SUPPORT.

 Cyberdefender apparently charges several hundred dollars per year for computer support and access to their main program which is supposed to keep your pc running smoothly but we hear very different stories from consumers.

Considering my experience with the CyberDefender software I would have to agree with their statements concerning the performance and effectiveness of the program. I would even go as far as having to state that I would consider CyberDefender to not only be a valuable piece of software, but a required piece of software in the fight against virus, spam, phishing and spyware infections.