What is a virus?
Simply put, a virus is a type of software that "infects" a computer. It's typically inserted into a program, and when that program is executed, the virus activates and attaches itself to other programs in your PC. Viruses can be a simple prank--an annoying pop-up message or blue screen, for instance--but too often a virus is a malicious attempt to outright destroy data and programs.
There are several different types of viruses, but they all have a common thread that you should remember: Viruses aren't actually attached to data; they must be run in some form to infect a PC or its data.
For instance, boot viruses are stored on floppies and infect a PC when the floppy is left in the drive during boot. Upon startup, the virus launches and then spreads to other floppies and wipes out data. Macro viruses are hidden within documents or data, and unleashed when the macro is run. Viruses also commonly come in the form of Web downloads and e-mail attachments, embedded in EXE, VBScript or database files.
But no matter what form it's disguised in, the virus must be triggered in order to run. So if you receive an e-mail attachment with a virus, for instance, as long as you don't open (run) the message, you should be safe. Delete the message immediately if you suspect a virus.
Viruses can infect and destroy immediately, or launch on a specified date. They can affect single desktops, or spread to entire networks, servers and Web sites. While many viruses are simply pranks or annoyances, others are more complex and their effects can be devastating.
Viruses can obliterate data, corrupt programs so that they no longer run, stall servers with e-mail bombs, and--in the case of the "I Love You" worm virus--replace files, steal passwords and infect address books as it propagates itself.
1. Secure your e-mail client against running unwanted scripts.
2. Scan your computers at least weekly to make sure they aren't harboring viruses or worms. Trend Micro's virus scanner, which uses a small "in-the-wild" virus list, will do a quick job of this. If you want a thorough virus scan or virus repairs we suggest Trend Micro for complete safety.
3. Keep your AntiVirus software up-to-date. AntiVirus software vendors update their virus lists on a regular basis. Make sure you visit your vendor's Web site at least once a week to download the update. Most virus software offers an auto-update feature which will grab the updates for you; make sure this feature is enabled (if available) in your software.
4. Avoid running attachments (especially .EXE files) that come in your e-mail, even if they come from your friends, relatives or colleagues. The warped minds now writing e-mail viruses will do their best to lure you into running their viruses and worms by making them look like love letters, jokes or pornography. Once you or one of your friends succumbs to this temptation, the script will mail itself to everyone on that computer's address list.
5. Make frequent backups of your data files, and keep some of your backups out of your computer. We like to burn CD-R backup discs on a regular schedule; CD-RW and Zip discs also work well.
6. Ensure that your operating system and your software is up-to-date with all of the latest security patches. To apply the latest Microsoft Security Patches.
7. Use a software and a hardware firewall: If you have broadband Internet service--even if you have Zone Labs' free ZoneAlarm or some other software firewall active on your PC--you can't be too safe. Belkin, D-Link, Linksys, and other vendors sell inexpensive broadband gateways that bounce back worm attacks that otherwise would reach your computer.
8. Control what starts up with Windows: Many worms place a reference to themselves in a portion of the Windows Registry that defines what programs start up with Windows. The TeaTimer applet that comes bundled with Spybot Search & Destroy 1.3 and with WinPatrol can control what gets added to this list. TeaTimer asks you to verify any program that seeks to be added to that list. Spybot and WinPatrol are free, so why not use both?
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment