Saturday, January 19, 2013

HOW TO PROTECT YOUR COMPUTER: GUIDELINES FOR STUDENTS

Protecting Your Computer from Unwelcome Intruders. 

When you’re online, you expose your vulnerability to malicious virus that have been growing in virulence and ferocity over the last few years. These program codes have gone beyond mere annoyances with the worst kinds disabling your PC, but they have become portals for remotely perpetuating more sinister activity that can clandestinely hack into sites, mount denial of services or steal confidential and personal data for fraudulent financial gain at your expense.

Are these virus serious enough to cause losses? Among home PC users, you may think having to reinstall your OS after a virus or malware has brought it down is not really expensive as you lose just a day or two to reinstall your programs and rebuilding files, consider that in a business, you could actually lose millions. Just ask ChoicePoint when it took a $6 million charge in 2005 after cyber criminals hacked into their systems and stole sensitive data from thousands of customers. Or the credit card processor CardSystems Solutions which may yet go out of business from major security breach at the company's Tucson, Arizona, operations center. In a recent consumer survey among security breach victims, people don't take lightly the loss of their data. More than 60% of respondents indicated their plans to terminate business relationships with a company that lost the data they entrusted to them.
In 2004, rootkits were a relatively obscure form of Trojans meant to infect Unix computers. But by 2005, rootkits have become a mainstream security threat after Sony BMG Music Entertainment shipped a few million CDs that contained a rootkit among its copy protection scheme. Within a few months, Sony recalled the CDs, but it was too late, According to security experts, rootkits attacking Windows PC were here to stay.

The 2011 Norton Cybercrime Report reveals that there were 431 million global cybercrime victims who lost $388 billion in real money losses and computer time. This is a lot more compared to the estimated $288 billion in revenues from the black markets for cocaine, heroin and illegal drug trades combined. For sure, not all of these losses were incurred due to Trojans, worms, viruses, rootkits and malware. But when you consider that roughly 4.3% of cybercrimes involve damages to PC resulting from online downloads of infected content over the internet, you are looking at a computed $17 billion in annual losses due to malware and virus infection.
What can I do to protect myself from computer viruses and Trojans?
These days, practically everyone's online, downloading and exchanging files, and developers are in such a hurry to get their Web sites up or their files out that checking for a nasty bug is more of a courtesy than a requirement. If you're not careful, your computer can end up with a nasty virus that makes your files act oddly, crashes your computer, pops up bizarre messages, or worst of all, destroys your operating system.
A computer virus is the most subtle of computer problems. It usually loads itself into your computer system when you run a program to which it has attached itself. From the computer system, it'll then reproduce itself, much like a biological virus would, by attaching copies of itself to other programs on your hard drive. What it does then depends on the malevolence of its creator. Some viruses are nothing more than a practical joke. They may bring up a message like "Merry Xmas" or melt your display. Most of them though, either start destroying your system or your files immediately or on a date specified by their creators—like the much-publicized Michelangelo virus, which erases important pieces of your system on March 6. "Trojan horse" programs are similar to viruses in their effect on your system, but they can't reproduce themselves. They're usually a program disguised as something you might want to download onto your computer—for instance, a rogue, modified version of PKWare's PKZIP utility. But when you run the new program you just found, it can do anything from popping up a message to erasing your hard disk, as the rogue PKZIP utility really did.
In either case, you have to actually launch the infected program or the trojan horse for it to infiltrate your system. Though hoax e-mails, like the one about the "Good Times" virus try to make you believe otherwise, neither a virus nor a trojan horse program can do anything if you simply leave the malevolent file sitting on your hard drive.
Finding out that you copied a trojan horse onto your computer is remarkably easy. You launch the program, and the next thing you know, something completely unexpected happens—maybe your system is gone or your computer is laughing maniacally at you. But unless you notice your computer acting oddly before the virus has done its worst damage, you may very well not know you have it until it's too late.
Protect Yourself
There are a few basic rules that computer users should follow to short-circuit viruses. The best known bit of advice is this: Never open any attachment unless you know who it's from and why they are sending it. Refusing to open unsolicited e-mail of any kind is the only sure-fire way to sidestep all forms of trouble.
Anti-virus software is crucial to preventing virus attacks, but this strategy only works if users update their software.Unfortunately, 'keeping it current' means updating it weekly, at least but most products today allow one to automate this process, but file downloads can be large and slow.
Factors to consider when buying an anti-virus package include cost, quality of tech support, how frequently the package self-updates and the platforms supported by the program.
Common sense is another good weapon in the fight against viruses. Be wary of opening any email attachments, even from your firends , especially if it has been forwarded to them.Set up your anti-virus product so that it automatically scans incoming e-mail and avoiding e-mail software that allows automatic launching of attachments.
If all of this sounds like a lot of work, it is. There is always a tradeoff between ease of use and security but the extra time you spend updating your anti-virus software now will save you hours of time and buckets of frustration later.If you don't keep it updated, you might was well be completely unprotected.
Prevention
Like sexually transmitted diseases (STDs), computer viruses existed prior to the popularity of the Internet, but as with the sexual revolution of the '70s, viruses have flourished with the widespread sharing of information. And, much like the efforts to control STDs, controlling computer viruses is to be done through education and practicing safe hex (a play on words which means to perform certain measures to protect your computer).
1. Be sure do a full back up of your system on a regular basis. The best way to clean up an infected file is to replace it with an original non-infected file. Not to mention the grief a current back up will save if a virus takes your system completely down. It's also a good idea to keep more than one set of backup in case the current one is infected before the virus is detected.
2. Always use an anti-virus software program, one with both an on-demand and an on-access scanner. You'll want to look for one that has a fairly complete database of viruses and that is updateable. New viruses are produced daily, so it's important to have software that can detect the latest threat.
Be sure to read the manual and follow the directions of the software program to ensure it's protecting you properly. Also, consider buying and using two different brands to be doubly protected. See our review of anti-virus programs.
3. Update the virus database in your anti-virus program regularly (each month or by the direction of the manufacturer).
4. On a PC, change the CMOS setting of your boot up process from booting first on the A drive (floppy) and then on the C drive (hard drive) to just booting on the C drive. This will not only speed up your boot up process but also completely eliminate the risk of infecting your hard drive with an infected floppy disk.
If you should need to boot from a floppy you can easily change the settings back and reboot from the A drive. Please note: an infected non-bootable floppy disk can just as easily infect your hard drive as would an infected bootable one.
5. Don't allow your web browser to automatically run programs, such as MS Word or other programs through its e-mail program. Configure your browser to launch WordPad or Notepad instead. One of the biggest and growing threats is the macro virus, which is spread through data processing and spread sheet programs
6. Configure your web browsers to disable ActiveX, Java, and Javascript. You'll lose some of the fun the Web's been known for, but you'll save your computer from contracting a virus and speed up your connection.
7. Know that the only way a virus spreads is either by launching an infected file or by booting an infected disk. You can not get a virus by simply being online or by reading e-mail. You have to download and launch an infected file before it will spread. Therefore, do not launch any unsolicited executable files sent via e-mail.
8. Using an updated anti-virus program, scan all new software for viruses before installing them on your hard drive. Even shrink-wrapped software from major publishers has been known to contain viruses.
9. Be aware of hoaxes. To increase mass hysteria, there have been many stories conjured up and spread by unknowledgeable users. For a list of known hoaxes check out the following site: http://www.symantec.com/business/security_response/threatexplorer/risks/hoaxes.jsp
Viruses are not the only type of programs that are written solely to cripple computer systems or to use a computer in an unauthorized way. Other malicious programs are Logic Bombs, Trojan Horses, and Worms.
Help on the Web
The Virus Bulletin (www.virusbtn.com) offers a list of viruses that are floating through the computer world at present. The site also offers the opportunity to report viruses, should you be unfortunate enough to encounter a new one firsthand.
If your computer is not on a network, and you never, ever install new programs or download files from the Internet or open email enclosures, you don't have to worry about viruses. But that's like living in a sealed bubble. Most of us have to go out into public every day, where we're subject to the germs carried by others (though natural immunities will usually protect us from most of them.) Likewise, most people also have to update their software and are interested in communication and information from others. Luckily, there are some preventions and cures for even the nastiest of viruses.

Anti Virus Programmes
 
Protecting Your Computer with Anti-Virus Programme
Should I invest in a Anti virus programme and how do they work?
You'll never regret investing in a good anti-virus utility for your system. It's like insurance—even if you never accidentally download an infected file, you'll be extremely glad you have the program when it protects you. For instance, one friend saved himself from having to reinstall his entire system because his copy of McAfee's VirusScan identified a virus in a file a commercial artist had given him. Surprisingly, the artist knew his computer had been crashing a lot lately, but still couldn't be bothered to get an anti-virus utility for himself—he's probably still passing out infected files to his clients.Unfortunately choosing a anti virus programme is not as simple as it should be.Some programmes, even well know brands can actually slow your computer down so much as to stop its effecient functioning.
Always make sure you only have one AV programme installed on your pc at one time as having two or more working simulataneously can really effect a pc's performance not to mention affect the efficacy of its AV programme.
Anti-virus Programs
The most popular anti-virus programs—whether they're free, like Disinfectant for the Mac, or cost about $40, like VirusScan for Windows, will scan your hard drive for infected files. They look for markers, usually internal strings of code, for known viruses, and sometimes also check a file's name against a database of known trojan horses. The commercial programs also often let you update their database of known viruses and trojan horses, either for free or for a nominal fee. But since this won't catch the newest of the new viruses, the programs can also check to see if a program, or your system, is modifying itself. But though this is a good indicator of a virus, it can also mean you've added a utility to your system, or you're using a self-modifying program, like a database, and the many false-positives you get can be annoying. If they've identified a virus in a file, the programs can also strip the virus out of the file, but I don't recommend doing so. If you're a conscientious computer user, you back up your computer regularly—that is, every time you use it. It's best to replace an infected file with an uninfected copy. Though an anti-virus program will successfully remove a virus (or tell you if it can't), it could damage the original file, or worse yet, leave a "virus ghost" that sets off the anti-virus utility's alarm, even though it's harmless.
The very best programs can also scan a floppy disk when you insert it into your floppy disk drive, and check a downloaded file the moment it's complete on your drive—or alternately, quickly check a file when you launch it—so you're protected before a virus can even make it to your system.
The latest trend in malaware is what is called "drive by downloads" which inserts malicious coded iframes from seemingly innocent websites.This exploit takes place automatically and undetected by website surfers.Google the well known search engine has "found more than three million unique URLs on over 180,000 web sites ".
The Internet is a fabulous resource. You can download hard-to-find files and programs at any hour, day or night, onto your computer system. You don't have to isolate yourself to protect yourself, but you should have some insurance against the nasty, invisible viruses and trojan horses that can bring your computer to its knees.

1 comment:

  1. Hello! Your article rocks also as being a respectable great understand!
    ??
    I can??t actually help but appreciate your blog internet site, your site is
    adorable and good
    My spouse and I stumbled more than right here different web page
    and thought I ought to check items out.
    I like what I see so i'm just following you. Appear ahead to discovering your web web page but once more.

    Also visit my weblog http://Www.fri9nds.com/blog/view/3853/how-come-iphone-5-will-very-first-be-launched-freely-inside-the-market

    ReplyDelete