ComputersSecurity

How to protect your computer from new viruses.

In this article I will tell you how to outwit a virus using modern technologies, as recently appeared viruses are masked and how you can protect your computer.

Especially insidious viruses secretly made their way to the computer, and then they remain in the system after which they take no action. The virus is just waiting. Waiting, a convenient time to attack. There is a virus called "Michelangelo", created in 1992. He "sat down" on millions of computers, and then automatically launched on March 6 and attacked computers. On this day, the birthday of the artist Michelangelo, his task was to destroy the PC on this particular day. Fortunately, relatively few computers have suffered from this virus. The worst outcome for owners was the following: the virus overwrote the first 100 sectors on the hard disk, and moved to the master boot record. Users who do not know the computer well, lost data.

In most cases, the purpose of the virus is to steal personal data stored on the computer and passwords. Currently, there are many viruses that block your PC and display an advertising banner on which the conditions for unlocking the computer are described, in this way the creators of these viruses profit from the credulity of users. Computer service will help you to remove viruses and protect your computer from intrusion from the network.

Viruses make their way only to vulnerable computers.

The more computers infected with a virus, the more likely it will be detected by antivirus experts. They can study the pest, create a program against it, and then bring it to the anti-virus database and block it. For online criminals, this is a great loss, since it takes a lot of time, effort and money to create and develop these viruses. So their precious viruses do not spread on most computers.

The virus finds a vulnerability, then "digs" into it, for example, in an Adobe Flash or PDF plug-in vulnerability in the system. It starts its attack after it has been downloaded and installed on the user's PC. Malicious programs are delivered on a case-by-case basis.

There are so-called "banking" Trojans that specialize in "holes" in the security of Internet browsers, they are created under the most common versions of browsers.

Against more complex viruses, anti-virus programs implemented advanced functions, such as behavioral analysis. If the program behaves suspiciously on a PC, the protection program is not sure about it, and sends it to the viral lab.

Only with the help of the appropriate "keys" can you decipher and begin to analyze the code of the virus. This key is supplied with most viruses, it is provided by a certain server on the Internet. The server address with the key is hidden in the virus. Antivirus specialists do a lot of extra work to find the address of the hidden key. However, since the address must be saved and some of the pests are transferred, the key is transmitted in plaintext, so this key is most often found.

Now the virus developers have become more reasonable, the encryption key is no longer delivered openly to the Internet server, it is generated from the hardware configuration of individual computers.

Thus, each virus code is unique. Good antivirus programs can watch and send virus code to the laboratory, those viruses that exist in the antivirus database will be immediately deleted or moved to quarantine, depending on the user's settings. But there are viruses in which there is only an individually encrypted part of the virus. Thus, specialists are not able to decipher this virus and analyze it.

Seven tips against the computer virus :

1) Use antivirus software. Who wants the best protection, use the full Internet security package.

2) Who uses the free antivirus program, can additionally install a firewall. Although Windows Firewall will be enough, but, there are firewalls that offer more features.

3) Who does not use the full Internet security package, must install protection for the browser. For example, the addition of WOT - this application warns of dangerous websites that can not be trusted.

4) Enable active automatic updates for Windows. Thus, you get new Windows software, without delays.

5) Download all available updates immediately for all applications and plug-ins. Updates include a number of new vulnerabilities.

6) For Windows XP users: Do not log in with administrator rights, only with user rights, this will restrict access to your computer from the network and will not allow changes to your system.

7) For Windows XP users: In addition to the user account, it is recommended that you set the password to the administrator account.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.delachieve.com. Theme powered by WordPress.