Maintain your old Siemens Hipath system

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discovered the need to have a computer at home. At the same time the number of Internet surfers increased. This is a good thing because people are realizing the advantages offered by the world of technology. As soon as they discover this, they start using computers and the Internet more and more, but at the same time not considering the threats that are coming in from all sides. They should know that if you don't protect yourself, nobody will. These threats are now coming from everywhere and they are growing in number and complexity. First threats of this kind were the viruses. At first, viruses were not that harmful. They were designed to perform a simple task, like flashing a single message onto the user's computer screen. Also the spread rate was slow, because not many people were connected to the Internet. But now the majority of viruses are programs intentionally written to obstruct with, or harm other programs or computer systems. And they are spreading very fast.

Many companies and people have had a lot of troubles because of these viruses. And so the need for antivirus software was born. At first one very simple antivirus appeared and this was enough. Now, as the threat is growing antivirus software are becoming a lot more complex. Some of them have also included a firewall so to better protect the users. In order to increase the competition, other antivirus software producers have also come up with a wonderful idea: to offer free scan online. This was a big help for people that are frequently using a computer mostly for their personal use, meaning it is not attached to a network and uses the Internet only from time to time. Now, they don't have to spend a lot of money to buy antivirus software that will be used very rarely.

Most of these antivirus programs have to be bought in order for you to use them at their full capacity. Also you have the option to test a so called "free trial version". These trial versions include all or most of the software's features, and are available to be checked out by the user for a short period of time, usually 30 days. After these 30 days, the program can no longer be used. Other antivirus software producers use another method; they offer a free trial version that you can keep forever. But it is not fully operational, meaning some of the options of the program cannot be used as they are not activated. After you have tried a program and you consider it is fit for your need, then you'll have to buy it to protect your computer at its full capacity.

Lately, viruses are mostly spread through e-mails because this is the most common use of the Internet. Also, e-mail viruses are easier to develop. E-mail viruses make use of the ability of having macros or scripts implanted in word documents, spreadsheets, HTML pages, and are programmed to run when the document is opened. But how does an e-mail virus works? When an e-mail with an infected document or program is received, the user unknowingly opens a document/program, which in turn executes a code to open the e-mail directory and to send a copy of itself as an e-mail attachment to a certain number of addresses. Some of the recipients of the e-mail open its attachment and the process repeats itself.

This is where the antivirus program comes in. This program is set to check all incoming and outgoing messages and their attachments. If an e-mail is detected to have a document or program infected with a virus the program offers several possibilities to deal with the threat: delete the e-mail, put it in quarantine or try to disinfect it. Most of the times, these choices are left to the user's decision. It is up to the user to set the program in such manner to best fit his needs. But not all viruses are coming by e-mail. A few of them use security errors in the operating system or your Internet browser to be launched automatically. But if you keep your antivirus and all the other programs updated, there will be a small chance of being infected via this route.

Nowadays, most viruses are spread in the form of e-mail attachments. This is because some of the worst recent viruses relay on recipients that throw away common sense and launch a deadly e-mail attachment. Commonly the attachments are with extensions that include .bat, .com, .exe, .pif, .scr, and .vbs. Sometimes to avoid the filters of antivirus software, virus creators enclose their malicious code in a .zip or .rar archive file. The file might even have a password to full antivirus programs that scan inside archives. And obviously, the password is included in the message as an image for the convenience of the naive user. As a simple but reliable rule, you should never open an attachment that you didn't expect to receive, even if it came from someone you know. Also, make sure your e-mail software is configured so it will not automatically open attachments.

Another common way of spreading viruses is file sharing. Many viruses spread themselves throughout open network shares. You can protect your computer not sharing files or directories over the network. But if you don't have a choice and you have to share your files, you are still able to reduce the risk of being infected by installing antivirus software and keeping it updated. Other ways to become infected with viruses are downloading files or software from the Internet, instant messaging or even web pages.

If the file you are downloading or the computer you are downloading it from is infected with a virus, there is a big chance that your computer will also become infected with the virus. As for the instant messaging, the major risk comes from accepting files from other users on the network. This risk can be minimized by configuring your antivirus software to scan all incoming files and also configure your other programs not to automatically accept files, and not to automatically execute the files you accept. Certain viruses are known to infect web servers. If you visit a website from an infected server, your computer could be infected with the same virus, but this is a very rare method of infection.

There are many different threats that are targeting the computers. Although they are very different, all of them are popularly called viruses. A virus by definition is a self-replicating file, not considering whether it is malicious or not. Another type of the so called viruses are worms; they circulate mainly through e-mail but also spread through a network. A worm is aware he is located in a network and uses it for replicating itself. Trojan horses (or trojans) are mostly used to insert some remote tools into a system in order to give the attacker free access to that system, without the user's knowledge. Most Trojan horses cannot replicate automatically.

With the increased number of Internet users, the existing threats are also raising as now there are many more computers to attack and more people that don't know to stay away from these threats. But the antivirus software producers are making it easier for us. There is a lot of antivirus software which cover a lot of threats. All we have to do is install one.

Mike Ber is the owner of the Canadian Domain Name Portal called http://www.Every.ca He is also a contributing author to Canadian Computer Magazine and http://www.Developer.ca website.

In The News:

Couple jailed for 10 years over viral video showing them dancing at Iran landmark
Wed, 01 Feb 2023 12:00:00 +0000
A young couple in Iran have been jailed for more than 10 years each after a video on social media showed them dancing at one of Tehran's main landmarks.

Legendary NFL player Tom Brady 'retiring for good'
Wed, 01 Feb 2023 13:22:00 +0000
NFL legend Tom Brady has announced for the second time that he will be retiring.

Court upholds decision to extend Andrew Tate's 30-day detention after appeal dismissed
Wed, 01 Feb 2023 15:58:00 +0000
A Romanian court has upheld the decision to extend the detention of controversial influencer Andrew Tate to 30 days.

LGBT activists welcome Pope to Congo as he dismisses anti-gay laws
Wed, 01 Feb 2023 14:29:00 +0000
Pope Francis is being welcomed by gay rights activists as he begins a tour of Congo and South Sudan.

FIFA facing backlash over potential 'sportswashing' Saudi sponsorship
Wed, 01 Feb 2023 11:35:00 +0000
FIFA is facing backlash from Women's World Cup co-hosts Australia and New Zealand over a potential sponsorship of the tournament by Saudi Arabia amid concerns about restrictions on women’s rights in the kingdom.



tikatoshop.it

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More

Top Five Online Scams

The top five online scams on the Internet hit nearly... Read More

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More