Maintain your old Siemens Hipath system

Viruses and Worms: The Problems and Their Solutions

History and Background

The virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. Bugs and glitches could cause damage unintentionally, but a virus created havoc intentionally, and therefore often caused much more damage then just glitches in software. Technically a virus must be in a host file and spread manually by people, versus a worm which spreads by an automated process and doesn't require a host file, but we will include worms as part of the term virus. Therefore, the threat of viruses quickly multiplied expotentially. One computer infected by a virus is manageable, but a virus spreading uncontrollably and automatically can cause damage to sometimes entire populations. And with the introduction of the Internet, billions of computers worldwide could be accessed with a click of a button. These abilities are what made the virus probably the greatest security to personal computers in the 21st Century.

What kind of damage will it inflict?

Since up to 100 new viruses are discovered every minute by anti-virus industries worldwide, the damage they inflict varies considerably. Some will display an annoying popup. Some will swap your mouse buttons. Some will uninstall Internet Explorer. Some will delete all your personal files. And some, though rare, will slow down your computer fan to the point that your computer processor starts smoking. All have 1 thing in common - they reduce your productivity in some way and they inhibit you from comfortably using your PC. Therefore you must take several precautions to insure you do not to become infected with viruses. With just a few simple security measures, the chances of getting infected with a virus can be cut down by over 90%.

Security Measures

The most important step - Be careful of everything you do on the Internet! It is extremely rare for a computer to get infected by a virus if you only download and browse trustworthy sites and emails. If an email has an attachment and looks suspicious it is very likey to be a virus. If a site is providing illegal or inappropiate content, it should be considered a risk. These are basic rules of safe browsing of the Internet and unfortunately, most people only learn these rules after a disaster. Don't learn from experience! Don't let it happen in the first place. Keep your system up-to-date. Nearly every major virus threat to operating systems are patched soon after discovery. Visit your operating system update website often, which is www.windowsupdate.com for Windows users. Get a reliable antivirus solution. The most common is Norton Antivirus, but I personally do not like its unreliability and incompatibility with many PCs. On the otherhand, it is probably the most user friendly antivirus solution on the market, and is probably best for PC beginners. If you're looking for a free yet extremely reliable and easy-to-use antivirus solution, Avast may be your answer. I am currently running Avast and am very happy with it. I previously tried Norton Antivirus, Norton Client Security, NOD32 Antivirus and McAfee Antivirus, but each had their own individual problems and so I had to constantly change antivirus software until I finally reached Avast.

Some people go overboard and install many other security measures but I don't recommend this. These measures only hog resources, confuse users and cause conflicts with other software. Some of this software includes firewalls, memory explorers and file protection. References

www.wikipedia.org

us.mafee.com

www.netmom.com

www.pcworld.com

Links

Avast Antivirus - www.avast.com

Soroush King is a certified programmer, adept in VB, C++, Delphi, as well as web developer and scripter, having considerable knowledge of both PHP and Perl. He also owns and manages several professional websites.

This article was originally published at http://www.articlesandtools.com/adware.php For more information on computer security visit http://www.articlesandtools.com.

If you would like to use this article anywhere else, please just notify me by sending an email to kingofkings@gmail.com (you don't have to wait for a response, as this is just a notification, not permission). Please refer on the page that the author of the article was I, Soroush King, and also please note that the article was originally published at http://www.articlesandtools.com/adware.php by providing a link.

In The News:

China threatens 'further actions' over US downing of suspected spy balloon
Sun, 05 Feb 2023 07:40:00 +0000
China has threatened "further actions" in response to America's "serious overreaction" in the downing of a suspected spy balloon.

How US shot down China's 'spy balloon' with a single missile - and what was likely on it
Sun, 05 Feb 2023 12:47:00 +0000
A US military operation to shoot down a Chinese "spy balloon" that had been hovering in American airspace came at a tense time for the two superpowers, whose relationship has been on rocky ground for years.

Beyond the 'balloon watch' gimmicks this is an extremely serious moment
Sun, 05 Feb 2023 03:36:00 +0000
For beach-walking South Carolinians, it would have been quite the Saturday afternoon spectacle. 

Ukraine expecting major Russian offensive around invasion anniversary
Sun, 05 Feb 2023 15:04:00 +0000
Ukraine is expecting a possible major Russian offensive launched for "symbolic" reasons around the anniversary of its invasion later this month, the country's defence minister has said.

Protests in Iraq after YouTube star allegedly strangled in 'honour killing'
Sun, 05 Feb 2023 15:04:00 +0000
Dozens of Iraqi protesters gathered on Sunday to stand against the "honour killing" of a 22-year-old YouTube star - who was allegedly strangled by her father.



tikatoshop.it

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can... Read More