2. Know All about Your Enemies
Whenever your computer
starts acting weird and makes
it difficult for you to work on,
the first thing that comes to your
mind is whether a virus has
affected your computer. This
issue is dedicated to explain
the most common threats that you may face. It gives
you some details to help treat the root cause of any
problem.
Here are some definitions on these threats:
Malware is any malicious program or software that’s
designed to exploit a computer user. Malware is
basically an umbrella term covering computer viruses,
worms, Trojan, spyware, rootkit etc.
Virus replicates itself in computer memory when
initiated by the user. They contain some malicious
codes which can affect your files, your operating
system or even your master boot records thereby
making your computer start slow or not boot at all.
3. Know All about Your Enemies
Rootkits are computer
programs that are designed
by attackers to gain root or
administrative access to your
computer. Once an attacker
gains admin privilege, it
becomes a cakewalk for him
to exploit your system.
Trojan horse is a program that appears useful by
pretending to do certain things in foreground, but in
reality they are working silently in background with the
only objective of harming your computer and/or
stealing valuable information. It penetrates your
computer through downloading malicious software like
keys, cracks, free illegal music, wares etc from an
unknown source.
A worm is an evolved form of a virus. Like virus,
worms replicate and spread themselves but it happens
on a bit larger scale. They not need a human action to
replicate and spread and that’s what makes it more
dangerous. It always seeks for network loopholes to
replicate from computer to computer. Therefore, it is
not recommended to download any email attachments
or to click the links friends share with you in a chat
window.
4. Know All about Your Enemies
(part II)
Here are more details on these
threats:
Spyware , unlike any of the
above, doesn’t harm your
computer in any way. Instead,
they attack you! Once installed
on a system they run in background and keep on
collecting user’s personal data. These data can include
your credit card numbers, passwords, important files
and any other personal stuff. It is always advisable to
download and install software from trusted sources.
A backdoor is a method of bypassing normal
authentication procedures. Once a system has been
compromised, one or more backdoors may be installed
in order to allow easier access in the future. Backdoors
may also be installed prior to malicious software, to
allow attackers entry.
It is worth-knowing that crackers use backdoors to
secure remote access to a computer, while attempting
to remain hidden from casual inspection. To install
backdoors, crackers may use Trojan horses, worms, or
other methods.
5. Pick up Your Armor and Face
Your Enemies
Through the previous issues
of Softex newsletter, you were
introduced to your enemies and
were given detailed description
on each of them. I believe now
you need your shining armor and
sword to confront these vicious
threats.
In this case, regular scanning
and an effective antivirus system are essential for the
security of your system, which prevents damage and
data loss.
The following steps will guide you to choose the best
antivirus for you:
Step 1: Make a list of your requirements
You have to assess your requirements and know all
about your operating system in order to know which
antivirus (for your PC, Business or Mobile ). For
example, if you are looking for business features,
however, you will want offerings of a full suite such as
anti-spyware, spam filter, anti-virus and firewall.
6. For More Related Articles,
Please Visit
http://www.softexsw.com/en/articles.php