Just as motorists traveling at 10 mph below the speed limit in the left lane, to the programmers who create and distribute targeted malicious computer programs do not know. They do not seem to have a great knowledge and know-how, but they can do to figure out how to work by simply following the rules. This article will briefly cover the most vulnerable to computer viruses and compromised computer as the computer and the data value much lessvulnerable to a malicious executable file, or "virus".
Malicious executables
All malicious programs are "executable" files. On computers running MS-DOS or Windows-based operating systems .. Exe and com are common extensions for these files.
Virus
A virus is a program created for the sole purpose of destroying the data on your computer. The virus does not destroy important files, or it can be programmed to be to delete all files. A virus can lead an infected computercertain actions at certain times or serious issue commands such as deleting the entire registry, completely disabling the operation and the computer starts.
Viruses are executable files that are distributed are from friends, you download from the Internet or install even for us. A virus is often used as a Trojan horse that acts as a carrier for the virus to come in disguise.
Trojan
A Trojan is a program that seems to be generally safe, but it contains somethingdamaging the inside of a worm or virus. You can download a game or a picture, provided that it is harmless, but if you run the file, the worm or virus to work. Sometimes you just get annoying, but many are specifically designed to cause serious damage to the system.
Worm
Worms work a little 'different. These programs are replicated over and over again. Worms usually come from email client. The machines are infected when the user requests a file Trojan thatcontains a worm against him. Most of these programs are designed to e-mail address books stored on a mail server or hard drive to use. When you open a Trojan-mail attachment that contains a worm, worms, Trojan says with all the e-mail for distribution and per e-mail address in order to repeat the process.
The "Love Bug" is a good example for each of the above. It 'a Trojan horse, because it is "Love Letter" in disguise, if indeedConstruction of a malicious program. This is a virus, because once executed, it infects files on your computer, transforming them into new trojans. There is a worm that spreads itself by everyone listed in your e-mail or IRC client.
Bacteria
Bacteria are programs designed simply to replicate themselves many times, with a consequent lack of resources or slow down your computer.
Spyware
Spyware is usually designed to access marketing data from your computerand send it to a web server that stores information in a database. Since these programs are relatively easy to develop and distribute, have become popular with identity theft.
Botnets
Similar to spyware, botnets are the applications developed by software programs on individual computers and computer networking companies and organizations in the installed copy. Once the network has been exploited, usually the master command of the botnet botnets, which are on the rest ofNetwork and implementation of measures by the central server.
Computer-based prevention
Note - If the computer on a local area network or LAN from your dealer or you have a laptop that is sometimes in a LAN, do not change configuration settings without first checking with your network administrator.
Installing antivirus software is important, but every year more and more anti-virus software alone is not enough. If you are using an MS-DOS or Windows-based operating systemsSystem the following precautions will greatly reduce the chances of contracting the infection and are now mandatory in many large companies:
1 - Do not store or install programs ("setup.exe") on your hard drive. Many viruses replace these files with corrupted file installation makes it easy to accidentally "install" them.
2 - Most anti-virus programs allow you to scan files before opening them. Scan all executable files before opening them.
3 - Use"Classic View" instead of "Windows XP" or view the "web" in Windows Explorer. Many viruses use to replace the file "Folder.htt" "Windows XP" screen with a corrupt VBScript. Once infected, each time you use Windows Explorer, create a folder, perform a virus that has slowed noticeably at the computer screen. To switch to "Classic View", proceed as follows:
"Right-click" on the taskbar (bottom of the screen), select "Properties", then "Start Menu". Select "Classic Start Menu".
4 - Do not"Hide extensions for known file types". By default, Windows Explorer hides the extension of known file types, and as popular. Doc e. Rtf. Most of the viruses that are carried out by e-mail using this vulnerability. Once on your hard disk, the virus can display the same icon for a Microsoft Word document, but is actually a malicious executable file attachment. You would never know that the file ". Exe" instead of one. "Doc", because the extension is not visible. To correct this, open anyFolders from the toolbar, choose "Tools", "Folder Options", "View" and uncheck "Hide extensions for known file types".
5 - Know what programs on your computer during the commissioning of the system is running. Select "Start" "Run", type "msconfig", press "OK" or hit "Enter". Select the "Start" and watch programs whenever you restart the computer. Become familiar with each program and check regularly. In this way, if something seems strange. Recognize
The software-based prevention
Note - If the computer on a local area network or LAN from your dealer or you have a laptop that is sometimes in a LAN you need to install any software without first consulting your network administrator.
Anti-virus software is crucial. AVG Anti-Virus is an excellent program and is offered in a downloadable version for free at grisoft.com.
Spyware is often overlooked by anti-virus algorithms. There are many good anti-spywarePrograms.
A free version of Spybot Search and Destroy can be downloaded at: Safe-networking.org
A free version of AdAware SE Personal can be downloaded at: lavasoftusa.com / software / adaware /
I use Spybot and AdAware both and I have several cases in which the items discovered missing from a program in other states. After running a scan with both programs, I never lost face each article when the article was an Active X control
"Active X"Controls (Flash, Swish, etc.), are elements that Internet users have benefited enormously. They allow web sites to life with multimedia effects, interactive objects and create complex applications, providing a dynamic user.
Unfortunately, they can easily be handled in spyware / adware. These objects are often overlooked by anti-virus and anti-spyware. SpywareBlaster is a program that was developed specifically to recognize and prevent the installation ofCorrupt Active X controls A free version of SpywareBlaster can be downloaded at: javacoolsoftware.com / spywareblaster.html
After installing each program, take the time to read the "Readme". Familiar with the application and how it works. Many times the standard configuration of these programs can cause the program to avoid conflicts with other applications or devices on your computer. Of course, it will not be able to manipulate the program until it meets your specific needs, ifYou are not familiar with him.
Use once installed, and maintain these programs to a minimum, updated on a weekly basis. With all anti-virus and anti-spyware to keep an eye on the "Ignored Items" list when you open the program. (Some malicious programs have figured out how to get even "ignored", taken from the scanning software). If you find that all elements have been verified as "Item Skipped", simply uncheck the option, and training with the scan usually do the trick.
InFinally, I can tell you from experience - when it comes to making a piece of malicious programs, prevention is still hard to get much easier than cure!
No comments:
Post a Comment