Chapter 1:
What Is A Computer Virus?
Synopsis
A virus will function as an element that will constitute damage to the
hard disk contents or interfere with the normal operational
executions of the computer system. This will cause the computer to be
unable to function properly until the virus is eliminated and the
overall system is overhauled and rebooted.
The Basics
A virus program is usually able to replicate itself and this too is an
added problem once the virus latches on to a system. Progressively
getting out of control, the virus will attempt to cause as much damage
as possible before it can be detected and eliminated. The replication is
usually intentional and designed to act just like a Trojan, thus causing
the unsuspecting user being caught off guard. If a file that contains a
virus is opened, or copied onto another computer, then the other
computer will also become infected and this process is repeated every
time the file is opened and downloaded onto other systems.
A virus can easily be introduced into a computer system along with
any software program and this is bad news for the users of FTP
otherwise referred to as file transfer protocol. The viruses can also
become a problem when there is referencing done and email
attachments are being used. When the virus enters the computer
system, it can attach itself to, or even replace an existing program.
This of course is not good for the user, who will ultimately open the
attachment or file and cause the virus to be activated.
Chapter 2:
How Are Viruses Spread?
Synopsis
Having a virus unleash itself within a computer system can be a
nightmare for the user, as this is most often done unintentionally but
with no less detrimental effects. There is no real way to detect how a
virus really attacks and spreads but a lot of effort is put into how to
ensure the damage done is as minimal as possible.
How They Get Around
The following are some of the more frequent ways that viruses can
spread form computer system to another effectively until detection is
almost too late to save the infected material:
• Email attachments are by far the most popular way that viruses
find their way into the user’s computer system. When the Microsoft’s
Outlook Express automatically opens attachments to emails received,
the virus in automatically unleashed on the system. However, most
users now tend to avoid opening attachments they are unfamiliar
with and instead resort to immediately deleting them to ensure the
virus does not gain access into the system.
• Rogue websites are another problem area for unleashing
viruses. Sometimes the virus is introduced into the system by simply
visiting websites without knowing the possibility of the virus being
embedded in the site’s content. Thus when the site is downloaded, so
will be the virus too.
• Networks are also another popular way the virus is able to gain
some momentum, as any user on the same server opening a site
where there is a virus will unleash the virus onto other user’s systems
too. It usually takes only one party to accidently open an infected site
and all the other users on the network will be exposed to the virus
infecting their systems too.
• Infected disks are sometimes the cause of the virus spreading,
as the user of the infected disk is the source of the hard drive being
infected and thus corrupting all the material on the hard drive itself.
Chapter 3:
How Bad Can A Virus Attack Be?
Synopsis
A viruses in itself, is a very damaging program and when unleashed
on a computer system, the damage can be quite devastating to say the
least. Even in the mildest form, viruses can and usually do, cause a lot
of damage to the user’s system.
Viruses Are Serious
It would seem that the virus is able to show the vulnerability of the
user and the tools being used, while at the same time these viruses are
able to display just how innovative the inventor can be if there is a
need to inflict online damage, without any actual physical
intervention. Phenomenal numbers have been documented within the
very small window of time that it takes to cause devastating damage
to a computer system. Some of the damage done will not be able to be
rectified, thus causing the user to lose all the data permanently.
Applications can also be lost but usually it is fairly simple to
download again but this is not so possible when it comes to data lost.
Viruses are usually designed to represent a small piece of software
that latches onto existing programs until it is activated and then
launches into damage mode. An example of such would be the almost
unavoidable use of spreadsheet software, as this particular
application is bound to be open often thus making it an ideal place to
attach the virus to.
Email viruses are also another area where there are usually
devastating results from the invasion of a virus. This is especially so if
the user tends to open attachments without proper care or scrutiny.
Trojan horses are also another simple computer programs that claim
to perform with one objective, but usually comes with the intention of
infecting the user’s system with a virus.
Chapter 4:
What Is A Malware?
Synopsis
Having to deal with the possible onslaught of viruses attacking a
computer is already quite a challenge and when malware is added to
the equation, the frustration builds. Malware is a huge threat to the
computer system being used as its damaging capabilities are quite
extensive.
All About Malware
Basically, any malware presence within a system will cause the user’s
browser to be hijacked, the search attempts to be redirected, while
having to contend with unnecessary pop up adds and also the sites
you visit tracked.
In most cases the malware is able to reactivate itself into the system,
even though the user is thought to have eradiated its presence. This is
mainly because the malware is able to embed itself deep into
programs and is rather difficult to detect until it surfaces in the form
of trouble for the user. However, it is possible to follow a variety of
basic preventive measures to help remove the malware through a
series of spyware removals. Other viruses, which are sometime
categorized within the malware platform would include worms,
Trojans and everything that generally attacks the software of the user.
The invasion by malware can take on several different forms, and
these are usually hard to detect in the initial stages until considerable
damage is done. Malware often comes hidden within other programs
such as Kazaa, iMesh and other file sharing programs. The popular
contribution of the malware would be to provide revenue for the pop
up ads where income is generated when the user opens these. Others
would include websites being presented under the disguise of being
full of informative content, thus encouraging the user to open such
files.
Chapter 5:
Getting The Right Anti-Virus For Pc
Synopsis
Having a good and reliable antivirus program is very important to
maintaining the integrity of the user’s system at all times. With a
suitable antivirus program in place, the user is less likely, or at least
in a position to minimize the possibility of having to deal with
negatives such as malware.
Choosing The Right Protection
As there are a lot of different antivirus programs available in the
market today, the user may find it confusing and overwhelming when
it comes to trying to choose one suited to his or her needs. However,
based on the following points, the user should be able to be make a
fairly informed decision on what would be best for the needs of the
moment.
Effectiveness of the antivirus programs should be considered as there
are programs that will deal with only certain aspects or types of
viruses and not be able to handle others. This is ok if the use of the
online download is limited and the user is not in the habit of surfing
for anything and everything. The user should ideally get as much
information as possible on the antivirus intended for purchase and
only then should the choice be made according to its suitability.
Choosing an antivirus program that is easy and simple to use is also
something that needs consideration. If the program is difficult to
install, it would be rather frustrating indeed to actually get it to
perform at its optimal capacity. The programs should be either self-
explanatory or at the very least simple, even for the most simple
minded user.
The virus definitions and the engine updates should also be another
consideration, as these will eventually effect the integrity of the
programs it is meant to monitor.
Thanks so much


0 Comments