Table of Contents
What Is a Computer Virus – How To Protect Your Computer From Them
What is a computer virus ? – Computers have become an indispensable tool and play a very important role in our daily lives. Everyone faces a computer failure at some point or at some point in the process of using a computer. Therefore, it is important to resolve this issue as soon as possible.
Aside from hardware issues, software is the most likely part to be damaged by a virus attack and you don’t have to be in an internet cafe to be affected. As is clear from the statistics, this also happens at home. In this case, an antivirus program is essential if an unexpected attack occurs in the middle of a critical task.
There are many antivirus programs on the market, and not all are the same. It depends on the type of virus that affects your computer and the malicious programs that damage your system. You need to perform a system scan to find the type of virus that affects your system. This also indicates the level of infection.
Antivirus programs can be divided into two types. One is a program that can be downloaded from the Internet, such as McAfee, Kaspersky, Norton Anti-Virus, and the other is a PC repair tool with diagnostic and repair mechanisms. There is also a Google redirect virus, a parasite that redirects users to malicious websites.
The types of viruses that impair system functionality can be broadly classified into two types. Trojan horses and worms. The Trojan attacks the system through a media player plugin and steals usernames and passwords during downloads. This can lead to complex computer security issues. Worms, on the other hand, are easier to access than Trojan horses and can even penetrate the system from a USB stick. Worms affect the overall functionality of the system. Therefore, we recommend that you install the antivirus program with the help of an experienced IT technician.
However, there are some drawbacks to using an antivirus program. Some of them can slow down your PC’s performance and slow down your computer. In general, antivirus programs occupy most of the memory, and even after cleaning the registry, a certain amount of uninstalled software remains, which can affect the normal functioning of your computer such as shutdown and freeze.
Nevertheless, antivirus programs are essential for getting rid of unwanted viruses in your computer, so it is recommended that you use antivirus programs to choose the best type for your system.
What Is a Computer Virus

How To Protect Your Computer From Viruses And Spyware
What is a virus? Viruses are self-replicating software that is usually sent to other computers via email or the Internet. No human intervention is required. Its purpose is to duplicate, damage your computer, or both. This usually comes from an infected email or document and looks like a time bomb that is immediately damaging or waiting to be triggered on a particular day.
Virus Example
- When the computer reads the disc, it loads boot viruses such as Michelangelo and the disc killer. It is very difficult to get rid of this kind of virus.
- The program virus attaches to an executable program on your computer and replicates with every executable file on your hard drive. Again, these are very difficult to remove. Examples are the Sunday virus and the Cascade virus.
- Stealth viruses manipulate the file size to avoid detection. Examples are whale virus and Frodo virus.
- Polymorphic viruses change as they replicate, so it does not appear to be antivirus software or humans trying to find the virus. Examples include Stimulate Virus and Virus 101.
Macro viruses infect Microsoft Office documents (and others) and infect regular dot files (templates that open in Word when you don’t open the file). These viruses infect all documents opened programmatically, and when the infected file is shared, it is replicated to other computers. Examples are DMVs and nuclear viruses.
Viruses are also very good at disabling antivirus software. Not only can this particular virus do its dirty work after this event, but other malware can also infect your computer without fear of being caught. In fact, on some regular service calls, computer users noticed that the little antivirus software icon near the clock had disappeared, and computer users didn’t notice the difference (at least until pointed out).
What is spyware?
What is spyware ?- Spyware is a general term for malware that is installed on your computer by infected pages on the Internet, or that comes from software or other packages that you install on your computer. Spyware has been mislabeled as a virus and has grown over the last 8-10 years (since 2000), causing major headaches for many computer users, leading to computer repairs and file loss. This type of software will be the focus of this document.
Spyware comes in the form of adware, hijackers, tracking cookies (but not all tracking cookies are bad), rogue security software, ransomware (highly rogue security software), and keyloggers. New types of spyware include rootkits that are very difficult, if not impossible, to remove from your computer system. We’ll talk more about this later. However, the main point of spyware is software installed on your computer system without your consent or knowledge, which is usually very (or seemingly) difficult to remove.
Many spyware programs are installed via Trojan horses, where the software is installed on your computer from the Internet. Spyware is unintentionally installed by the user at the same time as the “software” to give the computer malware-free control. Software installed this way includes free screen savers, free games, torrent programs, file sharing programs (such as LimeWire), and other malicious software.
Other spyware programs are installed from infected web pages. If you see a page with a pop-up such as “Warning: Your computer is infected with virus.
Adware includes pop-ups, pop-unders, and other advertisements that appear on your computer through software that is unknowingly installed on your system. The main purpose of adware is to entice users to click on ads that make money for those who create software.
Hijackers (browser hijackers) literally hijack your web browser and take you to a place other than where you want to go. The homepage may also be hijacked. Again, the purpose of hijackers is money. When the user clicks the link on the hijacked page, the malware author receives the payment. Hijackers work technically at various levels, including registry changes, hosts file changes, browser add-on changes, LSP (Layered Service Protocol) hijacking, and home page changes. Removing browser hijackers can cause browser connectivity to be lost and requires additional (and more experienced) diagnostics and cleaning.
Keyloggers can determine what you are doing on your computer and record your keystrokes when you log in to bank pages, eBay, PayPal, and other websites that are important to you. The keylogger software then sends this information to a “home” server (also known as a “calling home”). This server allows a malicious user to decrypt the information and perform theft of the user’s credit card, bank, or other identity to retrieve the information.
Ransomware, a rogue security software and its more dangerous cousin, is the latest type of malware that causes problems for computer users. Malicious security software pretends to be useful security software and is usually installed via an infected web page in the form of a pop-up indicating that your computer is infected with thousands of viruses (drive). Also known as buy-by download). This will cause the user to click Scan Now or OK and will actually install the malware.
The software doesn’t actually detect anything, but it does. Next, we suggest cleaning up your computer at the cost of the software. When you pay for the software, the routine changes a little, the software said it cleans all the viruses. Examples of this malware include Spy Sheriff (one of the original), Antivirus 2021, Antivirus 2022, Security Tools, and Security Essentials 2022.
Ransomware is essentially like rogue security software, but its impact is much more serious. Not only does it want to pay for it, but it does not allow proper operation of the computer until it is paid. To make matters worse, some of this type of malware encrypts all data files (documents, photos, music, etc.) on your computer with a 128-bit key that only the programmer knows. It is almost impossible to recover data unless the data is backed up to an external drive or the user pays the ransom. This software is installed in the same way as malicious security software.
The nature of malware programs and why they are often not protected by antivirus software.
Malware is created by people who understand computers, operating systems, and browsers much better than the average Joe and know how to program a computer. These can be placed anywhere in the world. They create their own creations, test them, and send them out of their nests to fly (and infect) themselves. Malware has been tested against all browsers and operating systems available to malicious users and will do its best to exploit the security holes still available in the software and operating system.
You may learn about these security holes from other hackers, or you may learn from others who find them without harm. Malware makers then advertise infected web pages to search engines, or deliberately misspell or upload popular domain names (looks good but infected software to users. I promise the world). , The software slowly begins to infect your computer.
How about an antivirus company? Antivirus and antispyware companies (Norton, Mcafee, Trend, AVG, Avast, Webroot, Spybot, Ad-aware, and now Microsoft, etc.) don’t know about this software yet. This is because no one has reported to those companies. The bad guys are, well, really bad! They have not told the anti-malware company that they are releasing this new software.
However, when antivirus companies start receiving reports of new malware, they request samples and sources (where they came from). You can then start disassembling them as needed (reverse engineer) and work on updating the program definitions so that the software can fight the virus.
A definition is a bit of code that good software uses to compare code on a hard drive and determine if it is bad software. Definitions need to be constantly updated so that the good can fight the bad. A few years ago, the definition was updated about once a week. Currently, many companies update at least once a day.
Now that malware has been “wild” for some time (on the Internet), good people have the opportunity (if necessary) to update their definitions and, in some cases, their software to fight the malware. Does this mean removing all viruses in the future? no! The removal routine may still be problematic, and the removal routine may not improve for weeks or even months. When you turn on your computer, good software cannot prevent bad software from running, which can lead to other problems (called processes). Rootkits are particularly good at connecting to operating systems and can also be run in safe mode.
Antivirus software is useless! If you allow a user (you, or a relative, friend, etc.) to install a program (any program) on your computer, antivirus software cannot prevent the installation, even if the Trojan is installed. Regardless of the antivirus software you use, even the “best” software cannot prevent the installation of infections.
Do you see this as an endless virtuous circle? Do you know how and why antivirus software can’t protect you? Does this mean that you should stop using antivirus software? No, I don’t think. Antivirus software can help protect users in some cases, remove viruses, and alert you to operating system changes that should not occur. However, it is not a cure for all viral infections and cannot prevent the outbreak of viral infections.
How Can I Protect Myself From These Nasty Viruses?
1) It is necessary to utilize education and common sense on the Internet. Yes-it has the power to track these viruses without using ifs, and, or. If what you see on your screen doesn’t look right, don’t do it. Do not press the button.
2) Keep Windows and anti- malware software up-to-date. You can’t fight what you don’t know. Run only one antivirus software program. However, you can use some anti-spyware scanners (for example, Ad-Aware and Spybot Search and Destroy).
3) Use a software firewall- Windows 11 comes with enough firewalls to monitor incoming and outgoing connections. Windows Firewall is inactive on Vista and XP, but it does not monitor outbound connections (for example, if Spyware attempts to “call home”). Check out free firewalls with antivirus features such as Comodo Firewall. It works well for free. Again, it’s just antivirus (and firewalls), right?
4) Keep away from porn sites, hacker sites, party poker sites, and sites that contain funny characters or where your domain name (such as google.com) doesn’t make sense while you’re browsing. .. When searching the internet, be careful about what you click. If you don’t know your domain, don’t click on attractive sites. Think seriously about what your domain and the rest of the URL will look like.
If you feel scared, don’t go. The same is true for Facebook and MySpace links! Find another safe-looking place (think of a URL that reminds you of a dark alley, I don’t know what’s at stake!). You can use the website checker (both Symantec and McAfee have a security suite, and AVG also uses one for free antivirus software), but keep in mind that none is 100% guaranteed.
5) Here’s how to remove malicious pop-ups (Note-this only works if you haven’t clicked anything yet and the malware hasn’t infected your computer): CTRL and ALT buttons Press (hold down) and press the DEL (or DELETE) button once. For Windows XP and earlier, the task manager will start. For XP (quick logon is disabled), Vista or 7, click Start Task Manager. Make sure the Programs tab is highlighted. What do you guess by clicking all the Internet Explorer programs one by one and clicking Finish until the annoying pop-up disappears?
6) Some techniques recommend turning off your computer when you see such annoying pop-ups. For laptops, press and hold the power button for 5 seconds. However, one caveat to this method is that it is a hard shutdown, which can actually ruin your Windows installation and in some cases your hard drive. Therefore, I personally do not recommend this method except in serious emergencies. However, be aware of the possible consequences.
Other types of attacks used by malicious individuals to obtain personal information have nothing to do with installing software on your computer.
Phishing attacks can come from email or from malicious web pages disguised as genuine. A few years ago, millions of people were sent fake emails that appeared to come from stock brokers, banks, PayPal, or eBay. The email said the account was turned on by default, the password had expired, or otherwise threatened the user (this is known in the computer security world as social engineering). It was listed.
The user clicked on the link without considering the possibility of fraud and was free to enter all personal and banking information into the fraudulent web page. Needless to say, many have lost a lot of money by not thinking critically about what they are doing or by looking at the entire domain. Unless you enter the URL yourself or use a trusted favorite (also known as a bookmark), you always know the TRUE domain and do not provide any personal information.
If it comes to you, run away (or close the browser window). If you went to him, you probably knew what you were doing and where you were heading.
Another Security Risk on the Internet
Craigslist has been very popular for many years and works well for many people, but unfortunately it’s full of scammers! Here’s how scams usually work. You list something to sell on your website. You will receive an email from someone who is interested (usually scared to make a call!), Who is very interested in the product and wants to buy it immediately. Invisible sight (clear warning flag). They suggest sending you a cashier check that is much more expensive than MoneyGram or items.
They say you can keep something extra for your hassle, but they also tell you that the shipper picks up the item and ships it to the “new” owner. I want to pay a special amount to. A scam is to pay the hard earned money for shipping, lose an item, and the cashier’s check turns out to be fraudulent and activates. Wasn’t it a great day on the land of Craigslist?
Curiously, someone tried to trick me on Craigslist as well! After posting the advertisement for laptop repair, I had two people send me an email and I had to repair 11 laptops, and the laptop was currently in poor condition. They asked me to tell me my price, and they would send me a laptop. The scam was that I was paid counterfeit money and paid the “shipper” to send the computer. But I ran out of money, had no real computer to repair, and lost counterfeit money. go
Now, you’ll find a lot of information about what malware is, how it can get into your computer, why antivirus software can’t protect you from it, and how to stop it if it tries to get into your computer. I did. Do you do if you are still a little?
Search for symptoms on Google and find a web page that explains how to get rid of the infection. For example, if you come across a box that doesn’t go and it’s called a “safety device” by itself, search Google for that term. You don’t need to visit a paid tech site like Expert-exchange.com.
Note that sometimes you really have to get your hands dirty, and if you want to try it yourself, you’ll probably learn more about this removal material. And it’s a terrifying world.
But there are always options. You can hire an expert to help you-you can see the yellow page online, do an online search, or look at your local phone book. Choose one that is fair but not cheap-cheap always comes at a price you don’t want to pay.
Look for businesses that have been around for a while-ask them how long you are calling and how long they are doing this and the success rate. Your computer may be badly infected and really need to be cleaned. You also need to save the data. True professionals offer a flat rate for all of this. Don’t be afraid to ask-it’s part of what you’re paid for.
We hope you find this report useful. We also hope that it will help prevent your computer from being infected at least once or twice. We are not perfect. Even I had the “opportunity” to do damage control myself once or twice.