Showing posts with label virus. Show all posts
Showing posts with label virus. Show all posts

What Is Exactly Computer Virus

http://johnplayerstricksandtips.blogspot.com
Friends ,Before you begin the battle against these kinds of computer viruses it's recommended that you get to know your enemy first . If you can understand your enemy you can then beat him .
Viruses feat neatly into the malicious software type of computer software - malware is just a small type of malicious software program .
It's always funny to watch many Hollywood hacker picture and to see a virus on a pc monitor with a laughing skull or a voice message about how you've just been hacked . That's so much crap ! Real viruses - the really good ones - stay hidden . The arrive in e-mail attachments or hidden other programs and they stay hidden until it's time to attack . Computer viruses are very much like human viruses - they need someplace to live first and reproduce and then they appear when the time is right .
Once the virus is activated and has spread around your computer system then the damage phase will begin . Most viruses are written to activate on a specific trigger - a time , date or once the virus has infected x number of files . Once the trigger point is reached the virus then delivers its payload to your system.
 This might be just annoying messages or it might trash your entire operating system and leave you staring at a blank screen . Once you've had this happen to you once it never happens again believe me .
Worms are another "type" of computer virus but they're just a little bit different . A worm is able to reproduce itself and move around networks without using other programs or software as hosts .
Worms are usually more damaging to networks of computers than to individual computers . Because they self-reproduce they can cause damage by overloading network resources . This overload can cause slowdowns on the network by taking up a lot of bandwidth on the network itself . Like viruses , worms are sometimes designed to carry a payload . This is done by using a 'backdoor' on the target system .
Back in the day computer viruses were spread mostly on floppy disks and this was bad enough . Then the Internet arrived and proved to be massively popular with everyone ( how wrong could Bill Gates be ? ) and viruses started spreading even more quickly by e-mail and downloaded files . A virus that used to take weeks or months to travel around the world was now able to infect computers all over the

Most Alarming Virus Threats Of This Year

http://johnplayerstricksandtips.blogspot.com
Friends,has your pc been performing slow rather than usual ? Then it's quite likely that your computer has been compromised by a virus . And the only option to protect it from further complications is by installing the best antivirus program . However , before you can remove the threats from your system , it's important to have proper knowledge of various threats that can destroy the compatibility of your system . Since the internet is now being dominated by hackers , they steal the entire information and disrupt the compatibility of your system .

Cyber security is no longer related to protecting your system from various devices but other things that matter . Here is the list of various threats harmful for your system :

Root kits-The threat can be easily hidden in your system and thus can avoid getting detected while running the utilities . Root kits help you create a back-door for target computers and thus help hackers to send you spam mails . Antivirus program scan very well protect your system from threats and perform denial on service attack on server . It's really tricky to conceal its presence thus virus detection comes into consideration .

Internet worms-This is a difficult to deal with the program as it can badly affect your computer on the same network . The threat works differently as it doesn't require being attached to different programs and can be harmful in many cases . It creates an exact copy and spreads it through network and bandwidth easily . So in case you find your system being slow it might be the worm that is affecting your server increasingly .

Email Virus-It can very well dispense itself by utilizing email as attachments . Whenever an attachment is launched the virus instantly targets computer to send various threats of the attachment .

Browser Hijacker-It can change the browser home page or the search engine of your system . In worse case sit can very well disable the internet option and can really change the home page to default . The hackers then register so that it can be run every time the page is restarted .

Mouse trapping-The website uses some sort of script to prevent the user from leaving the website . It opens a new browser and provides display on the website . It can prevent the data as the java disables it completely .

Phishing-This is the most common virus threat faced by everyone online . Phishing is a threatening as it helps protect private information that uses bogus mails and websites .

Be informed of various threats available online and take proper initiatives by installing the best antivirus softwares online .

Protect your computer with best cloud antivirus protection . Numbers of websites available on the Internet that offers anti-virus free download service.

How A System Infected By The Malware,Trojans,Virus

Well,It's strongly suggested you have some way of anti-virus and malware protection on your computer to help secure you from malware and other microbe infections. Because malware plans are increasing, modifying into more challenging and difficult to identify types. You need a secure to immunity your PC type these destructive plan.install a good anti malware software.
When getting some application from the Internet, you may obtain some plans that contain trojans and other malware. So make sure you're getting the application from a trusted resource and check it with your anti-virus application before start and set up it. Some protection locations are suggested.
When you obtain complex popular music, films, application for free from any internet sites, you may quickly get influenced for many of the information can contain trojans, malware or destructive application.
At last very typical way we become contaminated with trojans and other malware is by beginning e-mail emotions. Sometimes, these e-mails are sent by a buddy,family associate, so you cure it gently. However, E-mail deals with can be quickly faked, what's more intense, even if they are not faked, your associate may unsuspectingly be sending you an contaminated submit if they get contaminated by some trojans.
So be careful from these activities.

How To Protect USB Drive From Virus

Have you attached a USB port to a computer and later discovered that the disk is infected with a virus? I certainly faced this situation several times. If you plug your USB drive to the infected computer the virus is transferred to the player in a short time to infect all important documents in the USB drive too, depending on the type of virus that you can lose important data from the USB drive and never give them back. But there is a solution to protect your USB drive against viral infections when plugged computer.If already infected you make your USB drive mode is not writable, the data can not be written, which means that if a computer infected with viruses are transmitted the virus to run, it will not be able to because the USB drive is write protected.

thumbScrew

download it from HERE
Thumbscrew a freeware program that allows you to write protect your USB drive, so viruses, malware, Trojans or any other type of infection of the host computer would not be able to write something on your USB. usbNow right-click the System icon tries andchoose Makes USB read-only. This would make the USB drive write-protected, making it completely protected from infection to spread on your disk.