Now a days almost every one using computer and the major prblem is virus attack.
question is 1.from where these viruses come, 2.what is the harm of virus attack, and 3.how can we save our computer from virus attack?
1.from where these viruses come?
viruses mainly transfers from one system to other by usb drives and some from cd and over internet.
2.what is the harm of virus attack?
They slow downs pc, inturpt in between works, may delete some files, slower inter net connection, identity theft etc.
3.how can we save our computer from virus attack?
1. use an autorun remover antivirus(autorun remover v2.0 is best). this can easily remove autorun viruses.
2.use an updated antivirus.
If advanced user then may try point below.
3.in menu bar of computer there is a option called tool>folder option>view> check show hidden files and folsers> uncheck hide extensions for know file type>uncheck hide protected operating system files.
Note: use point 3. if you can recognise system files. else dont follow step 3. so, if u can recognise system files then apply step 3 in your usb drive. there u can delete virus which are hidden(dont delete any system file).
IMPORTANT POINTS EVERYBODY SHOULD KNOW.
1.viruses are stay always in hidden form
2.they are mainly of .exe files.
3.autorun virus are mainly vbs type files.
4.dont open your usb drive by double click or rightclick>open or explor. alway open by typing drive name then colon then enter. ex: h: hit enter. this technique will not spread virus to your computer if there is some virus in usb drive(except autorun virus).
Every time we come across a new website or URL we often hesitate to open that page because of the fear that it may invite problems.The problem or threat can range from getting a virus,a malware or even landing in phishing website(a fake website made like an original one to hack important information).So we generally drop the idea of going to that website.At such moments we wish for some advise...well now McAfee has come out with a solution..and your wish is granted!!
All you have to do is
1.Copy the webaddress or remember it
2.go to www.siteadvisor.com
3.Paste the url or webaddress in the text box "View a site report" and press Enter
DONE...It will show the report on the website.Also you can read reviews about the website.Almost all the popular websites are tested by it.
But again one more wish..i cant go to this site everytime i want to check.is there an easy way?
YES..All you need to do is download a plugin. from the same site
http://www.siteadvisor.com/download/windows.html "download siteadvisor software"
Install it
Next time you open your browser a McAfee plugin safety rating logo will appear in the browser*
Whenever you put a webaddress in the address bar of the browser the safety rating logo will turn GREEN if the site is safe or RED if the site have threat and YELLOW if threat is medium.Also if you are about to enter a site with red McAfee signal.then McAfee will ask your permission before proceeding!!So you wont just jump into that danger.
One more amazing thing about the plugin is that whenever you search,say google search..the links that appear in the search result will be marked automatically by siteadvisor that you can know the site report before clicking then and there itself..Now how that sounds!!!
*SITEADVISOR PLUGIN WILL WORK ONLY WITH INTERNET EXPLORER (WINDOWS) AND FIREFOX (WINDOWS AND MAC)
Other features are
PHISHING PROTECTION (just like a threat it will warn you about phishing site)
RISKY SITE BLOCKING
SAFER SHOPPING
So altogether the site advisor will make your web surfing completely safe..to read more http://www.siteadvisor.com/howitworks/index.html
Introduction
Like a world, Internet is also not a perfectly safe place. There is an every possibilities and chances that the computer or network system may be effected by a virus.
What is computer virus?
Viruses are malicious programs that invade the computer. These programs are self executable programs to spread from one computer to another computer network. They can damage the computer in many different ways, like, deleting data files, erasing programs, or destroying everything they find on the hard disk. Not every virus causes damage, some simply flashing the messages.
First computer virus was written by BOB THOMAS in 1971, known as Creeper virus & written as a self-replicating programme. It is used in ARPANET to infect DEC PDP-10 computers, running TENEX operating system. To delete Creeper the Reaper programme was written. In 1981, Richard Skrenta written a programme name,” Rother J” and it is spread via floppy disk & effected to the Apple DOS 3.3 operating system. The first PC boot sector virus was created by Farooq Alvi Brothers of Lahore in 1986.
In early days of the personal computing, viruses spread mainly through removable medium, like floppy disks. Now a day’s computer viruses spread from the Internet by downloading files to the computer, but this is not the only place that virus attack, if you have sent email or received some email attachment, like images, greeting cards, audio & video or from company’s internal network, virus can spread into the computer. Virus can be spread in to your computer from shrink-wrapped or cracked software or file downloads from Internet.
Traditional virus attach themselves to programme or data files, infect the computer, replicate on the hard disk, and then damage data, hard disk or files. Following are critical areas where virus usually attacks:
• Executable programme files,
• System’s file directory areas that locate the traces of all computer files,
• Boot & system area that is needed to start computer, and
• Data Files,
Some popular form of viruses
• Boot Sector Virus: It replaces the computer’s main boot programme that is in the first sector of every disk with a modified version of the original boot programme that loads the virus into the memory.
• Macro Virus: This attaches them to word or excels for windows macros inside a word or excels from windows data file and is launched whenever a particular macro is run.
• Stealth Virus: In computer terms it is an one type of file virus. It uses a certain or some special techniques to hide its presence from antivirus software by either masking the size of the file or temporarily remove himself from he infected file & make a copy of itself in the location of the drive, replacing the infected file with a good one which is stored in the hard drive. To counter this virus modern antivirus software employs various techniques. To avoid stealth virus, the most reliable method is to boot computer from a clean medium.
• Polymorphic Virus: This computer virus changes its binary pattern or signature every time when it replicates and infects a new file, due to this antivirus programme cannot detect this virus. It is very difficult to detect just using signature. It may be detect by decrypting the virus using an emulator or analysis of the statistical pattern of the virus body.
• Metamorphic Virus: Polymorphic may be detected by emulation, to avoid detection some viruses rewrite himself completely every time they infect new executable files. This technique is called metamorphism. Metamorphic virus required metamorphic engine & it is very large & complex, written mainly by assembly language.
• Time Bomb: It is a computer virus that begins when detects some certain condition. It is actually some programming codes inserted into a software system that will triggered when predefined conditions are met.
Trojan horse, Worm & Blended Threats
• Trojan horses: It disguises them as normal, helpful programme, but in fact are virus. For example, programme looks like a financial calculator or games, but really deleted every files from the hard disk. It is not replicate them automatically. The term Trojan horse is derived from Greek mythology. Trojan can be installed through the following ways,
v Software downloads,
v Executable content,
v Application Exploits (Media Player, messaging client),
• Worms: It is a programme, design to infect networks such as Internet. It travels from network computer to network computer & replicating themselves along the way. It is considered to be a sub class of virus. It has a capability to travel without any human action. Biggest danger is that computer sending out a single worm but it actually sending out hundreds or thousands of copies of itself, creating a huge devastating affect.
• Blended Threat: A blended threat is a sophisticated attack combination of worms, Trojan, viruses, & malicious code into one single threat. Blended Threats are deigned to use multiple mode of Transport. It can modify the exe. files, HTML files, and registry keys at the same time; basically at one time they cause damage within several areas of the network. It is considered to be a worst attack to security, as most threats also requires no human intervention to propagate.
Rootkits
It is most commonly a collection of tools that an attacker installs in an effected computer. They are available for any operating system and architecture today. It is an one type of malicious software began each time the system boots up. It is very difficult to detect because it is began before the system’s Operating system has completely booted up.
Malware
Malicious software designed specifically to damage or disrupts a computer system, like as a virus or Trojan.
Symptoms of Virus Infection
• Unexpected reboots of the computer,
• Computer slows down suddenly,
• Facing problems to save the file & sometimes files disappear mysteriously,
• Computer displays unusual message,
• Exc. Files increase their size,
• Unusual visual or sound affects developing,
How to protect a computer from Virus
The first step in protecting the computer from malicious threat, that the computer operating system must be up to date. It is essential if operating system is Microsoft Windows. Secondly, antivirus software must be installed in the system & it must be up to date. It is very important to download the update frequently so that software has the latest fixes for new viruses, worms & Trojan. Periodical disk scans are essentially required. Additionally you must install a firewall also.
What is Firewall?
It is a system that protects computer from unauthorized use & access of the computer & it may be either software or hardware. Hardware firewalls provide a strong protection from most forms of malicious attack coming from the outside. It can be purchased along with broadband routers or as a stand alone product, but unfortunately it may be less effective when battling with viruses, worms & Trojans than a software firewall because hardware firewall possibly ignore embedded worms in out going emails as the firewall see this a regular network traffic.
Software firewall is most popular between the individual home users. A good software firewall will protect the computer from outside attack & provide additional protection against the most common Trojan Programme or email worms.
How to begin windows inbuilt firewall?
• OS must be windows XP or Vista,
• Must be ensure that the software is up to date & firewall installed,
• Click control panel icon & click Security Centre icon,
• Firewall is set on,
• Click on the firewall settings to edit certain firewall preferences,
And finally avoid downloads files & programme from a questionable website and emails. This files & programme may contain Malware that damage the computer & network system.
I am including two YouTube video just for reference how virus is working,
http://www.youtube.com/watch?v=aCMtX17CiKw
http://www.youtube.com/watch?v=0BuApI5r0oA
My blog is http://bosemoney.blogspot.com. I invited every reader to post comment about new & latest fact findings of computer virus.
Hi,
Add password in the folder simply i will tell you how to add password in the folder with out any software
Please follow the intructions
1.Righ clik on the folder (Which you want to add password)
2.Send it on compressed (Zipped ) Folder.
3.When it ask then Click YES
3.Open Zipped folder
4.Right Click on blank space
5. Click Add a Password........
Add your password and click OK
(Password will be added)
Now open it again
It will ask for password
When you will give password it will be open.
Thank you
Image Source: gosecure2009
In many websites when you register you might have seen a bar showing how strong your password is, have you? Why is it important to create a strong password and how to create one? If you believe that only hackers are looking for a way to hack your password, please change your opinion. Do you know who else is looking for such sensitive information? Many hackers disguise themselves as good people sign up with various social networking sites and will start making friends. Slowly, they will analyze your interests, hobbies, like and dislikes, etc., get the clue for hacking your password and will hack your account.
You must have now understood who are looking for your passwords. Now, it is time to create strong passwords. Here’s how you create a strong password:
1. Don’t keep a password that is somehow related to your personal life like your birthday, wedding day, your boy friend or girl friends’ name, etc.
2. Keep separate passwords for personal e-mails and financial accounts. It would be nice if you can keep unique passwords for each of your financial account, if you have more than one.
3. Use symbols instead of letters. For example, use @ for “a”, $ for “S”, ! for “l” and much more.
Image Source: cio
4. Ensure your password is minimum 8 characters long. Use a combination of numbers, lowercase and uppercase and special characters.
5. Take the first letter of each word from a phrase. For example, this article is about “How to create strong passwords,” you may choose a password as htcsp. All you have to do is remember the phrase.
6. Do you love any song or rhymes? Just keep the first line as your password. If you like the rhyme “Baa Baa black sheep” then keep this itself as your password.
7. Substitute numbers in place of letters. For example, htcsp can be written as 11j3s16 by taking a=1, b=2, c=3 and so on.
8. Think of things you would keep near your computer. I have a modem near my system and therefore used the model number of my modem as my password. Am I not smart?
9. Mix up lower and upper case letters. htcsp can be written as HtCsP or hTcSp.
10.Think out of the box. Do you love eating bread? Is your favorite watch is titan, you can set the password by combing these both; that is breadtitan.
Image Source: softpedia
With these password tips, make your password secure and give a tough time to hackers.
More Articles …
Page 16 of 24