History and Background
The virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. Bugs and glitches could cause damage unintentionally, but a virus created havoc intentionally, and therefore often caused much more damage then just glitches in software. Technically a virus must be in a host file and spread manually by people, versus a worm which spreads by an automated process and doesn't require a host file, but we will include worms as part of the term virus. Therefore, the threat of viruses quickly multiplied expotentially. One computer infected by a virus is manageable, but a virus spreading uncontrollably and automatically can cause damage to sometimes entire populations. And with the introduction of the Internet, billions of computers worldwide could be accessed with a click of a button. These abilities are what made the virus probably the greatest security to personal computers in the 21st Century.
What kind of damage will it inflict?
Since up to 100 new viruses are discovered every minute by anti-virus industries worldwide, the damage they inflict varies considerably. Some will display an annoying popup. Some will swap your mouse buttons. Some will uninstall Internet Explorer. Some will delete all your personal files. And some, though rare, will slow down your computer fan to the point that your computer processor starts smoking. All have 1 thing in common - they reduce your productivity in some way and they inhibit you from comfortably using your PC. Therefore you must take several precautions to insure you do not to become infected with viruses. With just a few simple security measures, the chances of getting infected with a virus can be cut down by over 90%.
Security Measures
The most important step - Be careful of everything you do on the Internet! It is extremely rare for a computer to get infected by a virus if you only download and browse trustworthy sites and emails. If an email has an attachment and looks suspicious it is very likey to be a virus. If a site is providing illegal or inappropiate content, it should be considered a risk. These are basic rules of safe browsing of the Internet and unfortunately, most people only learn these rules after a disaster. Don't learn from experience! Don't let it happen in the first place. Keep your system up-to-date. Nearly every major virus threat to operating systems are patched soon after discovery. Visit your operating system update website often, which is www.windowsupdate.com for Windows users. Get a reliable antivirus solution. The most common is Norton Antivirus, but I personally do not like its unreliability and incompatibility with many PCs. On the otherhand, it is probably the most user friendly antivirus solution on the market, and is probably best for PC beginners. If you're looking for a free yet extremely reliable and easy-to-use antivirus solution, Avast may be your answer. I am currently running Avast and am very happy with it. I previously tried Norton Antivirus, Norton Client Security, NOD32 Antivirus and McAfee Antivirus, but each had their own individual problems and so I had to constantly change antivirus software until I finally reached Avast.
Some people go overboard and install many other security measures but I don't recommend this. These measures only hog resources, confuse users and cause conflicts with other software. Some of this software includes firewalls, memory explorers and file protection. References
www.wikipedia.org
us.mafee.com
www.netmom.com
www.pcworld.com
Links
Avast Antivirus - www.avast.com
Soroush King is a certified programmer, adept in VB, C++, Delphi, as well as web developer and scripter, having considerable knowledge of both PHP and Perl. He also owns and manages several professional websites.
This article was originally published at http://www.articlesandtools.com/adware.php For more information on computer security visit http://www.articlesandtools.com.
If you would like to use this article anywhere else, please just notify me by sending an email to kingofkings@gmail.com (you don't have to wait for a response, as this is just a notification, not permission). Please refer on the page that the author of the article was I, Soroush King, and also please note that the article was originally published at http://www.articlesandtools.com/adware.php by providing a link.
![]() |
|
![]() |
|
![]() |
|
![]() |
A couple of days ago, I was searching for a... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Imagine this ? you open up your email box and... Read More
There are folks out there who use their powers for... Read More
Phishing is the act of some individual sending an email... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Can you protect your computer from all possible viruses and... Read More
History and BackgroundThe virus was one of the first ever... Read More
As soon as almost all computer users already got used... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Have you ever bought a product or service from the... Read More
When surfing the Internet you probably take your anonymity for... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Imagine my surprise when I received a phone call from... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
If you use emails actively in your communication, you must... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
If you constantly deal with bank or electronic accounts, it... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
Whether we like it or not, we are all living... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
My first experience with a spyware BHO based infection was... Read More
Many of us have run into an annoying and time-consuming... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
When the Internet first came about, it was realized it... Read More
Have you ever had to call Symantec or McAfee to... Read More
The money being spent online is steadily growing. With billions... Read More
We all get the odd virus now and then, but... Read More
This is the second in a series of articles highlighting... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
This is the second in a series of articles highlighting... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Viruses are, however, not the only malicious software programs out... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Identity theft is one of the most common criminal acts... Read More
Well, if that would have been said to me by... Read More
We all know that it's dangerous to use the same... Read More
Millions of people make purchases online, but many people are... Read More
When surfing the Internet you probably take your anonymity for... Read More
Let us take the example of scrambling an egg. First,... Read More
Spyware protection software is the easiest way of removing spyware... Read More
Phishing is the act of some individual sending an email... Read More
A couple of years back, I paid my dues the... Read More
As you know, this time the virus under the name... Read More
By browsing a web page, you could infect your computer... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Identity theft rates one of the fastest growing crimes in... Read More
So called phishers try to catch the information about the... Read More
The Threat10 years ago you could probably have run no... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Have you ever had to call Symantec or McAfee to... Read More
You've seen it in the news - 40 million credit... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
You can detect spyware online using free spyware cleaners and... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Imagine my surprise when I received a phone call from... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Internet Security |