Information systems

  • Beranda
  • Blogging
    • Template
    • Blogging
  • Downloads
    • Software
    • Game
  • Blogging
  • Template
  • SSH Gratis
Home → Semua Post

what is a virus computer

Add Comment
01.53
What Is A Computer Virus, Anyway?


Combating infections and removing viruses is now big business. Lesson one is 'knowing the enemy'.

THE ENEMY - Crackers and Hackers

Geeks make a distinction between crackers, who break into systems to do damage, and hackers who enjoy taking programs apart just to see how they tick. We'll stick with the more common, though less accurate, term of hacker. (The term 'hacker' originally meant 'someone who makes furniture' with an axe. Crude, but effective - like most computer viruses.)

Viruses are actually a particular type of computer 'malware' - a general term covering all types of malicious software. The most common types are viruses, worms and Trojan horses.

VIRUSES

A virus is usually hidden inside another program such as an installation program delivered via e-mail attachment. (Biological viruses require a host organism to live and reproduce, hence the name.) When the 'host' program is run, the virus program also runs. Once it's in memory the virus is able to do its dirty work, which usually includes infecting other programs.

After the infection stage of the virus, there's a destructive stage. The virus waits for a pre-determined trigger (such as a specific date or a certain number of times the virus has replicated itself) before delivering its 'payload'. Payloads range from simple messages to file deletion commands to destruction of the core operating system.

When first developed, computer viruses were commonly distributed on floppy disks. With the growth of the Internet downloaded files and e-mail are the preferred delivery mechanisms. E-mail can contain attachments which can be any kind of computer file. Any executable file can be infected with a virus, and shouldn't be run unless you're confident they're virus free. 

WORMS

Worms are similar to viruses in that they're self-replicating. They reproduce themselves across networks without human assistance, such as e-mail sending. A worm, though, doesn't need another executable program to be distributed.

Worms usually affect networks more than individual computers on the network. Their self-replicating behavior can overload network resources, causing slowdowns in data transmission by consuming massive bandwidth normally used to forward normal traffic. Network systems that route Internet traffic are just specialized computer hardware and software. They, too, can be affected by malware.

Worms can also be designed to carry a payload, using a 'backdoor' installation program. A backdoor is a hidden access point to a computer that bypasses the normal login procedure. They're commonly used by spammers to distribute junk e-mail, for example.

TROJAN HORSES

Trojan horses are the third common type of malware. A 'trojan' is a program that pretends to do one thing but actually does something different. (The term comes from the story of the Greeks who built a large wooden horse in which to hide. Their enemies, the Trojans persuaded they'd receive a gift, took the horse inside their compound giving the Greeks easy access to wreak havoc.) Unlike viruses or worms, a Trojan doesn't replicate itself.

Trojans may be hidden in otherwise useful software. Once started they can do almost anything including erasing data, corrupting files, installing backdoors and logging keystrokes so that hackers can steal information such as credit card numbers and passwords.

FIGHTING MALWARE

Elsewhere in the series, we'll discuss what is and can be done to combat the spread of malware. In the interim, just remember not to be passive and expect the problem to be solved by others. Fighting viruses requires active participation from vendors, webmasters AND users.

control spyware infection

Add Comment
01.49
Control Spyware Infection Or You'll Be Sorry Later


A spyware is a malware that monitors the activities on the computer it is illegally installed in without the knowledge of the computer user. The information is sent back to its creator. Examples of information it collects are passwords and credit card numbers. 

Some spyware programs are designed to monitor the user's surfing habits, like what websites are often visited by the user and the software used as well as other personal information that the user might consider confidential. Some spyware functions as keyloggers and records keyed in passwords. 

The illegally-gotten information through spyware gives the creator a lot of benefits. One of the benefits is a wide database of supposed to be opt in list, a prized asset of internet marketers. Passwords give them access to big amounts of money from e-currency accounts. 

Signs Of Spyware On Your Computer

How does a computer user know that there is spyware lurking around, collecting confidential information? What are the sighs to watch out for? Here are some of the strange behaviors of a computer with spyware: 

1. The home page changes on its own

2. Strange toolbars that you haven't installed appear on the desktop. 

3. More pop ups even inspite of a pop up blocker. 

4. Sudden computer crash

5. Navigating difficulties.



How To Control Spyware Infection

You suspect , based on the computer's strange behavior that there is spyware on the computer. What should be the next course of action? Well, luckily, there is free software available to check and detect if any spyware is present. 

If there is indeed a spyware, there are also available tools to remove the spyware. To prevent or lessen spyware infection, here are some tips:

1. Have the necessary anti-malware tools installed. There are really effective tools available online for free which could provide protection if checking is religiously performed.

2. Be careful in downloading unverified programs or software and other freebies. Usually, there is a spyware hiding somewhere. 

3. Check the programs running in your system. Check the systems tray regularly. 

4. Ask for advice from the experts on the subject. There are many forums where members are generous in giving advice to those who need it. 

The best way to protect the computer from spyware is to prevent its entry into the computer. It is a must that the computer user educates himself or herself to know how to use the needed tools. Protection is the best way to prevent these malwares from creating trouble.

the best password

Add Comment
01.44
Choose The Best Password: The Key To Your Account


The password for the various protected internet/computer accounts is a set of characters, in a specific sequence and case sensitive. Together with the unique user name or ID, the password confirms that the user or person trying to access the account is the real one. The user name or ID is normally displayed or shown in the log in box or in the pages of the account but the password is supposed to be known only to the account user or owner and the system that runs the account. 

The minimum and maximum number of characters in a password depends also on the system set and it normally consists of letters in upper or lower cases, numbers and other characters. 
As the password is entered, it appears only as asterisks in the space provided so that its secrecy is maintained. 

The internet has really changed the ways things are done. Very important and secure transactions, like payments for purchases, banking as well as safekeeping and transfer of sensitive documents and other files are processed online. With the increase in online transactions, so are the number of cyber thieves who have developed techniques to crack the passwords. Most of the time, the account owner is to blame because the password isn't strong enough to ward off 'hackers" trying to break it. 

Choosing The Best Password

How do you choose the best password that is strong enough to withstand any attempts to access the account? Here are some tips in creating passwords: 

1. Don't use a password that is in the dictionary, even the foreign ones. There are password cracking software to determine the exact word in seconds. 

2. Don't use passwords that are associated to you like your maiden name, place of birth, Social Security number, children's names, phone numbers. Mix upper and lower case letters with numbers and other symbols allowed by the system like "miG67Ped." This would take a long time to guess and the "hacker" will most likely just leave and go to the next target. However, the account owner should make sure there is a way to remember the password. One way is to associate the words and numbers with easy-to-remember words, dates or names. The password could also be saved on a CD or USB and copied to the log in form. Keep any password record offline.

3. Don't use a password that is used on your other accounts.

4. Don't use commonly used passwords like " 12345678"

5. Use a password generating and auto-filling software. This will solve the problem of keyloggers taking note while the password is being entered and the problem of forgotten passwords. 

The password is like the secret key to a secured internet/computer account. Make sure it can really secure the account.

How To Block Pop-Up In Your PC

Add Comment
01.41
How To Block Pop-Up Ads In Your PC



Numerous online marketers and companies are aiming to maximize the use of the Internet. Because most consumers are getting online nowadays, various businesses are targeting catching the attention of prospective clients. Thus, as a sign of desperation, those marketers are launching pop-up advertisements.

Pop-up ads are very rampant and common. There are always pop-up ads appearing on your computer screen. Often, those unimportant and insignificant ads are annoying because they are hampering and blocking your computer usage. Here are some measures that will help you prevent or block pop-up ads.

- There are numerous pop-up ads blockers that can easily and conveniently be downloaded online. Basically, you should install any one of those blocking programs and run them so that on your next Internet log on, you will be spared form the hassles of pop-up ads. Most pop-up ads blockers are offered to the market for free from giant search engines like Google and Yahoo.

- If you are using Microsoft Corporation's popular Windows XP and Windows 2000, you can effectively block pop-up ads by installing on your personal computer Windows XP's Firewall or by updating into Windows XP SP2. Doing so will automatically block messenger service and messenger spam, which almost always constitutes pop-up ads.

- Download an anti-virus software that will at the same time function to detect and block different forms of pop-up ads arising from Spyware and Ad-ware. Such anti-virus programs aren't just helpful in keeping you protected from software virus. They are also effective in blocking pop-up ads that are most likely coming up with embedded viruses.

- Refrain from connecting to the online media without first running your firewall and your reliable anti-virus software. If you have installed a pop-up blocker, it will automatically function upon logging in to the Internet.

- Don't frequent websites that are known to spread and disseminate unnecessary pop-up ads. Usually, porn sites facilitate wide circulation of such ads. 

Overall, pop-up ads can be prevented by being vigilant and by being cautious when checking out different Websites. If you can help it, try to block and prevent such online ads from appearing on your PC screen. Pop-up ads not only disturb you from your online task; they also pose security and virus threats to your PC.

How To Protect Yourself

Add Comment
01.38
How To Protect Yourself From Phishing On The Internet



The Internet is regarded as the best place to do everything such as finding entertainment, shopping, or research, there's still the danger of anonymity. You may find yourself in another persons shoes, literally.

One example of the evils of the Internet is Phishing, which is a criminal method of obtaining your most personal information for the benefit of the evildoers. Some of their methods are stealing your password, credit card details, or even your identity.

It's easy to avoid being victimized by phishing. Here are some helpful advice on protecting yourself from these criminal activities.

Don't Give Your Personal Information To Anyone.

This is the most basic guide in avoiding phishing. This mostly applies to e-mail, private messages on bulletin boards/social networks or chatting with your online friends. They have identity thefts in social networking sites in which the criminal took advantage of the identity to obtain sensitive or personal information from other people.

If an e-mail message asks you to give your name, e-mail, password, credit card number, address, never reply to it, even if it seems like it's important. It might be one step to identity theft. So never, ever, give your personal information to anyone.

Create Strong Passwords

Simple phishing is to crack passwords of accounts. The easier the password you have on your account, the easier it will be cracked. A combination of numbers and letters is the ideal password for those who want their accounts to be protected.

Use Secure Online Payment Services

In shopping online, you have to determine if the payment service is secure. This is easy since you can research about how secure the payment service is on search engines or from friends. Remember that you will give your credit card number and other valuable information so it's better to have some background knowledge than none at all.

Avoiding Fake Websites

Web browsers such as Mozilla Firefox, Opera, and Internet Explorer have anti-phishing measures which detect fake websites. These fake websites could lure you into giving them your personal information and use them against you or for their own benefit. Some fake websites require you to which automatically give them your username and password. Double check if the URL is correct just to be sure you're in the right place.

Killing The Spam e-Mails

In most e-mails, there is a spam filter which automatically sends your spam in a different folder to be dealt with later. Spam e-mails are very dangerous and should be deleted immediately. The usual indication of spam is that it entices you to look inside with the subject and is usually from a person you don't know.

The Internet isn't the safest place in the world, even if you think you've covered all the bases. As long as you're lurking in there, the possibilities of crime are endless. So the key is just to be very careful.

How To Avoid Keyloggers

Add Comment
01.29
When It Pays To Be Paranoid: How To Avoid Keyloggers From Being Installed In Your Computer

Sometimes, real life is better than computer life. In the real world, you can refuse to pick up a hitchhiker. With computers, it's another story. Malicious software and spyware have an uncanny ability to hitch a ride on your computers without your consent. Here's how to avoid these keyloggers from being installed:

Use A Program To Fight A Program.

You can avoid getting keyloggers installed on your computer by installing anti-keylogger software. These are software that can effectively detect, locate and remove keyloggers once they are installed. Some anti-keylogger software can even provide you with certain information about the keylogger, such as the date it was installed on your computer. In case of future encounters with keyloggers, these programs will also prevent any infiltration.

Most computer experts recommend that you use more than one anti-spyware programs. Use at least two to man the gates, so to speak and another two to help you scan for invaders later.

Give It The Boot.

Sometimes you will have to manually uninstall a spyware program. Often, it will try to bargain with you and persuade you not to delete it, showing a message saying that it's not a threat or a danger and that you will no longer enjoy its benefits. Don't be intimidated. Delete it immediately because it will drag your computer down and threaten your security and privacy.

Some keyloggers, especially commercial types, can operate using stealth mode. If you want to bring them out of hiding, learn their keystroke sequence. These are keys you'll need to press simultaneously to reveal the keylogger. Pressing Crtl-Alt-X, for example, will summon XPCSpy. Go to the PestPatrol webpage to see other keystroke sequences of most keyloggers.

Protect And Complain.

Use the log-on restriction on your operating system to keep others from installing keyloggers. Allow access only through a password. If you can't uninstall the program, try asking the manufacturer (if commercial) to help you. Some manufacturers will allow this, especially if the keylogger was installed on your computer without your permission.

Ask your spouse, parent, significant other, etc. not to install a keylogger on your computer.
Yes, a keylogger program can be easily and legally installed. Parents, employers and spouses can do that to you. If you don't want it and have a legitimate reason to have it uninstalled (like your right to privacy), keep that keylogger away from your computer.

Being vigilant and a little paranoid can go a long way to avoid keyloggers from being installed in your computer. Remember that with computers, forewarned is always forearmed.

How To Keep Your PC Healthy

Add Comment
01.23
How To Keep Your PC Healthy By Avoiding Viruses


The toughest to fight in any computer is a virus that has already gotten into your system, snooped into your files and multiplied to the point that it hogs your hard disk space and slowly eats at your system. Let's admit it, we're scared of these viruses and we want to get rid of them. Here are very useful tips for protecting your PC:


Making Use Of The Firewall

Windows operating system has the firewall for a reason. For those who are connected to the Internet 24/7, the firewall is the basic way to protect your PC. Check if your firewall is on by going to the control panel of your Windows PC. Firewalls keeps your computer away from malicious software (malware), worms, and Trojan viruses. Also, it prevents other people from snooping in your files and applications. 

You can also download firewall software off the net if you want more protection for your system, but the basic firewalls work.

Download A Trusty Antivirus Software

These days, when you have no antivirus software, your PC is vulnerable to virus attacks, especially when inserting your friends flash disks in your USB ports. There are already a variety of viruses sticking themselves to flash disks then automatically transferring it to the PC. 

It would be really helpful to have an antivirus which is regularly updated off the internet. It's also good to always have it active all the time to detect virus in real time. 

Check If Your Windows Operating System Is Getting Updates

Never ignore the Windows update bubble popping out of the lower right part of your screen. Your Windows operating system will be fully protected by downloading updates. These updates often include anti-malware updates or improvement for different Windows utilities to avoid vulnerabilities in the system. 

Though most of the time, Windows automatically downloads updates and let you install them manually or automatically when you shut down your system.

Being Wary Of Suspicious E-Mails And Various Zipped Files

Don't open everything in your inbox. This is almost common knowledge, however, sometimes; curiosity gets the better of us. Inspect the sender and the subject before opening an e-mail and downloading anything off the attachments. Some of the most deadly virus hides in e-mails. 

Lastly, if you download files from limewire, for example, be very careful on downloading zipped files. Check if the file is described in the right size and it looks trustworthy enough before downloading it.

The Bottom Line

Being careful and doing the right things will help your PC avoid getting viruses. In the end, it's not up to the PC to do the work, but it's up to the user to configure and protect the PC himself; which is the best way.
Postingan Lebih Baru
Postingan Lama
Beranda
Langganan: Postingan (Atom)
  • Beranda
  • Sitemap
  • cara aktivasi windows vista

Translate

gampang banget cari duit disini Buruan... Daftar!!!

Entri Populer

  • get the rank these day
  • How To Password-Protect Documents
  • building adsense website
  • cara agar skripsi tugas akhir tidak ditolak sama dosen
  • safe mode fixer
  • Free SEO keyword analyzer tool
  • Cara Bikin Background Di Flash Disk
  • manual car repair
  • Windows 7 Start Button Changer 2.6
  • my computer is attack

Label

  • android (2)
  • Bengkel Windows (24)
  • Cari dolar tanpa modal (1)
  • Cari duit di blog (17)
  • Free Seo (20)
  • GPS (17)
  • Information (18)
  • Lowongan Kerja (11)
  • obat (2)
  • Smartfren Tips Trik (12)
  • Software (52)
  • Tips And Trick (43)

Arsip Blog

  • ▼  2014 (1)
    • ▼  Oktober (1)
      • cara mendapatkan pulsa gratis
  • ►  2013 (13)
    • ►  Mei (1)
    • ►  April (1)
    • ►  Maret (5)
    • ►  Februari (6)
  • ►  2012 (66)
    • ►  November (1)
    • ►  Juli (2)
    • ►  Juni (27)
    • ►  Mei (15)
    • ►  April (6)
    • ►  Maret (7)
    • ►  Februari (3)
    • ►  Januari (5)
  • ►  2011 (215)
    • ►  Desember (47)
    • ►  November (23)
    • ►  Oktober (2)
    • ►  September (2)
    • ►  Agustus (28)
    • ►  Juli (55)
    • ►  Juni (13)
    • ►  Mei (16)
    • ►  April (2)
    • ►  Maret (2)
    • ►  Februari (18)
    • ►  Januari (7)
  • ►  2010 (54)
    • ►  Desember (19)
    • ►  November (15)
    • ►  Juni (8)
    • ►  April (2)
    • ►  Februari (5)
    • ►  Januari (5)
  • ►  2009 (10)
    • ►  November (10)

Tags

Copyright 2014 Information systems
Template By Ridwan Hex And Game Gratis