Monday, March 2, 2015

#27 How to Avoid Getting a Computer Virus or Worm

Hi,
Friend's today I am going to show you how to avoid getting a computer virus or worm.


The internet is an integral part of our lives, and many of us use it constantly throughout the day. But that connectedness has increased the risk of infection by viruses and malware, leading to potential data loss and identity theft. Every internet user should be versed in how to prevent virus infection and what to look for. Think of it as a driver's manual for the internet superhighway. Armed with the knowledge to avoid getting and spreading virus infections, you'll not only make the internet safer for yourself, but for everyone else you connect with.




Method 1: Browsing Safely


Step 1:

Avoid clicking on everything. There are thousands of banner ads and popups on the internet that are designed to get your attention and make you click. Due to the way most modern browsers work, there are very few ways for you to get infected with something online UNLESS you click on it yourself. This means you should avoid clicking on the banners for offers that are too good to be true.

  • Make sure your browser is configured to always ask before running files and downloading automatically. If you have to confirm everything, you are much less likely to get infected.
 



Step 2:

Beware of misleading popups. Some of the most nefarious popups on the internet are designed to mimic the look of legitimate anti-virus software. These popups attempt to trick the user into thinking their antivirus software has found an infection. When you click the popup, however, the adware is actually installed.

  • Instead of clicking the warning, close the popup window and open the antivirus program on your computer. You most likely will not see any warnings. If you are still worried, run a scan using your installed software.
 
  •  Don't try clicking the "X" to close the popup window, as this will usually lead to more popups. Instead, use the Task Manager to get rid of it. Alternatively, you can install Adblock plus to prevent ads appearing in the first place.
 
  • Other popups may warn of an infection that only their software can fix. No legitimate antivirus company will advertise their product this way, so avoid clicking on any of these popups.
 
  • Check to ensure that your browser is configured to block popups.




Step 3:

Clear your cache. Popups can store information in your browser's cache, leading to them reappearing constantly. To help prevent this, clear your browser’s cache regularly.



Step 4:

Consider a different browser. If you are using Internet Explorer or an older browser such as Netscape or Safari for Windows, you may be leaving yourself exposed to security risks. Browsers such as Firefox, Chrome, and Opera are much more secure than older browsers, and more customizable. Firefox, for example, has a large array of privacy- and security-related add-ons that will help protect you online.

  • If you don't want to switch browsers, make sure that it is always up to date to help prevent unauthorized attacks.




Step 5:

Don't go where you're not supposed to. As viruses are illegal, they thrive on other illegal sites. Avoid sites that let you download copyrighted content or other illegal communities. File sharing is a quick way to get infected files. You will find that your computer is much less prone to infection if you avoid things you shouldn't be doing.

  • Besides viruses from files you download, many of these sites will have a litany of annoying popups and misleading advertisements. All of these could lead to virus and spyware infection.





Method 2: Handling Downloaded Files


Step 1: 

Be selective with your downloads. There are programs available for nearly every task you can think of, but ask yourself if you really need the program that you are about to download. Do a little research about your task; you may find that you already have a program capable of what you want to do. Downloading extra programs for every task you want to complete increases the likelihood that you'll download something malicious. 



Step 2:

Download from trusted locations only. If you are downloading a program or other piece of software, it is always advisable to try to download it from the developer's site as opposed to a download service. Many of these services, installs their own download managers, and can infect your browser with adware.

  • Downloading illegal files will always be a lottery when it comes to getting viruses and worms. If you can, download from "trusted" sources in the community to reduce the risk of infection.



Step 3: 

Look at the extension. Mischievous files often have fake extensions designed to trick you, such as ". txt. vb" or ". jpg.exe". Windows will often hide common file extensions to make browsing through your files and programs more visually appealing. Double extensions exploit this by hiding the second, dangerous extension. If you normally don't see extensions on your computer and it all of a sudden appears in a file that you've downloaded, you may have downloaded a malicious file that is hiding as something else.

  • To make your file extensions visible, open Windows Explorer, click the View tab/menu and select Options. Click the View tab in the Folder Options window, and uncheck the "Hide extensions for known file types" box.



Step 4:

Scan your downloaded files. If you have an antivirus program installed, you should make a habit of scanning files that you've downloaded from unknown locations. Most antivirus programs allow you to immediately scan specific files by right-clicking on the file and selecting your antivirus from the list of options. 

  • Always scan ZIP files as these often contain multiple files in one archive.
 
  •   Email programs will often scan your email files for viruses automatically, but you should still scan any downloaded files with your own antivirus program. 
 
 
Step 5:
 
Don't open anything you don't trust completely. A virus or worm can do nothing unless you actually run the program that it is attached to. That means that simply downloading a file does not put you in any real danger. If you decide after downloading that you don't exactly trust the file, avoid opening it or delete it until you can confirm its integrity.  
 
 
 
Step 6:
 
Read the license agreement. You know those legal documents that you always blindly accept when installing a program? Well, shady companies like to use the fact that most people skip them to sneak in clauses about installing spyware and other malicious software. Make sure to take the time to read these agreements, especially from companies that you've never heard of before.  
 
 
 
 
Method 3: Dealing with Emails
 
 
Step 1:
 
Don't download attachments from a source you don't know. Email attachments are the number 1 way that viruses and other malware get spread. You should never click an attachment or a link in an email from someone you don't recognize. If you are unsure of the sender, get confirmation from them that the file is legitimate before downloading it. 
 
 
 
Step 2:
 
Don't download attachments from a source you do know unless you were expecting it. Many times people will get infected with viruses that send emails without their knowledge. This means you can receive email, from trusted sources, but the email itself is not trustworthy. If the writing is odd or the attachment looks off, do not click it. Verify with the person that they intended to send you the attachment you received.  
 
 
 
Step 3:

Disable image previews. Many email applications can automatically load images for convenience, but this can leave you more vulnerable, as images can contain malicious code. You should only download the images in an email from a trusted source. 
 
  • Note: Some services have started changing the way email images are handled, making image loading safer. For example, Gmail no longer disables images on default. Check with your mail provider for best practices on their service.
 
 
 
Step 4:
 
Beware of odd emails from companies you do business with. A popular phishing technique is to copy the style of a company email and include links that look similar to the regular URL, but instead send you to a fake site ("power" instead of "power", for example). These sites, then collect personal information that you thought was going to a trusted server.  
 
  • Any legitimate company will never ask you for passwords or other personal information through email.
 
 
 
Method 4: Protecting Yourself
 
 
 
Step 1:
 
Install an antivirus program. An antivirus program will actively protect your computer from virus infections by scanning active programs and performing scheduled full-system scans. There are free antivirus programs that come with basic virus protection, such as AVG, Bitdefender, and Avast, and there are paid programs that come with other internet security protections such as firewalls and anti-phishing measures. Paid programs include Norton, Kaspersky, and paid versions of free antivirus options. 
 
  • You should only have one antivirus installed at a time in order to avoid conflicts between them.
    Make sure that your antivirus gets updated at least every week.
 
  • Scan your computer at least weekly, more often if you are a heavy internet user.
 
  • An antivirus program is not a foolproof system, and should not replace good browsing habits and common sense. 
 
 
 
Step 2:
 
Install an anti-spyware program. Beyond viruses, your computer can also get infected with spyware and adware. These programs are difficult to exterminate and often hijack your browsing experience. They also make your computer more susceptible to future infection. Most antivirus programs do not scan for or remove spyware and adware. 

  •  Popular programs include Malwarebytes, Spybot S&D, Hitman Pro, and Adw Cleaner.
 
  •  You can have multiple anti-spyware programs installed at once. More programs mean you are more likely to catch offending spyware.
 
 
 
Step 3:
 
Enable a firewall. Firewall software protects your network ports, which are the "doors" facing the internet that allow data to be sent back and forth. Windows comes with firewall software already installed and enabled, which is usually more than enough for most home users. There are a variety of companies that offer more powerful and customizable software as well. Most of these are the same companies that provide paid antivirus software.  
 
  • Firewalls are also available in hardware form.
 
  •    You can only have one firewall enabled at a time. If you install a software or hard firewall, you'll need to disable the Windows firewall.
     
 
 
Step 4:
 
Keep Windows updated. Many viruses and other malicious programs exploit holes in the Windows software. These holes are quickly patched by Microsoft, and updates are made available for all legitimate copies of Windows. if you don't keep your copy of Windows updated, your system will be much more exposed. In order to ensure that you're always protected, make sure that Windows is set to update automatically. 
 
  •  If you are using Windows XP, upgrade immediately. Support for Windows XP will end on April 8, 2014. This means that any exploitable cracks found after that date will no longer be fixed, and Windows XP will become very insecure. For more information on upgrading, see this article for upgrading to Windows 7, and this article for upgrading to Windows 8. 
 
 
Step 5:
 
Be careful with USB drives. USB drives are a popular vehicle for virus transmissions, usually without the owner being aware at all. You could get an infection just by inserting the USB drive, or could get your USB drive infected by plugging it into a public computer. Try to use other methods for file sharing, such as online storage or email to send files. 
 
 
 
Step 6:
 
Be wary about remote access. In our more connected world, remote access and remote sharing of resources has become much more prevalent. While this can be great for productivity, it does put your personal machine at more risk if there are a variety of other machines connecting directly to it. Ask yourself if you need that remote connection, and always ensure that your protection software is up to date.  
 
 
 
Step 7:
 
Keep a good backup. If disaster strikes, you don't want to be left without your important data. A regular backup schedule will mitigate any damage done by a virus, and will allow you to get up and running much quicker. There are a variety of ways that you can go about backing up your data, both locally and remotely. 
 
 
 
Tips 
 
  • Keep a recent backup of your personal files. This will come in handy should you get infected with a program that deletes your files, or prevents you from accessing them.
 
  • Remember: if it seems suspicious, it probably is.
 
  • Delete your browser's temporary internet files every day.
 
  • If you are fixing simple errors like a blue screen, simply shut it off and reboot it after 10 seconds.
 
  • Don't do any surveys that look suspicious and never, ever give any money away to something better than usual. 
 
 
 
Warnings
 
  •  If you don't keep a good backup of your files, you risk losing everything when a virus or spyware hits. Scan your computer once in a while.

No comments:

Post a Comment

Nokia C1 renders leak ahead of launch, hints at 4GB RAM and dual rear cameras

Is Nokia working on its own AI assistant for smartphones? Nokia is planning its return to the smartphone industry with two new flagshi...