![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Virus Prevention 101
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar? Have you been as bothered by viruses this past year as I have? Does it seem like there are more viruses, worms and Trojans out now then ever before? It is only getting worse. For the general public, "virus" has become a catchall term for any unwanted program that spreads from computer-to-computer; yet, in reality, there are differences between viruses, worms and Trojan horses. Worms reside in active memory, are self replicating, and usually use native operating system components to do so. Trojans are programs in which malicious or harmful code is contained inside apparently harmless programming or data. Viruses are pieces of programming code that cause some unexpected and usually undesirable event. All of them can really ruin your day. Everyone who uses a computer can catch a virus. Borrowing disks, swapping floppies, moving data from one machine to another, sending and receiving e-mail, the list goes on. If you use the Internet, your chances increase, even if you use a dial-up modem. Some viruses can be caught just by visiting infected websites. There are over 50,000 active viruses today. But on any given day, only a few hundred viruses pose a serious threat to your computer. Some of the most destructive--Melissa, Love Letter, and more recent Blaster--caused millions of dollars in damage. Many systems and networks never completely recover from a virus attack. Though a virus protection program is imperative to your computer's health, it does not in any way ensure your safety. To be effective antivirus programs require proper setup and frequent updates. Newer applications have built in updaters and if installed properly require almost mo maintenance. However, older programs required user interaction to get the latest definitions. In a corporate environment, a system can be installed in which the users have no dealings with the antivirus application at all. All monitoring is done by the network administrator and on the server level. A primary server with groups and group leaders can be defined during setup. Specific systems are assigned to groups usually based on their physical location. The primary server automatically gets its updates from the antivirus vendor. The group leaders then get their updates from the primary server and distribute them to all the members on a daily basis. The network administrator monitors one system that can control the scanning, updating and managing for the entire network. How can you stay protected? 1. Install anti-virus software and keep the virus definitions up to date. 2. Don't automatically open attachments and make sure your email program doesn't do so automatically. 3. Scan all e-mail attachments. 4. Configure your anti-virus software to boot automatically on start-up and run at all times. 5. Avoid downloading files you can't be sure are safe. This includes freeware, screensavers, games, and any other executable program. 6. Don't use floppies, but if you must, scan them before using them. 7. Educate yourself and your users to learn how to spot viruses. All past articles written by Greg Richburg are available at http://www.netricks.com/news. Please address article suggestions to: info@netricks.com. Greg Richburg a Microsoft Certified Systems Engineer and the owner of Netricks, Inc. for wed design adn hosting, and KlickCommerce for Internet Marketing Strategies. Please visit http://www.klickcommerce.com/.
MORE RESOURCES: Opinion | What Happens When There’s a Real National Security Crisis? The New York Times Rewind and Reconnoiter: Is Climate Security Out in the Cold in the U.S. Intelligence Community? War on the Rocks Law Firms Fear Trump Orders Could Affect Security Clearances of Lawyers Who Are Military Reservists Military.com DHS arrests man in McKinney accused of making terroristic threats against Homeland Security Secretary, ICE NBC 5 Dallas-Fort Worth Kirtland Security Forces Detective Trains with APD to Strengthen Investigative Skills, Partnerships afgsc.af.mil AWS achieves Cloud Security Assurance Program (CSAP) low-tier certification in AWS Seoul Region Amazon Web Services Apple Head of Global Security found not guilty in bribery trial tied to concealed gun permits NBC Bay Area Netanyahu says Israel will establish a new security corridor across Gaza to pressure Hamas - AP News DOJ grant supports study of the effects of school security equipment on student outcomes George Mason University Rep. Carbajal Statement Following New Reporting on National Security Advisor Mike Waltz’s Extensive Use of Signal for Official Work Purposes Congressman Salud Carbajal (.gov) Space Security Sentinel Via Satellite Trump's national security adviser reportedly used his personal Gmail account to do government work TechCrunch 2024 Security IP Year In Review: Innovations And Best Practices Semiconductor Engineering Auto Sector Leads The Way In IC Security Semiconductor Engineering Corgea BLAST uncovers hidden vulnerabilities in code Help Net Security 1touch.io helps organizations safeguard sensitive data Help Net Security Milwaukee's Brady Street businesses increase security to improve safety FOX6 News Milwaukee Planning for your IAM Roles Anywhere deployment Amazon Web Services CyberQP launches Zero Trust Helpdesk Security Platform Help Net Security Are LLM firewalls the future of AI security? Computer Weekly Oracle's masterclass in breach comms: Deny, deflect, repeat theregister.com Mike Waltz’s team set up at least 20 Signal chats for national security work – report - The Guardian Commission presents a European internal security strategy European Commission Law firms fear Trump orders could affect security clearances of lawyers who are military reservists ABC News National Security Space Association's Marc Berkowitz Nominated to Serve as Assistant Secretary of Defense Space Coast Daily Mountain Home approves renaming Veterans Plaza after First Security Bank Mountain Home Observer I sent hundreds of cold emails to find a US VC firm that would hire me as an immigrant. I'm glad I ended up at a small company. Business Insider Russia's FSB security service searches home of elderly father of former Navalny aide The Jerusalem Post Building a cybersecurity strategy that survives disruption Help Net Security Israel's security is America's security. Americans should not ignore that - opinion The Jerusalem Post Opinion: Alaska can increase its food security without an agriculture department Anchorage Daily News Beware fake AutoCAD, SketchUp sites dropping malware Help Net Security County approves more security for Colbert courthouse timesdaily.com Pasadena school security officer accused of duct-taping 11-year-old girl's mouth shut for 'talking too much' ABC7 Los Angeles NYPD boosts synagogue security ahead of Passover as anti-Jewish crimes 'jump off the page' New York Post Security, Data Privacy, AI Code Reliability Biggest Software Development Challenges for 2025 Supply & Demand Chain Executive Glencoe based Security Bank & Trust Co. expands reach in Minnesota McLeod County Chronicle Opinion: Trump’s casual response to his administration’s security lapse Chattanooga Times Free Press Kratos Defense & Security Solutions (NasdaqGS:KTOS) Breaks Ground On New Hypersonic Facility Yahoo Finance HPD, Homeland Security bust multiple game rooms FOX 26 Houston Apple security chief acquitted, mistrial for ex-undersheriff in Santa Clara County gun permit bribery case The Mercury News Charges Filed Against Former PUSD Security Guard Pasadena Now New security system coming to Alaska’s Capitol building Your Alaska Link ISC West 2025 Show Floor Spotlight: BOSCH SECURITY AND SAFETY SYSTEMS Security Info Watch Oracle Cloud security SNAFU latest: IT giant accused of pedantry as evidence scrubbed theregister.com National security implications of tariff announcement LiveNOW from FOX Fight at maximum security unit precedes tour by state’s prison work group - South Dakota Searchlight Fight at maximum security unit precedes tour by state’s prison work group South Dakota Searchlight Security forces report 80% drop in Ramadan terror attacks, after West Bank crackdown The Times of Israel Security by Design Requires Organizational Commitment BankInfoSecurity |
![]() |
![]() |
![]() |
RELATED ARTICLES
3 Steps to Ending Scams and Virus Problems Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. SCAMS - Be Aware - And Report When Necessary The Internet is a vast International Network of people and businesses - and a place where people can make a fairly decent living. However, it is also a place where certain unsavory characters can freely roam - to take your dollars and run. The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms.. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. Is Your Music Player Spying On You? In today's times spyware is a very serious issue and all computer users should be aware of the possible damage it can cause. It is estimated by well known industry insiders that nearly 90% of all computers are infected with some kind of spyware. Spyware - Your Web Browser is the Culprit! My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it. Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. Phishing and Pharming: Dangerous Scams As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. Is The Internet Over Regulated Today's Internet or World Wide Web is being over regulated.But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business?First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail. Is the Internet Insecure Because of You? Long gone are the days that we could feel secure and know for certain that we had privacy. With the digital age upon us we can no longer be so sure that our privacy is secure. Five Excellent Indie Encryption And Security Solutions You Have Not Heard About 1. Geek Superherohttp://www. Types Of Computer Infections Computer infections can be broken up into 4 main categories which are explained in detail below:VirusesComputer Viruses are small pieces of software that attach themselves to real programs. An example would be a virus that attaches itself onto windows explorer. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. Phishing - Its Signs and Your Options Phishing is the act of some individual sending an email to a user in an attempt to scam the user to release personal information. Is it easy to determine if it's a scam? Sometimes - but not always. How to Manage Your Username and Password The Easy and Secure Way Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. Adware and Spyware: The Problems and Their Solutions The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection. Secrets On Security: A Gentle Introduction To Cryptography Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg. Why Malicious Programs Spread So Quickly? It seems that nowadays cybercriminals prefer cash to fun. That is why malicious programs of various kinds (viruses, worms, Trojan horses, etc. ![]() |
home | site map |
© 2006 |