Saturday, July 25, 2009

Virus Infection On Your PC

Here's some info about Virus infection on your PC.

If you let your guard down - and even if you do not - can be difficult to tell if your computer is infected. This is what you should do if you suspect the worst. I've heard about this before? You must run antivirus software and keep it updated, or infect your computer, you will lose all their data, and can bear the wrath of all the letters from friends who are infected unknowingly due to his negligence. You know, you're right. Nevertheless, for one reason or another, you're not running antivirus software, or if it is not so far. Maybe you disable your antivirus program, because in conflict with another program. Perhaps tired of improvement after he had bought a Norton AntiVirus 2001, 2002 and 2003. Or maybe your annual subscription of virus definitions recently expired, and that to delay repairs. It happens. This is nothing to be ashamed. But chances are, regardless of whether they are infected right now as we speak, or he will be very soon. Within a few days in late January, the worm was infecting about 2,500 computers NetSky.P daily. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software Trend Micro, said: "unprotected [Windows] computer will become owned by a robot within 14 minutes." Currently, viruses, worms, and so-called bots - which turn your computer into zombies, which makes the hacker in the bidding (such as mass mailing spam) - it will not announce their presence. Real viruses are not like those of Hollywood movies that melt your entire network in seconds and destroy alien spacecraft. In the background, quietly changing the data, theft of private operation, or use a computer for their own illicit purposes. This makes them difficult to detect if it is not very well protected. Your computer is "owned"? First of all, I would say that not every system oddity is due to a virus, worm, or a robot. Is your system slowing down? Is your hard drive filling fast? There are programs to fail without warning? These symptoms are likely caused by Windows, or badly written legitimate programs, rather than malware. In the end, people who want to write malicious software to hide its presence. People who write commercial software, that all the icons on your desktop. Who will remain undetected? Other indicators that may, in fact, shows that there is no need to worry about include: * E-mail telling you that you are sending mail infected. E-mail viruses and worms, as a rule, from false addresses. * Frantic note from a friend that had been infected and, therefore, as well as you. This is probably a lie. This is particularly suspicious if the note tells you that the virus could be detected, but can not get rid of it by deleting one simple file. Do not be fooled - and do not delete this file. I'm not saying you should ignore such warnings. Copy the theme, or a fragment of text e-mail and connect to your favorite search engine, so that if other people have received the same note. The site can be bound as security, and deception. Inhalation of vapors from infection There are signs that the computer is actually infected. A lot of network activity on your system (if you're not on the network) can be a good indication that something is wrong. Good software, such as a firewall ZoneAlarm, will ask your permission before you give anything to leave the computer and give you enough information to help determine the output is legal. Incidentally, the firewall that comes with Windows, even the enhanced version of Windows XP Service Pack 2, lacks this feature. To put a network status light in the system tray, follow these steps: In Windows XP, click Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected" and then click OK. If you are interested in becoming a team of detectives, can sniff around further for malware. Pressing Ctrl-Alt-Delete in Windows, you can open Task Manager, which displays the various processes in the system of governance. Most if not all, legitimate, but if you see that the file name looks suspicious, type in a search engine and find out what it is. Want to search for another location? In Windows XP, click Start, Run, type "services.msc" in the box and press "Enter." You will see a detailed description of Windows is running. See something wrong? See your search engine. Finally, you can do more detective work by selecting Start, Run and type "Msconfig" in the field. With this tool not only to see the services and programs carried out by your system at startup. Again, find something wrong. If any of these tools does not work - or if your software does not work - that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect yourself. What do I do next Once you are sure your system is infected, do not worry. There are steps you can take to assess damage, depending on your current level of protection. * If you do not have antivirus software on your system (shame on you), or if the program has stopped working, stay online and go to the free scan at one of several websites. There FreeScan McAfee, Symantec security check, and Trend Micro HouseCall. If you do not find anything, try two. In fact, to hold free online viruses is a good way to test their anti-virus program. When you're done, buy or download antivirus software. * If you have antivirus software, but is not active, get offline, unplug wires - whatever it takes to stop your computer from communicating via the Internet. Then, quickly scan with the software. * If you do not seem to be working, do more research on the web site. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses - if manual removal may be - or a free removal tool if it is not. Check Grisoft Virus Encyclopedia, Eset in Virus Descriptions, McAffee Virus Glossary year in Virus Encyclopedia Symantec, Trend Micro and the Virus Encyclopedia. One microgram of prevention Assuming that your system is clean, you must ensure that it remains that way. To prevent the violation of computer security is much more effective than cleaning a mess afterwards. Let's start with a good program, for example, Trend Micro PC-Cillin, which can be purchased for $ 50. They do not want to deposit any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (personal firewall), and Ad-Aware SE (an antispyware tool). Just be sure to save all software updates. Ill try new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates is not worth your money and your time. Speaking of updating, the same can be said for Windows. Use Windows Update (which is in the Start menu) to make sure you get all high-priority updates. If you are using Windows XP, be sure to get Service Pack 2. To find out if you already have it, right-click the My Computer icon and select "Properties." On the General tab, in accordance with the system, you should say: "Service Pack 2." Here are a few pointers to a life free from viruses: * Be careful with e-mail. Setting up email software settings high. Do not open any message with the general issues that sound does not apply specifically to you from people who do not know. Never open an attachment, if you were not expecting it. * If you have access to broadband Internet, such as DSL or cable, a router, even if you only have one PC. The router adds an additional level of protection, because your computer does not connect directly to the Internet. * Check your Internet ports. These doors between your computer and the Internet can be opened, and in this case the computer is very vulnerable, are closed, but still a little fragile, or stealth (or hidden), which is more secure. Visit the Gibson Research Web site and run the test ShieldsUP to open its ports to see the situation. If some ports are closed - or worse yet, open - check your router documentation to find out how to hide them.

No comments:

Post a Comment

Bookmark and Share