Working on the Internet provides Internet marketers the opportunity to live in the comfort of your own home. However, if your business depends entirely on your computer, you must make sure your computer is protected.
Over the years I have received many questions regarding computer security applications. Some of the most common:
Q: I am new to the internet and heard a lot about viruses.I do not know what they are. Can you help me?
Answer: A virus is a small piece of software that attaches itself to 'real' software programs (executable code). Every time you start the program itself, the virus also starts. The virus can then spread and attach to other programs and wreak havoc on your system.
The most prevalent virus is a virus e-mail. An e-mail virus spreads through email attachments. It usually spreads by sending itself to everyone in the e-mailaddress book program. Tricks of the e-mail recipient to believe that the message has been sent by someone they know.
Although this virus is spreading rapidly, you can only get by reading a plain text e-mail. But you can carry the virus by clicking on an encrypted message that contains the executable code such as JavaScript embedded in an HTML e-mail or an attached executable file.
Another type of program is often regarded as a virus is a 'Trojan horse'the program. It is not a virus. It is simply a computer program that acts as something that is not. For example, you can download a program that you think is a computer game. However, when you run the program, you can delete files on the hard disk. Trojans can not replicate automatically.
Another popular program is known as a worm. A worm is actually a small piece of software that travels through vulnerable computer networks, with holes in the security considerations.worm scans the network for other computers with security holes. It copies itself to any system it finds.
Although all types of viruses infect executable files like EXE or DOC, the majority of multimedia files such as poison, JPG, BMP, MP3, WAV, AVI, MPG and TXT are generally safe.
While viruses can cause damage, virus hoaxes can be dangerous. hoax virus can Internet users to begin to ignore all virus warning. This can be harmful, becauseThen be left vulnerable to real virus alerts.
In addition, many virus hoaxes also a 'solution' that a user specified file from their system instructs. However, the file says that is a virus hoax is an important file needed by the computer.
Do not follow the advice in an e-mail 'Virus Alert' asking the system to remove a virus from you without first checking its validity.
Visit Symantec to find their virusWikipedia:
http://securityresponse.symantec.com/avcenter/vinfodb.html/
You can also search for McAfee Virus database:
http://www.mcafee.com/anti-virus/default.asp
You can protect your computer by taking some precautions:
1) Buy a quality antivirus software and keep it updated.
McAfee http://www.mcafee.com
Norton http://www.symantec.com
Please note the above programs (especially Norton) is known to cause troublewith a number of operating systems. Although no single model, caution should be exercised. I use McAfee virus scan online and have not had any problems.
2) If you use Microsoft programs, make sure the "Macro Virus Protection" is active. Never a macro in a document unless you know exactly what he does.
3) Never open an email attachment unless you are sure of where it comes from and what it is.
4) Avoid downloading software programsresources that are not familiar with. If you download a program, be sure to scan the file with your anti-virus software before
Q: I heard a lot about firewalls, but I'm not sure what or if I need it. Can you help me?
Answer: A firewall is essentially a software that allows full access to the Internet and / or network by restricting access to your computer from outside intrusion.
Internet users are veryvulnerable to hackers, especially if your cable or DSL Internet access. You definitely need to protect your computer. I recommend using a great program called Zone Alarm Pro http://www.zonealarm.com
Once you have a firewall, you'll be amazed how many attempts to access your computer are blocked by firewall.
Hackers can use your computer by installing programs directly access as a key logger that can read every keystroke. Thisinformation is recorded and sent back to the hacker. Private information such as passwords and credit card numbers can be easily stolen.
A key logger is a small software that runs in the background. Since these programs often run in DOS, can never realize that most likely is running. However, you can see if a key logger is running, pressing 'control' - 'alt' - 'delete' key on your keyboard. This will be a window that lists all programs currently containsrunning on the system. Review the list and look for programs that do not recognize.
Because there are many small programs such as adware (pop-windows) and spyware cookies that your anti-virus and firewall to work around, I use a program called Pest Patrol http://www.pestpatrol.com/ This program detects and remove non- viral malicious software.
Even if you buy Pest Patrol site above, you will receive a discount if you buy it with Zone Alarm Prohttp://www.zonealarm.com. I can not guarantee how long this special offer is available, so if you want, it's a good time to do so.
If you really want to protect your computer, I recommend the following:
1) Buy a good antivirus software and keep it updated
2) Purchase a good firewall program and keep it updated
3) Buy a program like Pest Patrol and keep it updated
Take the time to protect your computer is one of the best business decisions youforever. If you are not protected, you will surely regret it later. It 's just a matter of time.
Related : Fabulous Super Store Disinfecting Wipes
No comments:
Post a Comment