Skip to main content

Viruses- Types & Precautions

Types of viruses -

Viruses types that are potential threats to computer systems today.

1)Worms-

These malicious programs are designed to replicate themselves quickly with the intent to spread to other computers, often through a computer network. Although they may not be designed to intentionally impair computer systems, worms generally do some sort of damage or harm to the network itself by consuming bandwidth, at the very least. Most worms are designed only to spread as quickly as possible, so they may not try to change the computer systems they pass through. However, worms have been and are capable of creating backdoor security vulnerabilities, deleting files or even sending files via email. This is a common method for spam senders to spread junk email quickly, as the more computers the worms infect, the faster the spam mail spreads.


2)Trojan Horses-

Trojan horses, or Trojans for short, are different from worms in that they are not designed to replicate themselves. Rather, Trojans are designed to trick you into downloading and executing them to cause data loss, theft and sometimes total-system harm. Just as in the ancient Greek story of the wooden horse designed to deceive the soldiers of Troy, Trojans present themselves as useful, interesting or routine programs to trick you into installing them on your computer.

3)Spyware-

This software is designed to gather information about you without your knowledge. This information can be sent to another party without your consent, and in some rather malicious cases, it can even be used to take control over a computer. Spyware is capable of collecting any type of data, including your internet history and banking information. Some forms of spyware can install additional software or change your internet or browser settings, which can be a mere annoyance or a problem that can take days to fix.

4)Ransomware -

This incarnation of malware infects your computer with the intention of restricting access to your computer system, perhaps preventing you from surfing the internet or accessing the hard drive, and then demanding a payment to the malware creators. The trouble with this software is that it tries to imitate the look of genuine, trusted software to trick you into buying a solution. For example, some forms of ransomware tell you that your user license for a particular application has expired and you need to repurchase the license. Some of the trickiest ransomware creators have acquired millions of dollars from unsuspecting users.

5)Rootkits-

Rootkits are stealthy types of malware that attempt to hide from typical methods of detection and allow continued privileged access to a computer. This essentially means that the rootkit attempts to gain administrator access on your computer and then hides itself so you don't know it is on your system. This type of malware is generally difficult to detect and remove because it tries to embed itself thoroughly and deeply into your computer's system.
Malware is not limited to these five examples, but this gives you a sense of how malicious and vicious malware can be.

Antivirus softwares -

Antivirus Software-

As stated above, antivirus software is the entry-level version of virus protection for your PC. That is not to say this software is ineffective, as it can protect your personal computer from even the most vicious viruses. In fact, all antivirus software includes tools to block or remove spyware, worms, rootkits and other malware types. Rather, this particular set of virus protection software has fewer features than the two antivirus suites. This software does include the ability to scan incoming email for potential threats, automatically clean or quarantine infected files, and create bootable rescue disks, to name a few of its many features.

Internet Security Suites-

Internet security suites generally contain all of the tools found in entry-level antispyware, such as antimalware, PC tune-up utilities, safe online banking and shopping, secure browsing, vulnerability scanning, and privacy protection. However, these suites include additional features that add more levels of security and protection to your computer system. Most internet security suites include an alternate firewall from the one included with the Windows operating system, and many even offer social network protection designed to detect threats through your online social presence. Additionally, these antivirus suites include parental controls to limit where your children go while on the internet, which can protect the computer system, and more importantly, your children.

Premium Security Suites-

Although the additional protections found in internet security suites are highly valuable, premium security suites offer even more protection. Just as internet security suites contain all of the features found in antivirus software, premium suites include all of the features found in internet suites. These programs add extra layers of protection in the form of file shredders, online backup, system tune-up utilities and password managers. In other words, these suites tend to be the best of the best, offering an entire arsenal of defenses and protection against malware.

With the different tiers of computer antivirus software demystified, you can determine the level of security you require and apply that to your particular situation. Although they aren’t the best or most comprehensive programs, free antivirus software allows you to scan and remove threats on your computer, for the most part. However, free software lacks the functionality, features and overall support that is readily available on paid programs. Entry-level antivirus software provides significant advancements over freeware, and its feature set provides enough functionality for many home users. Internet security suites provide even more features, while premium security suites are the pinnacle of PC protection.

No matter which antivirus software catches your eye, make sure you consider help and support before making your final decision. Look for a program that offers 24/7 access to support through email, phone or live chat. Regular, easy access to support ensures that you can get the help you need, whether you have a simple question or your entire computer system crashes and you need immediate help. Whether you're looking for protection on your Windows 10 tablet, Windows 8 laptop or Windows 7 business computers, make sure the software has numerous means of technical support.




Be aware be safe,

Thank you,


Source - with the reference of the post by John Carlsen about ' viruses and security '



                                       - Regards - PC tricks & suggestions

Comments

Popular posts from this blog

Grand Theft Auto V is now available for PC !!!!

Grand Theft Auto V is now available for PC !!!! Read this article for more information. Grand Theft Auto V is now available for PC  at retail stores and via digital download . GTAV for PC offers players the option to explore the massive world of Los Santos and Blaine County in resolutions of up to 4k and beyond, as well as the chance to experience the game running at 60 frames per second . GTAV for PC offers players a huge range of PC-specific customization options, including over 25 separate configurable settings for texture quality, shaders, tessellation, anti-aliasing and more, as well as extensive support and customization for mouse and keyboard controls. Additional options include a population density slider to control car and pedestrian traffic, as well as dual and triple monitor support, 3D compatibility, and plug-and-play controller support. Grand Theft Auto V for PC also includes Grand Theft Auto Online, with support for 30 players an

Change the DNS settings of PC for increasing the internet Speed !!!!

     Today we are going to talk about how to change the DNS settings to Google DNS   of our PC  for increase the internet speed      First, let me introduce the DNS for whom who does not know anything about it. DNS is stands for D omain N ame S ervers (or systems or service).  The  DNS  translates Internet domain and host names to  IP addresses . DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites. For example, the IP address of the www.google.com is  216.58.220.36. It means, when we enter the url www.google.com in the url bar of our internet browser then the DNS server convert this url in its ip address 216.58.220.36 .  Now, lets start the operation - 1. click on Start > Control Panel 2. In control panel, select Network and Sharing Centre 3. Then click on Change Adapter Settings 4. At this point, select your network adapter and click on Change Settings for this connection