Harmwares Have Improved, Has you Security?

“Harmwares” have improved!
Computer viruses have always generated fear in the back of users mind. The word “virus” is usually associated with something baleful, something that causes damage, which destroys and makes troubles. As well as natural viruses, computer viruses are capable to multiply, destroy, and hide with the difference that these processes are performed on a computer.

BSOD_Main

 

Computer viruses are small software programs of a few kilobytes (kb) only, which have the sole purpose to damage the infected computer. They are not alive, not spread through the air or by touching disks with other disks. Since they are just programs, it is logical that they were not created by themselves. Viruses are written by hackers, experienced system developers, who send viruses to our computers for diverse reasons: because they need confidential information (the greatest cause), because they want to prove that Microsoft’s operating systems are not well protected, or just because they want your money. Viruses are easily multiplied and many have the ability to re-send to all of your contact list to infect everybody you know, then everybody they know. Situated in other files such as toolbars, add-ons, popups, through emails and many other means, they usually cause damage by modifying or deleting a program or system files. Trouble begins when the virus is loaded into memory (RAM) in order to be active until you turn off the computer (or clear the RAM), sometimes it will multiply in your RAM until your computer grinds to a halt other times it waits until you start a program such as your internet banking, emails or word processing,it can then read every action, every keypress, every move of the mouse until it get what it wants, your private detailed information.

In the beginning, viruses were spread via floppy disks, and later via USB flash disks. The virus is most frequently transmitted via networks such as LAN (Local area network – Your home network of desktops, laptops tablets and anything connected to your WiFi) or most usually it’s transmitted via WAN (Wide Area Network – Basically the internet). This is why it is so important to have a substantial firewall and anti-virus program, the firewall is your first defence in stopping unwanted access to your computer via ports (the gateways in and out of your computer), the second which most people are fully aware of is your antivirus, usually actively scanning your computer 24/7 for any changes that might indicate virus or malicious activity on your machine. You would know your antivirus as you probably get a new bill every 12 months or pop ups non stop asking you to upgrade to the “premium package”. It doesn’t matter what you use, just as long as you have protection and obviously it keeps you virus free!

There are many different types of “Virus”, most common forms of viruses are, the so-called, “worms”. It copies itself or its segments to other computers, and it is usually transmitted via internet. Worms are rarely destructive and perilous, but because of their unlimited ability to create their own copy, they can only slow down traffic considerably. Unfortunately, you can not avoid them, but they are easy to remove. Another famous virus is “Trojan”. It is not actually a virus, but a code that is activated after you launch a certain program. It usually happens when you download a program from the internet that seemed attractive to you, for example, A program offering free vouchers, free antivirus or toolbars. You would be amazed with the different ways hackers can hide their code, which is why its so important to have the protection, and the knowledge on what is good and reliable and what is not, you could end up having your hard disc erased losing emails, work and even the family photographs. The trojan is designed to allow somebody else (the hacker) access to your computer, they are the biggest issues in the computing world, and have their very own category, they are now known as “Spyware”, as the name suggest, it allows somebody to spy on all of your computer usage. The best advice we can give you to avoid Trojans is not to download any suspicious programs, especially from untrusted sites (check your antivirus or browser for a trust rating).

The next hazardous virus is known as “Hoax”. As its name suggests, it’s a false alarm. It is not a virus, it is just a message that appears on your screen while you are on the internet, and warns you to delete some of your system files because they are infected. So, YOU take the role of a virus instead. As many people are easy to believe the written word, they immediately find and delete that file; and the result is – half of the programs do not function properly!Therefore, do not download any suspicious program (from untrusted sites!) and games, do not open fishy links, and certainly do not delete the files you are not supposed to.

The only true indicator that can point to a malicious file is the antivirus system.Antivirus system is a set of programs that are installed on your computer with the aim of your computer protection. Antivirus contains code that can recognize viruses and warn you about them while you are online. When an antivirus program detects the virus it will stop its function and ask you about the action: whether to delete, skip or put into quarantine. The most common antivirus programs include Avast, Avira, Nod, Kaspersky and Bitdefender and Mcafee.

At the end of the day, avoiding suspicious viruses and malware is useful but not complete protection. Therefore, choose some of the most popular and powerful antivirus programs and save your computer from infection and hacking. We recommend using; Mcafee Total Protection 2013, they offer some of the best protection around and also don’t have so many popups like other programs do, perfect if all you want to do it work or play!

If you have a virus on your computer and you would like an expert to look at it for you, please do not hesitate to call us – Super PC Repair. We are always glad to help.

Leave a Reply

Your email address will not be published. Required fields are marked *

eight − 6 =