L O C A L
 
  GoTo... the WEB section!WEB GoTo... the LOCAL section!LOCAL GoTo... the NEWS section!NEWS GoTo... the IMAGE section!IMAGES GoTo... the VIDEO section!VIDEO GoTo... the AUDIO section!AUDIO GoTo... the PRODUCTS section!PRODUCTS  
 Search Tool > Local Links > Online Security > Viruses
GoTo... Local Links
 
  Image Image
ALL YOU NEED TO KNOW ABOUT TRYING TO BE
  Go Back... BACK  
SECURE ONLINE.
THIS ARTICLE
Online Security
All about Spyware
All about Viruses
All about Firewalls
All about Scams
 
RELATED LINKS
Pop-up windows
Browser Hijacks
Trojans
Virus Alerts
 
RECOMMENDED READS
Opens a NewWindow Article on Viruses by the MicroMart mag
 
Safely download software to cover your online security...
AntiSpyware
Pop-up Blocker
AntiVirus
Firewall

Unsure about downloads?
 
Download.com logo
Goto... Download.com
Goto... Download.com
 
VIRUSES


On this page...
  • Spotting the presence of a virus
  • Preventing viruses
  • Getting rid of a virus
   


A computer virus is a small program designed to enter your computer without your knowledge. It then makes copies of itself over and over again, attaching to other programs and reproducing when the other programs are run. It then spreads to other computers through your e-mails or file transfers.



Spotting the presence of a virus

The effects of a virus can range from harmless messages that appear on screen to the destruction of data, either right away or on a set date. Here are a few events that indicate the presence of a virus...
The loss of data or programs being wiped off your computer.
A harmless message appears on your screen informing you that you are now infected.
You are informed that an e-mail sent by you was blocked by someone's anti-virus software because it was infected.
You discover that one or more of your 'contacts' has received e-mails from you that you did not send!
Your anti-virus software finds a virus during a routine scan of your computer.



Preventing Viruses

PUBLISHED: Mar/2006

UPDATED: Jun/2007
 
GET QUICK INFO ABOUT
 
Click to Reveal/Hide data!  ADWARE
Programs that are installed on your computer with or without your knowledge, intending to deliver adverts to your desktop. More»
 
Click to Reveal/Hide data!  BROWSER HIJACKERS
Malware that covertly installs itself onto your system and changes your web browser settings. You aquire a new StartPage or HomePage that seems impossible to get rid of. More»
 
Click to Reveal/Hide data!  COOKIES
Cookies are small text files that some web sites place in your computer to remind your browser of specific information. For example, they might store your preferences for content so pages can be personalised for you. Have you ever gone back to an online store and found a couple of items that you chose, still at the check out, well that's achieved by a cookie. The vast amount of cookies are designed to enhance your visit to a site. Some sites use session cookies that are deleted when you exit your browser, while others place persistent cookies, which stay on your hard drive for long periods. All good sites outline their policy on cookies, usually within their privacy statement.
 
Click to Reveal/Hide data!  DIALERS
Malware that covertly installs itself onto your system and changes your internet dial-up settings to a Premium Rate number. You may not discover the breach until you query your excessive phone bill. Dialers are NOT a problem if you have a broadband connection.
 
Click to Reveal/Hide data!  FIREWALLS
Designed to prevent unauthorised access to or from a computer or a network. Usually software based but can be hardware based within a network router or a Broadband modem. More»
 
Click to Reveal/Hide data!  HACKERS
Users that spend time attempting to breach online security systems. Some do it just for the devilment whilst others have pure criminal intent. A Firewall helps to stop Hackers entering your system when you are online.
 
Click to Reveal/Hide data!  KEYLOGGERS
Malware that captures all keystrokes made by you and monitors for your bank and card details. It usually has the ability to transmit the captured information to interested parties either via a network connection or email. Your personal data is then used in fraudulent activity. More»
 
Click to Reveal/Hide data!  MALWARE
A generic term becoming popular to describe any form of malicious software. Sometimes referred to as rogue programs, they're the bad side of Spyware. More»
 
Click to Reveal/Hide data!  ONLINE SECURITY
A term that covers all the issues on this list. Whether it's the theft of your personal details, virus riddled emails or invading your privacy.
 
Click to Reveal/Hide data!  PHISHING
Pronounced 'fishing'. Not Spyware or a Virus but a type of scam. It's when fraudsters attempt to obtain your personal information, usually your bank details by duping you into entering your details into either a dummy web site, replying to a false email or even by a phone call to your home. The sites and emails are very convincing and appear genuine, even to the trained eye but give themselves away by the very nature of what they are requesting you to do. More»
 
Click to Reveal/Hide data!  POP-UPs
A new browser window that appears on top of your current window, smaller than normal and containing either information or an advert. You really need to take the time to know how useful and how dangerous they can be. More»
 
Click to Reveal/Hide data!  RATs
Remote Access Trojans. See Trojans below.
 
Click to Reveal/Hide data!  SPYWARE
A generic term for programs that are installed on your computer without your knowledge with the intent of gathering information about you, whether for commercial or criminal reasons. More»
 
Click to Reveal/Hide data!  TROJANS
Also known as Trojan Horses or RATs (Remote Access Trojans) it's a way of delivering Spyware onto your system. The malicious code is hidden within a seemingly harmless program. Trojans are often used to infect you with Keyloggers or Dialers. A favourite with Hackers to allow them to open a backdoor to your system. More»
 
Click to Reveal/Hide data!  VIRUSES
A small program designed to make copies of itself over and over again. The effects of a virus can range from harmless messages to the destruction of data and can be exucuted at any given time and date. Seev this page for more info.
 
Click to Reveal/Hide data!  WORMS
Very similar to viruses in their replication but exploit a users email system to send themselves around the world.
 
 
 
Download.com logo
Goto... Download.com
Goto... Download.com
 
GRISOFT logo
Goto... Download.com
Goto... Download.com
 
Zone Labs logo
Goto... Zone Labs
 
THIS ARTICLE
Online Security
All about Spyware
All about Viruses
All about Firewalls
All about Scams
The most common threat of infection to most users is from file attachments in e-mail messages. One rule of thumb is to NEVER double click (execute) an attachment to an e-mail unless you are 100% sure who it is from and that it is safe to do so. Some users advocate turning the Preview Panel off in the InBox of Outlook or Outlook Express and deleting all unsolicited e-mails whether they have an attachment or not and it made sense before the advent of Webmail [?] . Here are a few Do's and Dont's

Do use anti-virus software and have it running all of the time.
Do update your anti-virus software regularly.
Do visit the virus alerts page.

Don't open any email attachments unless you know it is safe.
Don't surf the Net (away from mainstream sites) when logged-on your computer as an Administrator, switch to a Limited User. [?]
Don't install a peer-to-peer file-swapping program without thoroughly checking out the program.
Don't run any software downloaded from any obscure web site or given to you on a disc, without first checking the file for viruses.



Getting rid of a virus

Thankfully, deleting an infected file will remove the virus but how many times it may have replicated itself is anyone's guess, so always scan your computer with your anti-virus software.

Download and install your anti-virus tool!
Run the tool to scan your computer for viruses!
Review the files discovered by the tool as infected!
Select files for removal by following the tool's instructions!



More information

You'll find more in-depth information about computer viruses on Wikipedia.


  Go Back... BACK  
 Search Tool > Local Links > Online Security > Viruses
  GoTo... the WEB section!WEB GoTo... the LOCAL section!LOCAL GoTo... the NEWS section!NEWS GoTo... the IMAGE section!IMAGES GoTo... the VIDEO section!VIDEO GoTo... the AUDIO section!AUDIO GoTo... the PRODUCTS section!PRODUCTS  
    ©2007 SteveBurgin