Protecting
Your Computer from Unwelcome Intruders.
When you’re online, you
expose your vulnerability to malicious virus that have been growing in
virulence and ferocity over the last few years. These program codes have gone
beyond mere annoyances with the worst kinds disabling your PC, but they have
become portals for remotely perpetuating more sinister activity that can
clandestinely hack into sites, mount denial of services or steal confidential
and personal data for fraudulent financial gain at your expense.
Are these virus serious
enough to cause losses? Among home PC users, you may think having to reinstall
your OS after a virus or malware has brought it down is not really expensive as
you lose just a day or two to reinstall your programs and rebuilding files,
consider that in a business, you could actually lose millions. Just ask
ChoicePoint when it took a $6 million charge in 2005 after cyber criminals
hacked into their systems and stole sensitive data from thousands of customers.
Or the credit card processor CardSystems Solutions which may yet go out of
business from major security breach at the company's Tucson, Arizona,
operations center. In a recent consumer survey among security breach victims,
people don't take lightly the loss of their data. More than 60% of respondents
indicated their plans to terminate business relationships with a company that
lost the data they entrusted to them.
In 2004, rootkits were a
relatively obscure form of Trojans meant to infect Unix computers. But by 2005,
rootkits have become a mainstream security threat after Sony BMG Music
Entertainment shipped a few million CDs that contained a rootkit among its copy
protection scheme. Within a few months, Sony recalled the CDs, but it was too
late, According to security experts, rootkits attacking Windows PC were here to
stay.
The 2011 Norton Cybercrime
Report reveals that there were 431 million global cybercrime victims who lost
$388 billion in real money losses and computer time. This is a lot more
compared to the estimated $288 billion in revenues from the black markets for cocaine,
heroin and illegal drug trades combined. For sure, not all of these losses were
incurred due to Trojans, worms, viruses, rootkits and malware. But when you
consider that roughly 4.3% of cybercrimes involve damages to PC resulting from
online downloads of infected content over the internet, you are looking at a
computed $17 billion in annual losses due to malware and virus infection.
What
can I do to protect myself from computer viruses and Trojans?
These days, practically
everyone's online, downloading and exchanging files, and developers are in such
a hurry to get their Web sites up or their files out that checking for a nasty
bug is more of a courtesy than a requirement. If you're not careful, your
computer can end up with a nasty virus that makes your files act oddly, crashes
your computer, pops up bizarre messages, or worst of all, destroys your
operating system.
A computer virus is the most
subtle of computer problems. It usually loads itself into your computer system
when you run a program to which it has attached itself. From the computer
system, it'll then reproduce itself, much like a biological virus would, by
attaching copies of itself to other programs on your hard drive. What it does
then depends on the malevolence of its creator. Some viruses are nothing more
than a practical joke. They may bring up a message like "Merry Xmas"
or melt your display. Most of them though, either start destroying your system
or your files immediately or on a date specified by their creators—like the
much-publicized Michelangelo virus, which erases important pieces of your
system on March 6. "Trojan horse" programs are similar to viruses in
their effect on your system, but they can't reproduce themselves. They're
usually a program disguised as something you might want to download onto your
computer—for instance, a rogue, modified version of PKWare's PKZIP utility. But
when you run the new program you just found, it can do anything from popping up
a message to erasing your hard disk, as the rogue PKZIP utility really did.
In either case, you have to
actually launch the infected program or the trojan horse for it to infiltrate
your system. Though hoax e-mails, like the one about the "Good Times"
virus try to make you believe otherwise, neither a virus nor a trojan horse
program can do anything if you simply leave the malevolent file sitting on your
hard drive.
Finding out that you copied
a trojan horse onto your computer is remarkably easy. You launch the program,
and the next thing you know, something completely unexpected happens—maybe your
system is gone or your computer is laughing maniacally at you. But unless you
notice your computer acting oddly before the virus has done its worst damage,
you may very well not know you have it until it's too late.
Protect
Yourself
There are a few basic rules
that computer users should follow to short-circuit viruses. The best known bit
of advice is this: Never open any attachment unless you know who it's from and
why they are sending it. Refusing to open unsolicited e-mail of any kind is the
only sure-fire way to sidestep all forms of trouble.
Anti-virus software is
crucial to preventing virus attacks, but this strategy only works if users
update their software.Unfortunately, 'keeping it current' means updating it
weekly, at least but most products today allow one to automate this process,
but file downloads can be large and slow.
Factors to consider when
buying an anti-virus package include cost, quality of tech support, how
frequently the package self-updates and the platforms supported by the program.
Common sense is another good
weapon in the fight against viruses. Be wary of opening any email attachments,
even from your firends , especially if it has been forwarded to them.Set up
your anti-virus product so that it automatically scans incoming e-mail and
avoiding e-mail software that allows automatic launching of attachments.
If all of this sounds like a
lot of work, it is. There is always a tradeoff between ease of use and security
but the extra time you spend updating your anti-virus software now will save
you hours of time and buckets of frustration later.If you don't keep it
updated, you might was well be completely unprotected.
Prevention
Like sexually transmitted
diseases (STDs), computer viruses existed prior to the popularity of the
Internet, but as with the sexual revolution of the '70s, viruses have
flourished with the widespread sharing of information. And, much like the
efforts to control STDs, controlling computer viruses is to be done through
education and practicing safe hex (a play on words which means to perform
certain measures to protect your computer).
1. Be sure do a full back up
of your system on a regular basis. The best way to clean up an infected file is
to replace it with an original non-infected file. Not to mention the grief a
current back up will save if a virus takes your system completely down. It's
also a good idea to keep more than one set of backup in case the current one is
infected before the virus is detected.
2. Always use an anti-virus
software program, one with both an on-demand and an on-access scanner. You'll
want to look for one that has a fairly complete database of viruses and that is
updateable. New viruses are produced daily, so it's important to have software
that can detect the latest threat.
Be sure to read the manual
and follow the directions of the software program to ensure it's protecting you
properly. Also, consider buying and using two different brands to be doubly
protected. See our review of anti-virus programs.
3. Update the virus database
in your anti-virus program regularly (each month or by the direction of the
manufacturer).
4. On a PC, change the CMOS
setting of your boot up process from booting first on the A drive (floppy) and
then on the C drive (hard drive) to just booting on the C drive. This will not
only speed up your boot up process but also completely eliminate the risk of
infecting your hard drive with an infected floppy disk.
If you should need to boot
from a floppy you can easily change the settings back and reboot from the A drive.
Please note: an infected non-bootable floppy disk can just as easily infect
your hard drive as would an infected bootable one.
5. Don't allow your web
browser to automatically run programs, such as MS Word or other programs
through its e-mail program. Configure your browser to launch WordPad or Notepad
instead. One of the biggest and growing threats is the macro virus, which is
spread through data processing and spread sheet programs
6. Configure your web
browsers to disable ActiveX, Java, and Javascript. You'll lose some of the fun
the Web's been known for, but you'll save your computer from contracting a
virus and speed up your connection.
7. Know that the only way a
virus spreads is either by launching an infected file or by booting an infected
disk. You can not get a virus by simply being online or by reading e-mail. You
have to download and launch an infected file before it will spread. Therefore,
do not launch any unsolicited executable files sent via e-mail.
8. Using an updated
anti-virus program, scan all new software for viruses before installing them on
your hard drive. Even shrink-wrapped software from major publishers has been
known to contain viruses.
9. Be aware of hoaxes. To
increase mass hysteria, there have been many stories conjured up and spread by
unknowledgeable users. For a list of known hoaxes check out the following site:
http://www.symantec.com/business/security_response/threatexplorer/risks/hoaxes.jsp
Viruses are not the only
type of programs that are written solely to cripple computer systems or to use
a computer in an unauthorized way. Other malicious programs are Logic Bombs,
Trojan Horses, and Worms.
Help
on the Web
The Virus Bulletin
(www.virusbtn.com) offers a list of viruses that are floating through the
computer world at present. The site also offers the opportunity to report
viruses, should you be unfortunate enough to encounter a new one firsthand.
If your computer is not on a
network, and you never, ever install new programs or download files from the
Internet or open email enclosures, you don't have to worry about viruses. But
that's like living in a sealed bubble. Most of us have to go out into public
every day, where we're subject to the germs carried by others (though natural
immunities will usually protect us from most of them.) Likewise, most people
also have to update their software and are interested in communication and
information from others. Luckily, there are some preventions and cures for even
the nastiest of viruses.

0 comments:
Post a Comment