Tuesday, August 26, 2008

Computer Virus and Security Protection Tips

The internet has its fair share of threats and dangers that could harm your PC and access your personal and confidential information without your permission. Computer security entails both detection and prevention from such people and programs. "Prevention" would help in keeping you safe from all such malicious attempts whereas "detection" would inform you whether someone attempted to access/harm your system, either successfully or unsuccessfully and what harm they may have caused.

Why bother about your computer's security anyway? Well, nowadays computers are used for almost everything from shopping to banking and from having casual conversations through internet chat to investing. Yes, much of your information may not be that confidential but you still won't want someone sending forged emails on your behalf or reading your personal or official documentation, like financial statements and bank account information. On a more serious note, an intruder or hacker/cracker may gain access to your computer to launch attacks on other computer systems. With access to your computer they are able to hide their true location while they launch attacks on high profile computer systems, like those of banks and other financial institutions.

Computer hackers / crackers are always looking for weaknesses or holes in the system. Developers are not always able to run comprehensive tests on their softwares because of its ever growing complexity. Later on when these holes are brought to the developer's notice, they create patches to address the problem. So, the number one tip to all computer users is to make sure you obtain and install the patches and security fixes regularly. Some software like chat programs actually allow other users to execute commands on your system which could open the window to all kinds of harmful programs. Therefore there is a need to be more careful when using chat programs of various kinds.

Install a firewall. Hackers/crackers are constantly scanning for known holes or vulnerabilities in the system. Software or hardware based firewalls can provide good protection from such attacks. Having said that, no firewall is capable enough to keep out all threats, therefore having a fire wall is not quite enough.

Use Antivirus software on each PC that connecting to the internet but an anti virus software that is not updated may do little or no good. Some antivirus software comes with automatic update options - these are thoroughly recommended.

Disable JavaScript, Active X and Java if possible. By disabling these scripting languages you will keep your system safe from malicious scripts. By disabling these options you may degrade the functionality of some websites. For More information on disabling scripting languages please visit http://www.cert.org/tech_tips/malicious_code_FAQ.html.

It is also thoroughly recommended to disable scripting features in email programs as many email programs use the same code as web browsers.

Be careful not to open email attachments even if you are familiar with the source of the attachment. The only reason the Melissa virus spread so far and so rapidly was because it originated from a familiar address. Before opening an attachment, make sure your virus definitions are up-to-date, save the file to your hard disk, scan the file using your anti virus software and then open the file. If possible, even disconnect from the internet before you open the file.

Don't run a program that's come from an un-authorized or un-known source. Don't also send these programs to your colleagues and friends as it may contain a Trojan horse (these programs are used to enter into the system and trick the user into installing various programs which allow hackers and intruders access to your system).

Turn off your computer when it is not being used. A turned off system or a system that is completely disconnected from the network is safe from all intruders.

Make a bootable disk which will come in handy if your computer has suffered an intrusion or a hard disk failure. The bootable disk may help your computer recover from such an event but remember, the bootable needs to be created prior to any security breach or malfunction.

Make a back up of all important files on a removable storage device like a CD or DVD and keep the storage device away from the computer. In order to safe space, you may also choose to ZIP your data (compress your data) using a compression software while making a backup.

For more PC security tips, advice and anti virus software reviews visit http://www.antivirus-software.com

No comments: