Computer Viruses and it's Remedy

Posted in
No comments
By Unknown


What you should know about your computer virus
Virus is almost seen as a destructive agent by almost all the computer users around the globes. In the mid-1980s two brothers in Pakistan discovered that people were pirating their software and as a result they fired-back by writing the first computer virus, a program that would put a copy of itself and a copyright message on any floppy disk copies their customers made. From these simple beginnings, an entire virus counter-culture has emerged. Today new viruses sweep the planet in minutes and can corrupt data, slow networks down, or harm your reputation
Definition of computer virus
Now to go for the real concept and definition of computer virus. A virus or worm is a computer program that can spread across computers and networks by making copies of itself, usually without the user’s knowledge. Viruses can have harmful effects. These can range from displaying irritating messages to stealing data or giving other users control over your computer.
How does computer infected by viruse?
A virus program has to be run before it can infect your computer. Though viruses have ways of making sure that this happens. They can attach themselves to other programs or hide in code that is run automatically when you open certain types of file. Sometimes they can exploit security flaws in your computer’s operating system to run and to spread themselves automatically. You might receive an infected file in an email attachment, in a download from the internet, or on a disk. As soon as the file is launched, the virus code runs. Then the virus can copy itself to other files or disks and make changes on your computer.
Trojan horses
Trojan horses are programs that pretend to be legitimate software, but actually carry out hidden, harmful functions. For example, DLoader-L arrives in an email attachment and claims to be an urgent update from Microsoft for Windows XP. If you run it, it downloads a program that uses your computer to connect to certain websites, in an attempt to overload them (this is called a denial of service attack). Trojans cannot spread as fast as viruses because they do not make copies of themselves. However, they now often work hand-in-hand with viruses. Viruses may download Trojans which record keystrokes or steal information. On the other hand, some Trojans are used as a means of infecting a computer with a virus.
Worms
Worms are similar to viruses but do not need a carrier program or document. Worms simply create exact copies of themselves and use communications between computers to. Many viruses, such as MyDoom or Bagle, behave like worms and use email to forward themselves.
What can viruses do?
Viruses used to play pranks or stop your computer working, but now they compromise security in more
insidious ways. Here are the things that viruses can do.
Slow down email. Viruses that spread by email, such as Sobig, can generate so much email traffic that servers slow down or crash. Even if this doesn't happen, companies may react to the risk by shutting down servers anyway.
Steal confidential data. The Bugbear-D worm records the user's keystrokes, including passwords, and gives the virus writer access to them.
Use your computer to attack websites.
MyDoom used infected computers to flood the SCO software company's website with data, making the site unusable (a denial of service attack).
Let other users hijack your computer. Some viruses place “backdoor Trojans” on the computer, allowing the virus writer to connect to your computer and use it for their own purposes.
Corrupt data. The Compatable virus makes changes to the data in Excel spreadsheets.
Delete data. The Sircam worm may attempt to delete or overwrite the hard disk on a certain day.
Disable hardware. CIH, also known as Chernobyl, attempts to overwrite the BIOS chip on April 26, making
the computer unusable.
Play pranks. The Netsky-D worm made computers beep sporadically for several hours one morning.
Display messages. Cone-F displays a political message if the month is May.
Damage your credibility. If a virus forwards itself from your computer to your customers and business partners,
they may refuse to do business with you, or demand compensation.
Cause you embarrassment. For example, PolyPost places your documents and your name on sex related newsgroups.

Where are the virus risks?
Viruses can reach your computer via all the routes shown here. You can read more details on the pages that follow.
CDs and floppies
Floppy disks can have a virus in the boot sector. They can also hold infected programs or documents. CDs may also hold infected items.
Programs and documents
Programs and documents can be infected with viruses. When you share them with other users, by putting them on your network or intranet, or by sending them out, the infection can spread.
Email
Email can include infected attachments. If you double click on an infected attachment, you risk infecting your machine. Some emails even include malicious scripts that run as soon as you preview the mail or read the body
text.
The internet
You may download programs or documents that are infected. Security vulnerabilities in your operating system can
also allow viruses to infect your computer via the internet connection, without your having to do anything at all

Email viruses
Many of the most prolific viruses are email-aware: they distribute themselves automatically by email.
Typically, email-aware viruses depend on the user clicking on an attached document. This runs a script that can forward infected documents to other people. The Netsky virus, for example, searches the computer for files that may
contain email addresses (e.g. EML or HTML files), and then uses the email program on your computer to send
itself to those addresses. Some viruses, like Sobig-F, don’t even need to use your email browser; they include their own “SMTP engine” for sending mail. Email viruses may compromise your computer’s security or steal data, but their most common effect is to create excessive email traffic and crash servers.
Email attachments
Any attachment that you receive by email could carry a virus; launching such an attachment can infect your
computer. Even an attachment that appears to be a safe type of file, e.g. a file with a .txt extension, can pose a threat.
That file may be a malicious VBS script with the real file type (.vbs) hidden from view

Viruses, Trojans and worms
In the mid-1980s two brothers in Pakistan discovered that people were pirating
their software. They responded by writing the first computer virus, a program that
would put a copy of itself and a copyright message on any floppy disk copies their customers made. From these simple beginnings, an entire virus counter-culture has emerged. Today new viruses sweep the planet in minutes and can corrupt data, slow networks down, or harm your reputation.



Which files can viruses infect?
Viruses can attach themselves to any code that runs on your computer: programs, documents, or the files that start up the operating system.
Boot sectors
When you switch on your computer, it accesses a part of the disk called the “boot sector”and runs a program that starts the operating system. The earliest viruses replaced this boot sector with their own, modified version. If the user started up their computer from an infected disk, the virus became active.
Programs
Some viruses infect programs. When you start the infected program, the virus is launched first. This type of virus appeared early in virus history but still poses a threat, as the internet makes it easy to distribute programs.
Documents
Word processing or spreadsheet applications often use “macros” to automate tasks. Some viruses take the form of a macro that can spread from one document to another. If you open a document that contains the virus, it copies itself into the application’s startup files and infects other documents you open with that application.

Preventing viruses
There are simple measures you can take to avoid being infected or to deal with viruses if you are infected. For more details, see the “Tips for safer computing” chapter.
Make users aware of the risks  Tell everyone that they are at risk if they open email attachments, download files from websites, or swap disks.
Install anti-virus software and update it regularly Anti-virus programs can detect and often disinfect viruses. If the software offers on-access virus checking, use it.
Use software patches to close security loopholes Watch out for “patches” for your operating system. These often close loopholes that make you vulnerable to viruses.
Use firewalls A firewall can prevent unauthorized access to your network and also prevent viruses sending out information.
Keep backups of all your data Keep backups of all data and software, including operating systems. If you are affected by a virus, you can replace your files and programs with clean copies.

Related Post
Download antivirus and keep your computer safe

0 comments :

Download free antivirus and keep your computer safe from threats

Posted in
No comments
By Unknown

In todays world of internet connectivity, it is very essential to always give one computer the maximum protection against various threats like malware, spyware or adware which can render a whole computer completely usless in a twinkle of an eye.Computer virus often attaks the most esential regions on the system and infects some important document on the system. it is therefore a must for laptop, palmtop or desktop owner to always install antivirus into their system. Antivirus are of various types and each of them have their various degree of protection but depending on the antivirus that sweet your purpose below are the list of all the antivirus software which you can dowlnload, run and install into your computer. I am not in any way affiliated with any of this company but I just list them out for you, so as to be able to make a proper choice of any one that sweet you.



You can also Check Computer Virus and its remedy
We always welcome your questions and comments

0 comments :

TIPS TO RECOVER DATA FROM YOUR DAMAGED HARD DRIVE

Posted in
No comments
By Unknown

I remember years ago while I was just done with my industrial attachment program, I have this Hard drive I bought during my industrial attachment, which was 250GB(the largest hard Disk as at then). I load this Hard disk with lots of Useful information, Software and most especially my concluded industrial project report to be submitted in school, while I was editing my references at that Sunday afternoon on the computer with the hard disk which must be submitted Monday morning  my hard disk just went off. I did everything I could to recover the hard drives but lo and behold all to no avail. I was seriously hot and out of hanger I threw this hard disk away and start my project report afresh at Computer business centre. It was later on I now discover the powerful usage of Freezer to retrieve lost data on the hard drives.
The first thing to do is to remove the drive from the computer and put it in a sealed tick nylon  bag to avoid condensation. Then, put the drive in a freezer and leave it for 14 hours, Next, pull the drive out of the freezer and fixed it up to a computer. If this works, you should be able to copying the files off immediately. Act quickly though because you may only have a few minutes to retrieve your files before the drive starts failing again.
I find it difficult to believe day I came about this not until I give it a trial because I don’t actually know the  trick behind this but I think cooling down the drive will allow the lubrication in the mechanisms to thicken giving a few minutes of usage to recover data before it fail again.
Do you still want to know about Powerful usage of freezer in recovering laptop battery, click here
Always drop your comments

0 comments :

Get 3GB of data free from MTN

Posted in
No comments
By Unknown

For some of you that think this MTN trick is dead, this is to inform you again that MTN trick  is back. Without much story just activate the following code and enjoy it while it lastSend 100H to 131.
Wait till you receive a response that your 100 hrs 30-Data plan is
activated.
In case this did not work you have to keep on trying to. Just be patient and send it like 5 times again.
To check your MB data balance; send 2 in an SMS to 131
now you are Good to go

0 comments :

How to Repair your Dead laptop battery

No comments
By Unknown

It quite alarmming when your brand new laptop battery become unusable again within just 2 year of usage and you begin to wonder why so soon?.  Here is a way out for you to makeyour dead battery back to life again with these simple tips;
Do you know that your deep freezer perform a miracle when it comes to repairing damage laptop battery? So amazing! Yes! so it is, as battery contains electrons inside, which must be brocken to allow the free flow of electrons running in the battery again. Any way don’t let me go into lectures on how its happens just get the following simple steps right away and you are on your way to renew your battery

Step 1:
Put the dead laptop battery in a sealed plastic bag or rap it with a tick nylon .
Step2: 
 Put the rapped battery in the freezer for exactly  18hrs 30min.
 Step3:
Take the rapped battery from the freezer, and let the battery warm up to room temperature.
Step4
After 3hours, Put the battery back into your laptop.
Step5
Charge the battery as much as possible, then leave the laptop on until the battery  discharged completely.
 Step6
Repeat the above steps 4times.

Your formerly-dead battery should now be much more usable now
Don’t hesitate to drop your comments

0 comments :

About the Author

I am an internet expert who love to affect peoples' life positively for self reliance. I am so humble, delligent and creative.

Copyright © 2013 SOLLY TECHNOLOGY.
Designed by SOLLYTECH