How Computer Viruses Spread

There are many people who just buy and install antivirus programs in their computer. There is nothing wrong with that especially if they can really afford but experts say prevention is better than antivirus programs. You should know how computer viruses spread so that you’ll know how to prevent it from spreading. Here are some ways computer viruses spread to our computers.

The most common way of spreading a computer virus is through infected flash drives. You use flash drives because it is small, mobile and has enough memory to contain some of the common files needed. However, you are also vulnerable to attacks when you use flash drives. Make sure that you have a separate flash drive for your own networks. Using the flash drive especially in public computers puts your own computer in risk of contacting computer viruses.

The internet is used by many people that are looking for videos, pictures and answers to their questions. This can also be a medium to spread computer viruses. There are individuals who attach computer viruses to emails and spread them. There are also those who entice people to click on links and when they click, they will automatically download the virus. Websites also are sources of viruses. When you try to download, they appear as though you are downloading the right file. You only find later on that you have not downloaded at all.

It is necessary therefore to be vigilant always and know the different ways of spreading computer viruses.

Ways to Remove Computer Viruses

Depending on the extent of the attack, there are many ways for removing viruses from your computer. Of course, if you have an antivirus program installed in your computer, there is a big possibility that it will quarantine if not delete the infected file. For the sake of discussion, let us assume that the antivirus program has not detected the virus yet. Here are the different ways to remove a computer virus.

First, you can delete it right there and then. Every time you insert your flash drive, you notice that there are hidden and extra files added. Of course, if you are not the one that copied this file, it is alright to assume that these are computer viruses. Select the questionable files and delete it at once before it infects your other files.

You can also let the antivirus program detect the virus manually. You just have to go to your antivirus program and go to their manual scan. You can set it to scan the location where you think the location is. The antivirus will scan it and once it detects the problem it will quarantine and delete the infected files.

When everything else fails or when your computer no longer functions because of a computer virus infection, then you have no choice but re-install your operating system. You can do a system recovery to install a working operating system. A system recovery will change the operating recovery but will not delete you files especially those that are needed in your line of work.

Another Set of Malwares to Watch Out For

As defenses of other forms of malware are being developed, the common forms of malwares such as viruses and Trojan horses have not become rampant anymore. However, new forms of malwares have also been developed by those who want to exploit those that are not “techy” in terms of using the computer. Here are the new sets of malwares that can attack you.

Every time you use a computer in the internet café, you should watch out for keyloggers. From its name, keyloggers basically records your keystrokes. Whatever you type on the keyboard will be recorded. The aim of keyloggers is to steal accounts particularly in gaming. It can also be used to steal usernames and passwords. Be careful in accessing your important accounts when using public computers.

URL injectors are usually activated when you use a browser. Every time you go to a particular website address, injectors insert a URL on top of the URL that you intend to visit. You will now be diverted to a different website. The other site is usually a replicate or similar to the original website and when users do a transaction in the site, they are actually transacting in a different site. Always verify if you are at the address that you really want to visit.

These are only some of the malwares that have come out lately. Be wary about these malwares because they may seem harmless but actually they do more harm than good. More than the anti-malware programs that you install, being careful is much more important.

Be On Guard against Malwares

Are you confident that you are not under attack every time you open your computer? You probably heard in the news that a new worm has attacked the Pentagon and CIA. If these high-security offices were attacked, what’s the assurance that your computer won’t be attacked as well? You must be wary and be careful about security threats. But what are really these computer threats?

Security and computer threats are collectively called malwares. Malware comes from the words, mal, which is a prefix that means “bad”. Ware comes from the word “software” which is a program that executes commands in the computer. If you put the two words together, malware simply means a bad program that has negative effects on your computer. Malwares actually come in different forms. It is best to know these forms so you’ll know the countermeasures that you need to do.

Viruses are the most common forms of malware. Viruses can delete files, change your files to a different format and flood your memory. To protect yourself from the viruses, you need to install a reliable and updated antivirus program. Antivirus programs are usually expensive so you might need to shell out an amount for a licensed antivirus program.

Exploits are also considered malwares. They are executables that try to replace common computer functions. For example, Microsoft usually asks their users to update security updates. Exploits can take over this function. Actually the security updates are updates to security that have been opened by exploits being discovered regularly.

Types of Malwares

Even if they don’t know it, everyone’s computer is actually exposed to attack. This is because most of the computers today are connected to the internet. The main reason why malwares thrive is because people don’t know that they exist while others underestimate the effect of these malwares. If you don’t want to deal with problems later on, you need to know the different types of malwares.

The first type of malware is a worm. It is actually a virus that duplicates inside a network. Usually worms are sent to the address book and send one to your contacts that are in the address book. Worse, it disguises itself as a valid message coming from you so your contact will open it. Worms are mediums to send download viruses to your contact’s computer.

Trojan horse is another type of malware. It is actually a program that presents itself as a valid program. There are some cases that the program will have an actual function but it has other evil function. Trojan can delete files including system files, disables security features and infect your computer. Trojans could be the culprit of porn pop-ups every time you open a browser.

Of course everyone knows the virus. Just like the actual human virus, it infects the computer and tries to take control of some of the computer functions. They can be programmed to destroy vital date, retrieve passwords and credit card data and send it to the source. Those who created the virus can use the data for personal abuse.