this is guide to a virus free computer!!! sit back and keep on reading this guide to facts of how to...

15

Upload: primrose-martin

Post on 12-Jan-2016

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: This is guide to a virus free computer!!! Sit back and keep on reading this guide to facts of how to get a healthy computer. Following these steps will
Page 2: This is guide to a virus free computer!!! Sit back and keep on reading this guide to facts of how to get a healthy computer. Following these steps will

This is

guide to a virus free computer!!!

Sit back and keep on reading this guide to facts of how to get a healthy computer.

Following these steps will help you have more knowledge about your computer and viruses.

Just be sure to remember everything you learn from this guide to help you in the future.

Viruses

Page 3: This is guide to a virus free computer!!! Sit back and keep on reading this guide to facts of how to get a healthy computer. Following these steps will

What is a virus?

A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer;

for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. From Wikipedia

Page 4: This is guide to a virus free computer!!! Sit back and keep on reading this guide to facts of how to get a healthy computer. Following these steps will

Don't panic if your computer seems to have a virus. Common software problems, such as program execution errors and corrupted files, can create symptoms that appear to be virus-related; it is important to distinguish between virus symptoms and those that come from corrupted system files. Try to rule out more standard causes before suspecting a virus. For example, if you just installed new software, try uninstalling it and see if the problems disappear.

However, if your computer begins to act strangely or is unable to do things it has always done in the past, it may be infected with a virus. Symptoms such as longer than normal program load times, unpredictable program behaviour, inexplicable changes in file sizes, inability to boot, strange graphics appearing on your screen, or unusual sounds may indicate a virus on your system.If you cannot boot your computer, contact your local Support Centre for some help. From Knowledge Base

What do you do if you have a virus?

Page 5: This is guide to a virus free computer!!! Sit back and keep on reading this guide to facts of how to get a healthy computer. Following these steps will

1.Get protected. Download at least one of the following anti virus scanners. 2.Don't open attachments. One of the best ways to prevent virus infections is not to open attachments, especially when dangerous viruses are being actively circulated. Even if the e-mail is from a known source, be careful. A few viruses take the mailing lists from an infected computer and send out new messages with its destructive payload attached. Always scan the attached files first for viruses.

How do I avoid a virus?

3.Scan your system regularly. If you're just loading anti-virus software for the first time, it's a good idea to let it scan your entire system. It's better to start with your PC clean and free of virus problems. Make it a regular habit to scan for viruses weekly. 4.Update your anti-virus software. Once you have virus protection software installed, make sure you keep it up to date with downloadable Virus Definitions. Some anti-virus protection programs have a feature that will automatically link to the Internet and add new virus detection code whenever the software vendor discovers a new threat.

Page 6: This is guide to a virus free computer!!! Sit back and keep on reading this guide to facts of how to get a healthy computer. Following these steps will

5.When you download files from the Internet, be careful - if such a file contains a virus and you open the file, your computer could become infected. Don't download any file with an .exc file extension, unless it is from a reliable source. Run a virus checker on any files or programs you download from the Internet before you open or unzip it. 6.Stay informed. There are new virus and security alerts almost every day. Keep up-to-date on breaking viruses by consulting the relevant sites on the Internet, such as:

Computer Emergency Response Team (CERT). Studies Internet security vulnerabilities, provides incident response services, and publishes security alerts and computer virus information. Microsoft.com. Visit Microsoft.com monthly and make sure you have downloaded and installed the latest security patches for your PC. Security Focus. Computer security clearinghouse: includes a calendar, free tools, forums, industry news, and a library. From 1st site free.com

Page 7: This is guide to a virus free computer!!! Sit back and keep on reading this guide to facts of how to get a healthy computer. Following these steps will

Hackers

Hackers are people who try to gain unauthorised access to your computer. This is normally done through the use of a 'backdoor' program installed on your machine. You can protect yourself from these by using a firewall and a good up-to-date anti-virus program. You would normally get such a backdoor program by opening an E-mail attachment containing the backdoor program.

It is normal for such a backdoor program to send out more copies of itself to everyone in your address book, so it is possible for someone you know to unintentionally send you a malicious program. A few backdoor programs can work with any e-mail program by sitting in memory and watching for a connection to a mail server, rather than actually running from within a specific mail program. These programs automatically attach themselves to any e-mail you send, causing you to unintentionally send out malicious programs to your friends and associates.From NC State University

Page 8: This is guide to a virus free computer!!! Sit back and keep on reading this guide to facts of how to get a healthy computer. Following these steps will

What are hackers and why do they do it?Hackers are people who try to gain unauthorised access to your computer. This is normally done through the use of a 'backdoor' program installed on your machine. You can protect yourself from these by using a firewall and a good up-to-date anti-virus program. You would normally get such a backdoor program by opening an E-mail attachment containing the backdoor program.

To a hacker, breaking into someone’s computer is simply a challenge. They may not specifically intend to do damage to the computer. The thrill of simply gaining access is often enough. Hackers often try to show off their skills to the world by hacking into government computers, or as revenge against another user or agency. Hackers are indeed as the stereotype depicts them as; young males with a thirst for knowledge. Despite rumours, all hackers do not wear nerdy glasses. From NC State University

Page 9: This is guide to a virus free computer!!! Sit back and keep on reading this guide to facts of how to get a healthy computer. Following these steps will

How do hackers hack into your computer?The methods hackers use to attack your machine or network are fairly simple. A hacker scans for vulnerable systems by using a demon dialer (which will redial a number repeatedly until a connection is made) or a wardialer (an application that uses a modem to dial thousands of random phone numbers to find another modem connected to a computer).

Another approach used to target computers with persistent connections, such as DSL or cable connections, employs a scanner program that sequentially "pings" IP addresses of networked systems to see if the system is up and running. From Blurt it.com

Page 10: This is guide to a virus free computer!!! Sit back and keep on reading this guide to facts of how to get a healthy computer. Following these steps will

This depends upon what backdoor program(s) are hiding on your PC. Different programs can do different amounts of damage. However, most allow a hacker to smuggle another program onto your PC. This means that if a hacker can't do something using the backdoor program, he can easily put something else onto your computer that can. Hackers can see everything you are doing, and can access any file on your disk.

Hackers can write new files, delete files, edit files, and do practically anything to a file that could be done to a file. A hacker could install several programs on to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information. Some backdoor programs even allow a hacker to listen in on your conversations using your computer's microphone if one is attached! From NC State University

What damage can a hacker do?

Page 11: This is guide to a virus free computer!!! Sit back and keep on reading this guide to facts of how to get a healthy computer. Following these steps will

What are backups?In Information Technology, a backup or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. The verb form is back up in two words, whereas the noun is backup (often used like an adjective in compound nouns).Backups have two distinct purposes. The primary purpose is to recover data as a reaction to data loss, be it by data deletion or corrupted data. Data loss is a very common experience of computer users. 67%

of internet users have suffered serious data loss. The secondary purpose of backups is to recover data from a historical period of time within the constraints of a user-defined data retention policy a historical period of time within the constraints of a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Though backups popularly represent a simple form of disaster recovery, and should be part of a disaster

Page 12: This is guide to a virus free computer!!! Sit back and keep on reading this guide to facts of how to get a healthy computer. Following these steps will

recovery plan, by themselves, backups should not alone be considered disaster recovery. Not all backup systems and/or backup applications are able to reconstitute a computer system, or in turn other complex configurations such as a computer cluster, active directory servers, or a database server, by restoring only data from a backup.From Wikipedia

Page 13: This is guide to a virus free computer!!! Sit back and keep on reading this guide to facts of how to get a healthy computer. Following these steps will

How to use a back up program

Before you can back up important information on your computer, you must install the Backup utility. The Backup utility is included on the Windows XP Home Edition CD. Note If Windows XP Home Edition was preinstalled on your computer and you do not have the original Windows XP CD, contact the computer manufacturer or visit the manufacturer's Web site for more information. You can also use backup software that you purchase separately.

To install the Backup utility from the Windows XP CD: Insert your Windows XP CD into the CD drive or DVD drive of the computer. Click Exit. Locate the CDDrive:\Value Add\Msft\Nt backup folder on the CD. Double-click Ntbackup.msi to install the Backup utility. When the Backup or Restore Wizard prompts you, click Finish. Remove the Windows XP CD.Now that you have installed the Backup utility, you are ready to back up your important information.From Microsoft Help and Support

Page 14: This is guide to a virus free computer!!! Sit back and keep on reading this guide to facts of how to get a healthy computer. Following these steps will

How are backups useful?

Backups can help you retrieve your homework, personal files and work details. All you have to do is click a few buttons and all your work is safe and ready for you to use when you want. The thing about backups is that they have no effect on the system. Backups are really hard for hackers to get into. From Rachel Eigbefoh

Page 15: This is guide to a virus free computer!!! Sit back and keep on reading this guide to facts of how to get a healthy computer. Following these steps will

I hope that The Brownies Guide to a virus free computer has been a lot of use to you.

For further information you can call the local brownies scout club at 0204 356 1238 or visit us at www.viruses.co.uk/brownies

Remember to stay safe on the internet at all times.

Conclusion