Protected: isn’t that a comfortable and reassuring word? Just like human protection, computer protection is important and quite simple. First you have to understand your opponent, know what he is thinking, find the smartest way to keep him away, and then, if he still persists, attack! Today, your computer invader can come in 3 different forms: The Virus, the Worm, or the Trojan horse (“How Computer Viruses Work”-Howstuffworks.com). A Virus is usually a small piece of software that has attached itself to a real program, so that every time this program is run, the virus can use it to duplicate (“How Computer Viruses Work”-Howstuffworks.com). A Worm is a small piece of software that uses computer networks to filter through and copy itself. (“How Computer Viruses Work”-Howstuffworks.com). It usually searches other computers on a connected network, and goes into that computer, implants itself, and then continues the same process from there. A Trojan Horse is a computer program, it is usually named something else so that people believe it to be a regular program, install it, and end up installing an infected file. The Trojan horse may be running at the same time as the game that you just opened, but as you play the game, its malicious forces are at work (“How Computer Viruses Work”-Howstuffworks.com).


You are now thinking, “How do I know that one of these beasts has infiltrated itself into my computer?” The first type of intruder, the virus, can be downloaded as an infected game. The virus is designed to run when the program starts running. So, as soon as you start playing the game, the virus loads itself into the computer memory and looks around to see if it can find any other programs on the disk. If it can find what its looking for, it modifies it to add its code to the program, and then it starts the destruction. By now, the virus has now reproduced itself, so two programs are infected. This continues the next time either of those programs gets executed, and so starting an endless cycle. This spreading part is the infection phase of the virus. You can get any of these viruses by inserting an infected disk or CD, by downloading a bad program, or by opening an email attachment. Through an email attachment, you can not only get a virus but it can also introduce our second intruder the worm. The worm secretly carries damaging software in a "plain wrapper." The plain wrapper is normally an e-mail file attachment from someone you may or may not know. When you run the attachment, it can do all sorts of things, from erasing files to changing your desktop. It then sends itself along to other people in your address book so that it can duplicate itself (“How do Viruses and Worms spread in email?”-Howstuffworks.com). As soon as they have spread, most viruses and worms have an attack phase where they damage something on the computer. This phase is decided by the programmer, when the time comes, they will activate their attack phase, and can do something as silly as printing pictures, or as drastic as erasing your hard drive. Finally, we come to our third invader, the Trojan horse which usually sneaks in as if it has another purpose. However, he will end up destroying files, but it's most common use is to create a back door for intruders to access and control your computer. Fortunately, Trojan Horses do not replicate like viruses and worms, but it still allows a lot of control to the ones who manage to infiltrate the computer using a backdoor access (Computer Viruses- How they work and what they do- http://www.bcentral.co.uk/technology/security/WhatisVirus.asp).


I know that you’re now thinking “How do I know if these evil forces are at work?” Well, there are a few noticeable characteristics of computer infections. One characteristic could be the changed program size. Many of your programs have files which make them start up. These files are called .exe files. If your computer has a virus, some .exe files can be bigger, because the virus has attached itself and is trying to pretend that it is part of the program. Another hint is the change of the macro characteristics. This means that the contents of your document or the original settings have been changed, or maybe a password was automatically set or some of your files were deleted. This shows you that if you or some other person has not changed these settings, you have an evil force at work. A third characteristic could be slower operation of your computer. When it implants itself, a virus starts to take up space in memory, and then the amount of time it takes to load programs may start slowing down. This could be a hint that something is going wrong. Our final hint is unusual screen activity. The many different viruses cause different symptoms. Some viruses cause letters to fall down to the bottom of the screen or present strange messages such as, "Your computer is now stoned." (Characteristics of a Virus- http://howto.lycos.com)


Hopefully none of you have ever seen something like that happen, however, in the future, if you ever suspect that you have a virus, there are a few things that you should do: First of all stop using your computer. Once you detect a virus, do not try to delete files or keep working on an infected machine. If possible, exit all open programs and shut the computer down normally. Unless it’s a life or death situation don't save files on diskettes since many viruses are transferred on floppy disks, never put a disk into a computer you think may be infected. If your computer has a virus, you need to virus-check all of your floppy diskettes or else you may just re-infect your computer. Next, confirm that you have a virus by running a virus-detection program to make sure that a virus is present and that what you saw was not caused by some other problem. The virus checker will identify and remove any virus that's found. Finally, scan all floppy disks If your computer does, in fact, have a virus, you need to scan all of your disks to make sure that they are not infected. If you don't do this, you could re-infect your computer (Recover from a Virus http://howto.lycos.com/lycos/step/1,,110+23608+15031,00.html).


Ok- Don’t panic, there are ways to avoid all of these disastrous intrusions and destructions. Just like self defense classes, and mace, we have our powerful Anti-Virus programs. These programs pretty much do everything for you to check for viruses and to get rid of them. The first thing the program does is that it checks the computer memory when you first start your computer. Since many viruses hide in the memory and start up with your computer. It then checks for the “signature”. Each virus has its own particular "signature." By searching for this, the anti-virus software is able to determine which virus it is and how to delete it from the computer. Another thing it does it that it checks before opening files. It always allows you to specify which types of files will be checked before opening them. If you don't specify, the software automatically checks executable (.exe) files, since these are the most common types of files to be infected. Finally, the last and best function: it gives a notification of detected viruses. If a virus is found, you will be notified. Most anti-virus software will present a screen asking you what you would like to do and it gives you choices and suggestions of what should be done. It is best to follow what the software advises. It will usually destroy the virus and then try to repair the file and if the file cannot be repaired, the file will be deleted (How Anti-Virus Software Works-http://howto.lycos.com/lycos/step/1,,110+23608+15019,00.html).


Along with the anti-virus, we also have our dear companion the firewall. A firewall is a program or hardware device that filters the information coming through the Internet connection into your private computer system. If an incoming packet of information is caught by the filters, it is not allowed through. Firewalls usually have 3 different ways of filtering traffic. The first way is Packet filtering, where Packets (small chunks of data) are analyzed against a set of filters. Only the packets that make it through the security system get let into the computer, the others are usually blocked. The next technique is called Proxy service where Information from the Internet is retrieved by the firewall and then sent to the requesting system and vice versa. Finally, there is the Stateful inspection which is a newer method that doesn't examine the contents of each packet but instead compares certain key parts of the packet to a database of trusted information. If the information is safe, it is allowed through, if not, like the other instances, it is rejected. One of the best things about a firewall is that it stops anyone on the outside from logging onto a computer. It usually stops anyone trying to get into your computer, sometimes also helps you get rid of annoying pop-up ads, and other frustrating or abusive use of the internet. (How Firewalls Work- How stuff works.com)


Overwhelmed? Don’t worry, this is all very simple and easy to get. All you really need to do is to get yourself the program, install it, and let it do its job. Its just as simple as knowing which streets to avoid at night. Practically all of these programs are available online, or at your local computer store. They are usually worth the money, and most of them are available for free trial online. From now on you will never have to worry about how to protect yourself from the beasts of the internet. Read on for more information on the best products available in the market today!

References:
Howstuffworks.com
“How Computer Viruses Work”
http://computer.howstuffworks.com

Howto.Lycos.com
Characteristics of a Virus http://howto.lycos.com/lycos/step/1,,110+23608+15029,00.html

Howstuffworks.com
“How do Viruses and Worms spread in email?”
http://computer.howstuffworks.com


Microsoft BCentral
Computer Viruses- How they work and what they do
http://www.bcentral.co.uk/technology/security/WhatisVirus.asp

Howto.Lycos.com
How Anti-Virus Software Works
http://howto.lycos.com/lycos/step/1,,110+23608+15019,00.html

Howstuffworks.com
“How Firewalls Work”
http://computer.howstuffworks.com/firewall3.htm

Howto.Lycos.com
Recover from a Virus
http://howto.lycos.com/lycos/step/1,,110+23608+15031,00.html