Protected: isn’t that a comfortable
and reassuring word? Just like human protection, computer protection
is important and quite simple. First you have to understand your opponent,
know what he is thinking, find the smartest way to keep him away, and
then, if he still persists, attack! Today, your computer invader can
come in 3 different forms: The Virus, the Worm, or the Trojan horse
(“How Computer Viruses Work”-Howstuffworks.com). A Virus
is usually a small piece of software that has attached itself to a real
program, so that every time this program is run, the virus can use it
to duplicate (“How Computer Viruses Work”-Howstuffworks.com).
A Worm is a small piece of software that uses computer networks to filter
through and copy itself. (“How Computer Viruses Work”-Howstuffworks.com).
It usually searches other computers on a connected network, and goes
into that computer, implants itself, and then continues the same process
from there. A Trojan Horse is a computer program, it is usually named
something else so that people believe it to be a regular program, install
it, and end up installing an infected file. The Trojan horse may be
running at the same time as the game that you just opened, but as you
play the game, its malicious forces are at work (“How Computer
Viruses Work”-Howstuffworks.com).
You are now thinking, “How do I know that one of these beasts
has infiltrated itself into my computer?” The first type of intruder,
the virus, can be downloaded as an infected game. The virus is designed
to run when the program starts running. So, as soon as you start playing
the game, the virus loads itself into the computer memory and looks
around to see if it can find any other programs on the disk. If it can
find what its looking for, it modifies it to add its code to the program,
and then it starts the destruction. By now, the virus has now reproduced
itself, so two programs are infected. This continues the next time either
of those programs gets executed, and so starting an endless cycle. This
spreading part is the infection phase of the virus. You can get any
of these viruses by inserting an infected disk or CD, by downloading
a bad program, or by opening an email attachment. Through an email attachment,
you can not only get a virus but it can also introduce our second intruder
the worm. The worm secretly carries damaging software in a "plain
wrapper." The plain wrapper is normally an e-mail file attachment
from someone you may or may not know. When you run the attachment, it
can do all sorts of things, from erasing files to changing your desktop.
It then sends itself along to other people in your address book so that
it can duplicate itself (“How do Viruses and Worms spread in email?”-Howstuffworks.com).
As soon as they have spread, most viruses and worms have an attack phase
where they damage something on the computer. This phase is decided by
the programmer, when the time comes, they will activate their attack
phase, and can do something as silly as printing pictures, or as drastic
as erasing your hard drive. Finally, we come to our third invader, the
Trojan horse which usually sneaks in as if it has another purpose. However,
he will end up destroying files, but it's most common use is to create
a back door for intruders to access and control your computer. Fortunately,
Trojan Horses do not replicate like viruses and worms, but it still
allows a lot of control to the ones who manage to infiltrate the computer
using a backdoor access (Computer Viruses- How they work and what they
do- http://www.bcentral.co.uk/technology/security/WhatisVirus.asp).
I know that you’re now thinking “How do I know if these
evil forces are at work?” Well, there are a few noticeable characteristics
of computer infections. One characteristic could be the changed program
size. Many of your programs have files which make them start up. These
files are called .exe files. If your computer has a virus, some .exe
files can be bigger, because the virus has attached itself and is trying
to pretend that it is part of the program. Another hint is the change
of the macro characteristics. This means that the contents of your document
or the original settings have been changed, or maybe a password was
automatically set or some of your files were deleted. This shows you
that if you or some other person has not changed these settings, you
have an evil force at work. A third characteristic could be slower operation
of your computer. When it implants itself, a virus starts to take up
space in memory, and then the amount of time it takes to load programs
may start slowing down. This could be a hint that something is going
wrong. Our final hint is unusual screen activity. The many different
viruses cause different symptoms. Some viruses cause letters to fall
down to the bottom of the screen or present strange messages such as,
"Your computer is now stoned." (Characteristics of a Virus-
http://howto.lycos.com)
Hopefully none of you have ever seen something like that happen, however,
in the future, if you ever suspect that you have a virus, there are
a few things that you should do: First of all stop using your computer.
Once you detect a virus, do not try to delete files or keep working
on an infected machine. If possible, exit all open programs and shut
the computer down normally. Unless it’s a life or death situation
don't save files on diskettes since many viruses are transferred on
floppy disks, never put a disk into a computer you think may be infected.
If your computer has a virus, you need to virus-check all of your floppy
diskettes or else you may just re-infect your computer. Next, confirm
that you have a virus by running a virus-detection program to make sure
that a virus is present and that what you saw was not caused by some
other problem. The virus checker will identify and remove any virus
that's found. Finally, scan all floppy disks If your computer does,
in fact, have a virus, you need to scan all of your disks to make sure
that they are not infected. If you don't do this, you could re-infect
your computer (Recover from a Virus http://howto.lycos.com/lycos/step/1,,110+23608+15031,00.html).
Ok- Don’t panic, there are ways to avoid all of these disastrous
intrusions and destructions. Just like self defense classes, and mace,
we have our powerful Anti-Virus programs. These programs pretty much
do everything for you to check for viruses and to get rid of them. The
first thing the program does is that it checks the computer memory when
you first start your computer. Since many viruses hide in the memory
and start up with your computer. It then checks for the “signature”.
Each virus has its own particular "signature." By searching
for this, the anti-virus software is able to determine which virus it
is and how to delete it from the computer. Another thing it does it
that it checks before opening files. It always allows you to specify
which types of files will be checked before opening them. If you don't
specify, the software automatically checks executable (.exe) files,
since these are the most common types of files to be infected. Finally,
the last and best function: it gives a notification of detected viruses.
If a virus is found, you will be notified. Most anti-virus software
will present a screen asking you what you would like to do and it gives
you choices and suggestions of what should be done. It is best to follow
what the software advises. It will usually destroy the virus and then
try to repair the file and if the file cannot be repaired, the file
will be deleted (How Anti-Virus Software Works-http://howto.lycos.com/lycos/step/1,,110+23608+15019,00.html).
Along with the anti-virus, we also have our dear companion the firewall.
A firewall is a program or hardware device that filters the information
coming through the Internet connection into your private computer system.
If an incoming packet of information is caught by the filters, it is
not allowed through. Firewalls usually have 3 different ways of filtering
traffic. The first way is Packet filtering, where Packets (small chunks
of data) are analyzed against a set of filters. Only the packets that
make it through the security system get let into the computer, the others
are usually blocked. The next technique is called Proxy service where
Information from the Internet is retrieved by the firewall and then
sent to the requesting system and vice versa. Finally, there is the
Stateful inspection which is a newer method that doesn't examine the
contents of each packet but instead compares certain key parts of the
packet to a database of trusted information. If the information is safe,
it is allowed through, if not, like the other instances, it is rejected.
One of the best things about a firewall is that it stops anyone on the
outside from logging onto a computer. It usually stops anyone trying
to get into your computer, sometimes also helps you get rid of annoying
pop-up ads, and other frustrating or abusive use of the internet. (How
Firewalls Work- How stuff works.com)
Overwhelmed? Don’t worry, this is all very simple and easy to
get. All you really need to do is to get yourself the program, install
it, and let it do its job. Its just as simple as knowing which streets
to avoid at night. Practically all of these programs are available online,
or at your local computer store. They are usually worth the money, and
most of them are available for free trial online. From now on you will
never have to worry about how to protect yourself from the beasts of
the internet. Read on for more information on the best products available
in the market today!

References:
Howstuffworks.com
“How Computer Viruses Work”
http://computer.howstuffworks.com
Howto.Lycos.com
Characteristics of a Virus http://howto.lycos.com/lycos/step/1,,110+23608+15029,00.html
Howstuffworks.com
“How do Viruses and Worms spread in email?”
http://computer.howstuffworks.com
Microsoft BCentral
Computer Viruses- How they work and what they do
http://www.bcentral.co.uk/technology/security/WhatisVirus.asp
Howto.Lycos.com
How Anti-Virus Software Works
http://howto.lycos.com/lycos/step/1,,110+23608+15019,00.html
Howstuffworks.com
“How Firewalls Work”
http://computer.howstuffworks.com/firewall3.htm
Howto.Lycos.com
Recover from a Virus
http://howto.lycos.com/lycos/step/1,,110+23608+15031,00.html
|