Have you as many other people ever wondered when we could explore the internet without thinking about some virus attacking our computers and systems? Sadly, this ideal objective is not possible because there will always be any virus not just attacking but damaging our computers and trying to enter through the network to the PC. You will always be exposed to any attack even if you count with the best antivirus. The hackers are creating more and more of these new bad programs and they are stronger, faster and absolutely more annoying than the other ones. Actually these are battling with the new and more sophisticated antivirus.
The technology has provoked the competency movement, better attacks in one hand and by the other one some improves, actualizations etc.
The real objective is avoiding the damage to the computer; reduce the possibility of any virus entering to our PC with many preventions and immunization strategies. But it is really necessary to know what kind of virus is going to attack when someone uses a computer with internet. That way the user can modify the configuration of some parameters and works for the computer to use them so it can prevent the direct contact with this kind of bad programs.
When the virus (or another menace) has infected the PC, it may appear a lot of symptoms in the performance or the configuration, for example, some of them can modify the Windows register, they can slow down the speed of each execution program commonly used by the user, it also can deny the internet exploration or maybe the regular documents download process will be interrupted suddenly. Those kinds of problem are usually caused by some kind of bad code, for that reason the user must know the kind of enemy he is about to fight with.
The viruses are the most dangerous menaces; they have the faculty to change the computer’s configuration completely and causing a bad performance of it, some of them can even increase their number and sometimes they can damage severely the hardware.
The worms are the bugs which get accumulated on the computer; they are the most recognized, inoffensive and easy to eliminate ones. Those programs cannot receive the name “virus” because they do not cause any kind of damage to the PC, simply overload the physical memory so it get slower little by little.
The Trojans are the heaviest and the most difficult to eliminate programs you can mess with, this is because there is no heuristic system to detect them on time, so that way the antivirus cannot even execute a single move against it so it remains useless. This kind of virus can be transferred by the files with the termination .Rar or maybe .Zip. Its method to enter in the computer is very nice and flashing but when it gets downloaded on the system (it may be cause with a simple click in the advertising window or perhaps with a direct download) the problems start to appear all of a sudden. These programs usually work through the chat by sending contact links to another person automatically or maybe with the program peer to peer (P2P) like Emule, Ares or Limewire.
The Jokes work by making pranks to the victims which have been clicking relentlessly on some kind of forum. For example, those little windows appearing on the screen and each time you try to close them up, they get appearing and appearing over and over again, although they will not cause any kind of damage to your computer, they can be really annoying if the user does not count with the necessary patience.
The Hoaxes work almost like the Trojans; they attract their victims with some kind of interesting message so the user will be tempted to visit that website. Those messages are sending massively through the e-mails, the most of them are called Spam or just advertising. They are not dangerous but annoying and their number on the internet is increasing amazingly.
After this short description about “the virus” which can attack our computers, actually it is time to know some ways to avoid being victims of those bad programs.
First, you must install on your computer a really good antivirus (Kaspersky, NOD32) this must be actualized and it also must count with the respective license. Beside you must count with a cookie cleaner program or anti spyware programs like the spybot or the CCleaner.
You must be really careful when you use some USB dispositive with you computer because it may contain any Trojan or something like it.
You must try to avoid any downloading or installation of software through the internet. Likewise the use of crack, patch or key generator may be dangerous.
Finally, please do not open any link or file in the chat, because they are usually sent by the virus itself.