Continued from page 1
Nowadays, most viruses are spread in
form of e-mail attachments. This is because some of
worst recent viruses relay on recipients that throw away common sense and launch a deadly e-mail attachment. Commonly
attachments are with extensions that include .bat, .com, .exe, .pif, .scr, and .vbs. Sometimes to avoid
filters of antivirus software, virus creators enclose their malicious code in a .zip or .rar archive file. The file might even have a password to full antivirus programs that scan inside archives. And obviously,
password is included in
message as an image for
convenience of
naive user. As a simple but reliable rule, you should never open an attachment that you didn’t expect to receive, even if it came from someone you know. Also, make sure your e-mail software is configured so it will not automatically open attachments.
Another common way of spreading viruses is file sharing. Many viruses spread themselves throughout open network shares. You can protect your computer not sharing files or directories over
network. But if you don’t have a choice and you have to share your files, you are still able to reduce
risk of being infected by installing antivirus software and keeping it updated. Other ways to become infected with viruses are downloading files or software from
Internet, instant messaging or even web pages.
If
file you are downloading or
computer you are downloading it from is infected with a virus, there is a big chance that your computer will also become infected with
virus. As for
instant messaging,
major risk comes from accepting files from other users on
network. This risk can be minimized by configuring your antivirus software to scan all incoming files and also configure your other programs not to automatically accept files, and not to automatically execute
files you accept. Certain viruses are known to infect web servers. If you visit a website from an infected server, your computer could be infected with
same virus, but this is a very rare method of infection.
There are many different threats that are targeting
computers. Although they are very different, all of them are popularly called viruses. A virus by definition is a self-replicating file, not considering whether it is malicious or not. Another type of
so called viruses are worms; they circulate mainly through e-mail but also spread through a network. A worm is aware he is located in a network and uses it for replicating itself. Trojan horses (or trojans) are mostly used to insert some remote tools into a system in order to give
attacker free access to that system, without
user’s knowledge. Most Trojan horses cannot replicate automatically.
With
increased number of Internet users,
existing threats are also raising as now there are many more computers to attack and more people that don’t know to stay away from these threats. But
antivirus software producers are making it easier for us. There is a lot of antivirus software which cover a lot of threats. All we have to do is install one.

Mike Ber is the owner of the Canadian Domain Name Portal called www.Every.ca He is also a contributing author to www.ComputerMagazine.ca, www.Developer.ca, and www.XP.ca