Software Info Directory
Provide all information about knowledge ; Technology , Photography , Fashion & Models, Sport , Automotive , Health , Life Style , Bussiness , News , E-comers
Home / Aeromodeling Info directory / News From The Worlds

Technology / Photography / Fashion & Models / Sport / Automotive / Health / Life Style / Bussiness / News / Galery Photo / Politics

 
Google

Free chat widget @ ShoutMix
 
 
Copyright www.knowledgeinfodirectory.50webs.com @ 2008 / Privacy Policy / Contact us by Email / Send us your article
 

viruscomp

A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.

Since 1987, when a virus infected ARPANET, a large network used by the Defense Department and many universities, many antivirus programs have become available. These programs periodically check your computer system for the best-known types of viruses.

Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs.

 
What is virus

The Difference Between a Virus, Worm and Trojan Horse

A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system.

Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

Added into the mix, we also have what is called a blended threat. A blended threat is a sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one threat. Blended threats use server and Internet vulnerabilities to initiate, transmit and spread an attack. This combination of method and techniques means blended threats can spread quickly and cause widespread damage. Characteristics of blended threats include: causes harm, propagates by multiple methods, attacks from multiple points and exploits vulnerabilities.

To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For examplem it wouldn't just launch a DoS attack — it would also install a backdoor and damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. For example, a worm may travel through e-mail, but a single blended threat could use multiple routes such as e-mail, IRC and file-sharing sharing networks.

The actual attack itself is also not limited to a specific act. For example, rather than a specific attack on predetermined .exe files, a blended thread could modify exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.

Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats require no human intervention to propagate.

Combating Viruses, Worms and Trojan Horses

The first steps to protecting your computer are to ensure your operating system (OS) is up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you should have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses. Additionally, you want to make sure your anti-virus program has the capability to scan e-mail and files as they are downloaded from the Internet. This will help prevent malicious programs from even reaching your computer. You should also install a firewall as well.

A firewall is a system that prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in out going e-mails and see this as regular network traffic. For individual home users, the most popular firewall choice is a software firewall. A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network.

It is important to remember that on its own a firewall is not going to rid you of your computer virus problems, but when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will add some extra security and protection for your computer or network.

AVG Awarded PC Authority Best Software Award

AVG recently attended the Australian PC Authority Magazine Reliability and Service Awards and were finalists in the 'Best Software' category. AVG scored 'Highly Commended' for their AVG Anti-Virus Free Edition and scored the 2nd highest rating for user satisfaction.

AVG Anti-Virus Free is the Most Popular Program on CNET Download.com

GRISOFT announced that AVG Anti-Virus Free is the number one downloaded program on all of CNET Download.com. Additionally, AVG Anti-Virus Free is the first most popular and Anti-Virus Pro is the third most popular antivirus based on Editor’s Choice. CNET Download.com is a well-referenced site and is part of CNET Networks, an internationally established online publication and host to technology news and reviews.

AVG picks up not one, but two awards in PC Answers 2007 Awards!

AVG has won further awards, picking up a double whammy in PC Answers 2007 Awards. Both AVG Anti-Spyware and AVG Internet Security were given the PC Answers Recommended Award. PC Answers made note of AVG Anti-Spy ware's removal of all major threats on the infected system, its excellent real-time protection and the program's clear alert messages. Among other features, AVG Internet Security's robust quality and its ease of use, along with AVG's standard two year licence and 50% discount on renewals make it award winning software.

New design of AVG Free Advisor Website and Forum

GRISOFT today launched the newly designed free website and free forums, both of which now have a better look and feel and are easier to navigate through.

Protection for up to 3 home computers

GRISOFT today announced the release of their new product AVG Internet Security Home Edition. It is specifically for home use and offers complete protection for 3 PCs against viruses, spyware, spam and unauthorised access to your computer.
Get AVG Internet Security Home Edition

 
Technology Directory :
Computer & Gadget
Mobile Phone
Software