Daily Tips Ndtricks

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 17 March 2013

Ways to Prevent Computer Viruses

Posted on 02:50 by Unknown
Computer viruses affect systems in different ways. Some wipe out or corrupt data in the system while others steal sensitive user information. While many people take insurance policies to protect their homes and property, many more seldom do the same in protecting their digital information. The initial steps of data protection may take a while but the results would be worth the effort. Securing a computer from viruses involves various strategies.

A special procedure is given below (At the end of this article),  to check if your Antivirus software is working in the right way or not!

Antivirus:

Those who do not have an antivirus application, can Download or buy one on the internet. Ensure the program is compatible with the operating system. The antivirus application should be updated frequently so that it protects against the latest virus definitions. Choose antivirus software that can update and scan automatically. Do not install applications from untrusted sites. Run full system scans at least once or twice a week. Heavy internet users should do this more often.

Dont miss: Beaware Of Viruses On Social Networking Sites!

Firewall:

Turn on the Firewall. This is normally the base of the operating system. Users just have to turn it on. Firewall refers to software that monitors what comes in and goes out of the machine. It acts as a gatekeeper. Learn more about firewall and it's function here.

Updates:

Activate security updates to keep the system up to date. Make sure third party applications such as web browsers are also updated. Most programs have a feature that notifies users when a new program version has been released. Be sure to update all active programs. Keep the operating system updated. Many manufacturers create security patches, which they send out as needed. Setting automatic updates allows the operating system to download and install the security patches eliminating security risks including viruses.

Back up:

Back up data. This provides an extra layer of protection against Data loss. There are so many factors that can compromise data security including undiscovered bugs, downloading infected files, hardware failure and clicking on the wrong link. This is why backup is an essential part of smart computer usage. Find more about data loss and how to prevent it here.

Date Encryption:

Encrypt data using encryption software. Many operating systems have encryption capabilities. Users can encrypt their entire hard drives to protect data from virus attacks. Some encryption programs can create virtual hard drives to secure all files and prevent corruption by viruses. Choose an encryption program that allows synchronization with data protection services that store data offsite.

E-Mails:

One of the most common means of getting a virus infection is through e-mail links containing viruses. Do not open e-mail attachments and links from strangers. If necessary, visit the sites directly.

There are many strategies used to protect computer systems from getting a virus infection. However, the most basic protection against viruses involves using the right antivirus application and updating the computer system on a regular basis.

Here is A simple Way to check if your antivirus Works Or Not?

Follow the below steps:
  • Open notepad.
  • Copy the below text and paste it on the notepad.
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
  • Then save it as eicar.com
On opening the saved file you should get a message from your Antivirus as Malware detected or Virus, And that file has to be automatically deleted by your antivirus.

But Don't worry eicar.com is not a virus, It is a standard test file. :)

This is what the message i got by doing so, and the file got deleted automatically.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Computer Tips, Security Tips | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Being Smart For Used Smartphones
    On seeing our article on " Interesting Facts About Smartphone " You might be dying to have a Smartphone, it’s in, it’s cool, it’...
  • Protect Your Business Information: Data Security Guidelines
    We live in a digital era and there are not only traditional hazards that endanger our business. Cyber attacks are becoming more and more co...
  • Invisible Yahoo Detector
    Invisible detect users on Yahoo! Messenger (YM)         Use our Invisible Yahoo Scanner to detect if a Yahoo Messenger users is in fact offl...
  • 5 Reasons To Use A Website Builder
    If you don’t have a personal website, but you’re dreaming about launching one, you’ve come to the right place. In this article I’m going to...
  • Tips and Tricks about Online Bargains
    The internet, with the myriads of interconnected computers and sites, its not impossible that there is something good waiting to be discover...
  • Pros And Cons Of IPhones
    Img. Credit:  freedigitalphotos There is a great deal of buzz in the smart phone arena as of late. With the HTC Droid DNA and the upcoming ...

Categories

  • android apps
  • apps
  • blogging
  • Blogging How To
  • Blogging Tips
  • Blogging Tools
  • business
  • Buying Guide
  • Cloud Computing
  • Computer Tips
  • Computer tricks
  • domain
  • Downloads
  • Earn Online
  • Facebook
  • Facebook Tricks
  • freewares
  • gadgets
  • games
  • Gaming
  • Gaming Tips
  • Gaming Tools
  • Google Glass
  • how to
  • Infographics
  • iphone
  • iphone apps
  • Mobile Tips
  • Mobile Tricks
  • Online Tips
  • Online Tricks
  • Other Tricks
  • printers
  • QR Code
  • recycle
  • review
  • Security Tips
  • seo
  • social media
  • softwares
  • Tech
  • tips
  • Tips -Computer Tips
  • tricks
  • Useful Tools
  • Web host
  • website
  • wet mobile
  • windows phone 8
  • youtube

Blog Archive

  • ▼  2013 (331)
    • ►  December (3)
    • ►  November (11)
    • ►  October (23)
    • ►  September (27)
    • ►  August (26)
    • ►  July (25)
    • ►  June (36)
    • ►  May (56)
    • ►  April (30)
    • ▼  March (31)
      • How To Get Free Mobile Recharge/Airtime
      • How To Boot Ubuntu From A USB Flash Drive
      • Secret Codes For Your Android Mobile
      • What are Cloud Services?
      • Forget Your Windows 7 Password? Create Windows 7 P...
      • How To Create Bootable Windows 8 Usb Drive
      • Flipped Text Generator ʎuunɟ
      • Facebook Chat Letters Generator
      • Now You Can Watch TV, Anytime...Anywhere!
      • 4 Best Apps For Learning On The Go
      • Challenge: Can You Install New Theme In Your WP Si...
      • Google Apps for Businesses
      • How To Make A Folder Invisible?
      • Ways to Prevent Computer Viruses
      • Beaware Of Viruses On Social Networking Sites!
      • 10 Best Educational Apps Of 2013
      • Keeping Personal Data Safe: Mistakes You Should Avoid
      • Android Apps You Can't Miss This Year
      • Protecting Yourself Against Online Identity Thieves
      • How To Choose A Best 2.1 Speaker System
      • 15 Useful Google Tricks
      • What To Look For When Buying A New Android Tablet?
      • Why Is Blu Ray Better Than Standard DVD?
      • What Is Buffering And It's Facts
      • Different Types of Malware
      • How To Move Your Blogspot Blog To Your Own Domain
      • How Firewall Work's
      • Free Software To Split And Merge Large Files [Free...
      • Using Google Webmaster Tools
      • Find the Speed Of Your Hard Disk, Pendrive, etc.. ...
      • Special Features Of Employee Monitoring Software I...
    • ►  February (31)
    • ►  January (32)
  • ►  2012 (43)
    • ►  December (11)
    • ►  November (2)
    • ►  October (2)
    • ►  September (9)
    • ►  August (18)
    • ►  July (1)
Powered by Blogger.

About Me

Unknown
View my complete profile