Tip 1: How can a computer virus be dangerous?

Tip 1: How can a computer virus be dangerous?


Computer viruses and their modifications appearevery day in tens or even hundreds. Each new virus becomes more intelligent and more dangerous than its predecessor. The degree of harm that such uninvited guests can cause is also growing. Today, viruses threaten not only to spoil the smooth running of the computer, but also to steal your personal data!



How can a computer virus be dangerous?


Instructions


1


If you use electronic purses forpay bills or conduct business negotiations via email, you should beware of spyware. These malicious programs usually get on the computer as part of another, useful software that infects cybercriminals. The virus records all your actions, including entering passwords. After that the spy program sends the received data to its owner, using your connection to the Internet. The result of this type of virus is the theft of all your personal data and access passwords.


2


Another type of virus is the so-called "Trojans". They are dangerous in that they masquerade as standard, useful or entertaining programs and even under information messages of the system. But as soon as the user activates such a virus, it will start to multiply rapidly, infecting more and more files and documents. Trojan programs are usually not aimed at stealing information from a computer, but at destroying it. In addition, many viruses of this type are fraudulent banners that suggest sending an SMS message or investing some money in a profitable financial pyramid. A careless user may not recognize forgery and give a serious amount. And he will do it quite consciously, with his own hands, and there will be no one to blame.


3


The industry of computer viruses is activedevelops and is gaining momentum not by days, but by the hour. Even using a good antivirus, you can not be sure of protection by 100%. Cunning threats increasingly combine several types of viruses at once. They spread with the speed of worms, follow your actions like spies, damage files and information on the computer on the principle of Trojans, and then get away from the system. And all this happens even before your antivirus has time to start work.


4


Modern viruses can "eat" memorycomputer, slow down the system, disrupt the proper functioning of some programs, steal personal data and access passwords, try to mislead you with fraudulent messages or destroy important documents. Therefore, if it seems to you that a virus has appeared in the system, immediately consult a specialist!


5


Remember that a computer virus can not lead to a complete malfunction of the machine and will not launch its malicious code when the computer is turned off. And most importantly, any computer virus can be deleted.



Tip 2: What can damage a computer virus


A computer virus is a malicious program,capable of independently multiplying and transferring from computer to computer via network or through removable media. Sometimes viruses are called all kinds of malicious software.



What can damage a computer virus


Computer virus and its harm

The most innocuous viruses simply occupya significant share of computer resources and, as a result, slow down its work. Therefore, with a noticeable decrease in performance, it makes sense to conduct a deep scan of the system with a reliable anti-virus program. More dangerous programs can delete or change the software installed on the computer, format the hard disk or change the contents of the ROM, and then have to reflash or change the microcircuit. There are viruses that are embedded in documents , created MS Word and MS Excel, using the macros contained in them. Such viruses are written in Visual Basic.

Trojan horses

Trojans fall into the operating system ascomponent code of a seemingly innocuous program, including antivirus. They collect confidential information about the owner of the computer: information about frequently visited sites, access to e-mail for distributing mailings, track keystrokes to calculate passwords, including bank accounts and web purses. In addition, Trojans can overwrite and destroy important information. To avoid getting infected with Trojans, you can not click on the links that people you do not send and download software from unverified sites.

Spyware

This spyware also collects information aboutthe owner of the computer. In addition, spyware can independently install programs and change the network settings of the computer, redirecting the owner to specific sites. To install Spyware, attackers usually use vulnerabilities in operating system security settings, defining open unprotected ports by special scanner programs. Windows Firewall allows you to close the computer ports and reduce the risk of infection.

Adware

Adware launches advertising banners incomputer running time. Sometimes the user is required to send an SMS to a short number to get rid of the banner. Do not do this in any way. It is better to go to the Internet from another computer and enter into the search string of your browser the short number to which you want to send a message. The search will lead to the technical support pages of the antivirus lab, where specialists will report the code for removing ads. Adware infection often occurs when trying to download programs, movies or music from unverified sites.

Antivirus protection

The most popular programs are DrWeb, NOD32,Kaspersky Anti-Virus. The license for them costs about 1500-2500 rubles. for a year. There are very worthy free programs - Avast and the healing utility Dr.Web CureIt. Avast is intended for full protection and treatment of the computer, the Dr.Web utility is only for scanning and treatment for suspected infection. As new viruses appear daily, it is necessary to regularly update the anti-virus database so that they can identify malware in time. In no case can not two antivirus programs run simultaneously - each of them will perceive the other as malicious software and try to deactivate it. As a result, the rest of the processes simply will not be started. It is highly desirable to have a bootable CD or flash disk on which the anti-virus program is installed. Sometimes booting from removable media is the only way to perform an anti-virus scan of your computer.


Tip 3: Computer viruses and protection against them


A computer virus is part of a program,created specially to damage the files and prevent the computer from working without crashing. Typically, the virus distributes its own copies throughout the computer to prevent proper operation. Many viruses are relatively safe: they only send erroneous messages. However, some can delete important files from the hard disk, and then the computer will stop functioning. Special anti-virus programs can detect and remove known viruses.



Computer viruses and protection from them


Instructions


1


Viruses spread by introducing themselves into theThe executable code of other programs or replacing other programs. Thousands of computer viruses are known that spread through the Internet around the world, arranging viral epidemics. Most often, viruses are transmitted via e-mail or removable media. The virus itself can not start: for example, to start a virus received by e-mail, it is required to open an attachment. After activation, the virus injects its code into other programs to get an opportunity for further action. Viruses modify programs or destroy files on the computer.


2


E-mail is one of the main channelsspread of viruses. Usually, viruses in e-mail letters are masked by innocuous attachments: pictures, documents, music, links to websites. One of the most dangerous viruses sent by e-mail was the virus "ILOVEYOU", which spread in 2000. After infecting one computer, he began sending emails to the user's entire address book. The virus renamed files, attempted to crack user passwords. Fortunately, thanks to the mail systems that warned of the spread of this virus, its distribution was stopped.


3


Install the anti-virus program on your computer anddo regular virus checks. To check the computer for viruses, you need to run the antivirus program and click the Start Scan button. Also in the anti-virus program, you can schedule regular computer checks. For example, daily, weekly, etc.




Tip 4: How does the Flame virus work?


Detection of the computer virus Flame has donea lot of noise. It turned out that it was created not by the usual creators of viruses, but by specialists of military departments. This Trojan program was actively used as a cyber weapon against a number of Middle Eastern countries.



How does the Flame virus work?


Computer virus Flame discovered RoelShuvenberg, a computer security specialist at Kaspersky Lab. The malicious program is capable of collecting information, changing computer settings, taking screenshots, recording audio, connecting to chats. The Washington Post, referring to unidentified western officials, reported that Flame was developed by US and Israeli experts. The main purpose of creating the virus was to obtain the information necessary to disrupt the Iranian nuclear program. According to journalists, the Trojan program was developed as part of the program "Olympic Games", already "famous" for the Stuxnet virus. This virus became widely known for its destructive activity in the Iranian uranium enrichment center in Natanz. Flame was discovered after cyberattacks to Iran's refineries. According to some sources, this attack was carried out by Israeli specialists without consulting with their colleagues from the US, which caused great discontent among the latter. They can be understood - the virus became known, it was investigated by experts of anti-virus companies. Nevertheless, the virus is still very dangerous, effective ways to combat it have not yet been found. According to Kaspersky Lab's experts, it can take up to ten years to fully decrypt the virus. Such a long time is explained by the size of the Trojan program - it "weighs" about twenty megabytes, which is just a huge size for a virus. By its structure, a malicious program represents a set of tools for attacking remote computers. First, the base unit of the Trojan program is installed on the opponent's computer, after which up to twenty additional modules that perform specific spy functions can be loaded. The program can intercept network traffic, monitor keystrokes, record audio from a microphone. One of the modules of the virus is able to connect via Bluetooth to nearby cell phones and download all the information from them. Prior to its detection, the virus managed to hit more than six hundred computers, most of the attacks were on objects in the Middle East. In particular, Flame was used against Iran, the Palestinian Autonomy, Syria, Lebanon, Sudan, Saudi Arabia, Egypt.




Tip 5: What are computer viruses and what are they dangerous?


The first computer viruses appeared immediatelyafter the creation of computers. Programmers wrote them just for fun, such viruses did not do any harm. But modern computer viruses are created with completely different purposes and represent a serious danger.



What are computer viruses and what are they dangerous?


Everything that exists today is harmfulSoftware can be divided into two categories: viruses and Trojans. The first simply perform on the infected computer some negative for the user or comic actions - for example, can erase files or completely format the hard drive, shut down the computer, make the user inaccessible mouse, display a message, etc. As a rule, the creators of viruses do not pursue selfish goals, most often such programs are written just for fun. But there are exceptions - for example, viruses that block Windows. The user sees a message in which he is invited to transfer some amount of money to a specific account, after which he will be sent an unlock code. Having encountered such a virus, you should remember the features of the message - in particular, the account number or phone number (if you are offered to refill the phone balance), then go from another computer to the sites of antivirus companies and look for the corresponding unlocker. But even if you can not remove the virus, the worst consequences are formatting the PC hard disk. The Trojan programs are the most dangerous. This type of malware is created to steal confidential data from a person. If the virus is usually visible on the computer, the Trojan program tries to completely hide its presence. Its task is to collect the necessary information - for example, logins, passwords, bank card data or online banking, etc., after which it is imperceptible to transfer everything to the owner of the Trojan. Quality Trojan programs are written by highly qualified programmers and can cost thousands of dollars. A well-made Trojan is completely invisible, it can not be detected by any antivirus program - until the data about the Trojan goes into the anti-virus database. Modern spyware easily bypasses firewalls. Having done its black work, many Trojans self-destruct, leaving no traces behind. You can find out that your computer was infected with a Trojan, after you have lost your money from a bank card, or you will be hacked by mailboxes, admin sites of your sites, etc. There is also a class of viruses like backdoors. Having infected your computer, the virus creates a loophole through it, through which the hacker gets full access to the machine. It can view and copy information from disks, delete or add something. A hacker can use your computer to scan networks and hack other computers to carry out attacks on servers. The management of thousands of compromised computers can be carried out from one center, in this case a botnet is formed - a network of infected computers that are subordinate to one person. Viruses and Trojans represent a huge danger, so they are struggling with all possible means. The main problem is that the principles of building and running the most common Windows operating system today give hackers a lot of opportunities for creating and implementing malicious software. OS developers try to close the gaps, but they still remain too much. Much more safe in this regard is the Linux operating system - it's no accident that many hackers use it. In any case, to protect against viruses and Trojans on your computer, you must have an up-to-date antivirus and firewall. Also, you should follow basic security rules - in particular, do not download or open suspicious files.