Friday, August 21, 2009

Virus Galore

A lot of people have some knowledge to what a computer virus is but they have a very limited amount on the subject. I think this is something that many people need to know about and they should read this to better protect themselves because I am going to go in depth about them and how to prevent them as best as possible.

To start off, a computer virus is like the flu. It enters into your body without your permission and sometimes with your permission. A computer virus can enter your computer through an Internet website that you didn’t know contained it, and the flu can enter your body from walking by someone. The other method is that you may bring it on yourself when you open an attachment in your email which will load the virus into your computer. You can get the flu by going to a country that has been established of being flu-like. Viruses can spread from computer to computer in some form of an executive code. Most viruses have an extension of .exe which executes code that set several functions into motion. For instance, when someone clicks an executive file that is a malicious, the program can run for hours and even days recording every keystroke that you type which makes everything you do on the computer at risk. So if you have a virus, it has the potential to copy your passwords, bank account information, emails, and anything else that you do. A virus is also referred to as malware, adware, and spyware.

Viruses can be transferred from any removable device like a floppy disk, CD, DVD, or even the most common, a USB drive. When someone thinks of computer worms or Trojan horses, they think it is a virus and it is technically different. These are more of a computer worm infection which can exploit security vulnerabilities which spread itself to other computer without needing to be transferred as a part of a host. But a Trojan horse is a program that appears harmless but has a hidden agenda that can cause much damage to the computer.

A virus can attach itself to an actual software program that is legitimate. So when the program that you think is safe is run, it will start the virus. For the virus to replicate itself, it must be permitted to execute the code and write it to the memory which is done by clicking on an executable program. So how do these viruses hide themselves so we cannot just see them on our desktop or in one of our Document folders? Well the virus can attach itself the unused areas of the executive program; this is called a cavity virus. Some of the examples of cavity viruses are the CIH Virus or the Chernobyl virus. The name alone says that they cannot be a good thing. Sometimes when you go to the task manager by clicking “Ctrl + Alt + Del” you can see the process that is running on your computer at that moment. Well, a virus can avoids being detected by killing the task that is attacking. People who create viruses try to make sure that they are never found. Many viruses use stealth technology which trys to trick the anti-virus program by intercepting its request to the operating system. So it hides itself by intercepting the anti-virus software’s request to read the file and passing the request to the virus, instead of the operating system.

The best way to get rid of a virus is to do a system restore which restores the registry and critical system files to a previous checkpoint. Many people think that just because they restart the computer when a problem happens that it will fix it and this is in no manner true. The system restore feature saves the files to a separate partition on your hard drive so when you can load the operating system from a different part of the hard drive that doesn’t contain the virus. But like I have said earlier, many people develop viruses that make it difficult to get rid of like the “CiaDoor” virus. This virus will disable important tools and resources like the Task Manager and the command prompt. The only way that you can fix this problem, is just to reinstall the operating system. It reformats the operating system hard drive partition and installs everything back to the way when it was purchased. It is like a brand new computer then. This method is guaranteed to remove and viruses, spyware, and malware. But the con to this is having to reload the software programs, reconfiguring everything, and restoring the users preferences.


Here are some really good virus programs. This information is taken from here:


Norton Internet Security 2009

Symantec's antivirus products have historically always provided excellent detection and removal of malware. On the downside, that protection came at the price of often crippling system performance. That's now a thing of the past. Performance overhauls are the hallmark of Norton Internet Security 2009, which features 'pulse updates' to deliver more frequent and thus smaller signature updates, whitelisting to streamline scan times, and a lighter, sleeker footprint that installs in mere minutes.


Avira AntiVir PersonalEdition Premium

AntiVir is a consistent leader in independent antivirus tests. Avira's AntiVir PersonalEdition Premium is a low-impact, easy to use virus scanner that also the ability to make an antivirus rescue CD for your system. Also includes WebGuard to protect against malicious or compromised websites. Five euros of each purchase is automatically donated to the Auerbach Foundation, a non-profit that supports various charity and community-related services. AntiVir PersonalEdition Premium should be used in conjunction with a firewall.


McAfee VirusScan Plus

McAfee VirusScan Plus is an ideal candidate for those seeking an antivirus/firewall combination without all the bloat of traditional Internet security suites. McAfee VirusScan Plus makes an easy job of removing adware and spyware, something not all antivirus products deliver. SiteAdvisor service is including, helping to guard against malicious websites.


Kaspersky Anti-Virus Personal

Kaspersky Anti-Virus Personal offers excellent antivirus protection, perhaps unsurpassed in its ability to unpack and scan compressed files - something that trips up a lot of other vendors. Should be used in conjunction with a firewall.


Panda Antivirus Pro 2009

Panda Antivirus Pro 2009 combines antivirus, antispyware, antiphishing and a firewall with its highly touted behavior-based TruPrevent Technology. License covers use on up to three computers and includes free tech support via email (telephone support options are also available).


BitDefender Antivirus Plus

Softwin's BitDefender Professional protects against viruses, spyware, and instant messaging threats, as well as offering firewall rules to block undesirable traffic and a privacy gateway to keep your identity and preferences private while surfing the Internet


Eset Nod32

Nod32 features a small footprint, low performance hit, and fast scan speeds, providing focused virus protection ideal for gamers or those with an older PC. Should be used in conjunction with a firewall.


AVG Anti-Malware

AVG Anti-Malware combines traditional virus protection with adware and spyware scanning, in a low impact footprint ideal for resource-strained PCs or those who just want the best performance possible out of their computers. Free tech support is available via email and the standard license includes two years of protection. Should be used in conjunction with a firewall.


G Data AntiVirusKit (AVK)

AntiVirusKit (AVK) provides a double layer of protection, bundling two of the best antivirus engines - Kaspersky and BitDefender - under a single, easy-to-use console. You'll want to bolster G Data's AVK with a firewall.


F-PROT Antivirus

F-PROT Antivirus for Windows offers a feature that's increasingly harder to find - it includes a command-line scanner that can be used to create a rescue CD for scanning the system in Safe Mode. This is a particularly effective way to remove stubborn resuscitators. Firewall not included.

Those are some really good programs but I use Trend Micro PC-Cillin and I think it is the best. It finds the viruses very quickly and removes them without slowing down the computer.

If you have any questions then please send me a comment or email.


No comments:

Post a Comment