Docstoc

Combating Viruses

Document Sample
Combating Viruses Powered By Docstoc
					Combating Viruses



Two simple precautions can help keep your computer virus free - install
and use software from reliable vendors and avoid opening unexpected e-
mail attachments.

Almost all e-mail attachments are potential virus carriers. Some of the
most famous viruses were distributed by accessing address books of
infected computers and sending e-mail (with attachments) to everyone in
the address book.

Even those from known senders should be regarded with suspicion - e-mail
addresses can easily be faked to appear to be from someone you know.

The 'Melissa' virus that appeared in 1999, originally posted on an
Internet newsgroup, was distributed in a Microsoft Word document. When
downloaded and opened the virus accessed the user's address book and sent
copies of the document (along with the virus) to the first 50 people in
the user's address book.

Every computer that received the virus sent out an additional 50 copies,
creating a worldwide slowdown in Internet networks. The effect took only
a few hours.

Another widespread virus distributed by e-mail was the 'ILOVEYOU' virus
of 2000. When double clicked it sent copies of itself to every e-mail
address in the infected computers address book. But far from a problem of
the past, viruses are still very much with us.

What to do?

ANTIVIRUS SOFTWARE

Antivirus software is available in both commercial and freeware versions
with a variety of features and prices, usually from free to less than
$50.

Most antivirus software works by examining files as they arrive at the
computer and by scanning later at configurable pre-set times. The
programs work by examining each e-mail attachment and downloaded file
looking for virus 'signatures'.

If a virus is found the user will be alerted and infected programs and
attachments can be cleansed of the virus or, if not possible, infected
files can be deleted or placed into 'quarantine' where they can't be run.

UPDATES

Whare are signatures? All programs have instructions in a pattern.
Computer viruses - like their biological counterparts - come in known,
though evolving, patterns. The fact of evolution is the reason virus-
checking files need to be regularly updated. Updated files contain lists
and the characteristics of new signatures.

Most antivirus software can be configured to alert you when the virus
checking files are out of date, and even to automatically refresh
signature files with the latest versions.

USER PARTICIPATION

Users can become complacent after installing antivirus software, thinking
they're totally protected and don't need to worry about becoming
infected.

Apart from the fact that antivirus software is written by humans, who can
make errors, vendors can only react to viruses after they're created. By
that time, much damage can already have been done. An e-mail attachment
or program may be infected with a new type of virus that your software
cannot (yet) detect.

Some antivirus software can - to a limited extent - detect virus activity
even without being able to identify a particular virus. This is an extra
level of protection against the latest viruses, but still shouldn't allow
users to become overconfident.

Always use trusted sources for downloading software and treat every e-
mail attachment with caution.

OTHER INFECTION ROUTES

Lastly, a special note about CDs and DVDs. While they can't be written to
(those that can are called CD-R's, DVD-R/W or some variation), they can
still contain viruses. Users who burn their own CDs or DVDs - inexpensive
and easy these days - can accidentally copy infected programs onto the
disc. Since CDs can contain files that automatically act when the disc is
inserted, it's possible - though rare - for viruses to be spread without
additional user action.