Combating Viruses Two simple precautions can help keep your computer virus free - install and use software from reliable vendors and avoid opening unexpected e- mail attachments. Almost all e-mail attachments are potential virus carriers. Some of the most famous viruses were distributed by accessing address books of infected computers and sending e-mail (with attachments) to everyone in the address book. Even those from known senders should be regarded with suspicion - e-mail addresses can easily be faked to appear to be from someone you know. The 'Melissa' virus that appeared in 1999, originally posted on an Internet newsgroup, was distributed in a Microsoft Word document. When downloaded and opened the virus accessed the user's address book and sent copies of the document (along with the virus) to the first 50 people in the user's address book. Every computer that received the virus sent out an additional 50 copies, creating a worldwide slowdown in Internet networks. The effect took only a few hours. Another widespread virus distributed by e-mail was the 'ILOVEYOU' virus of 2000. When double clicked it sent copies of itself to every e-mail address in the infected computers address book. But far from a problem of the past, viruses are still very much with us. What to do? ANTIVIRUS SOFTWARE Antivirus software is available in both commercial and freeware versions with a variety of features and prices, usually from free to less than $50. Most antivirus software works by examining files as they arrive at the computer and by scanning later at configurable pre-set times. The programs work by examining each e-mail attachment and downloaded file looking for virus 'signatures'. If a virus is found the user will be alerted and infected programs and attachments can be cleansed of the virus or, if not possible, infected files can be deleted or placed into 'quarantine' where they can't be run. UPDATES Whare are signatures? All programs have instructions in a pattern. Computer viruses - like their biological counterparts - come in known, though evolving, patterns. The fact of evolution is the reason virus- checking files need to be regularly updated. Updated files contain lists and the characteristics of new signatures. Most antivirus software can be configured to alert you when the virus checking files are out of date, and even to automatically refresh signature files with the latest versions. USER PARTICIPATION Users can become complacent after installing antivirus software, thinking they're totally protected and don't need to worry about becoming infected. Apart from the fact that antivirus software is written by humans, who can make errors, vendors can only react to viruses after they're created. By that time, much damage can already have been done. An e-mail attachment or program may be infected with a new type of virus that your software cannot (yet) detect. Some antivirus software can - to a limited extent - detect virus activity even without being able to identify a particular virus. This is an extra level of protection against the latest viruses, but still shouldn't allow users to become overconfident. Always use trusted sources for downloading software and treat every e- mail attachment with caution. OTHER INFECTION ROUTES Lastly, a special note about CDs and DVDs. While they can't be written to (those that can are called CD-R's, DVD-R/W or some variation), they can still contain viruses. Users who burn their own CDs or DVDs - inexpensive and easy these days - can accidentally copy infected programs onto the disc. Since CDs can contain files that automatically act when the disc is inserted, it's possible - though rare - for viruses to be spread without additional user action.
Pages to are hidden for
"Combating Viruses"Please download to view full document