123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Protect Your Pc Against Computer Viruses

Profile Picture
By Author: Johnny Sogaard
Total Articles: 168
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Do you like to notice current and motivating things like internet safety? If so, then this uncomplicated article concerning computer viruses will be important to you! There's no doubt about it, computer viruses are a scourge on the internet community. These virus programs are written by people who just like to hack their way into other people's computers and destroy their data. It's hard to understand the mindset of someone who wreaks havoc with another person and never even knows who the victims are. Whereas a so-called worm works its way through your system, eating up your resources, computer viruses are written to destroy your data. So how safe can you be against the many viruses out there, looking to attack? Here are a few pointers to help you safekeep your data. Computer viruses may enter your system from a variety of ports. They commonly enter through your browser, your email, a download or even through .ftp access, running in the background where you will never know what's happening. The hackers are always looking for a hole in your operating system's security, which is why you are constantly being reminded to download ...
... the latest update, plugging newly discovered holes. When you receive notification that a new update is available, jump on it. Otherwise, you may be the next victim of a computer virus. It's long been publicized that you should never open an attachment to an email from a source you don't know. Some people mistakenly think that if the file attached is not an .exe format, they can come to no harm. This is a myth. An .exe file can be disguised, so that what appears to be an innocent text file on your email reader is in fact a cloaked .exe, ready to take over your system. If you're not expecting that email with an attachment, delete it, empty your email trash bin and then empty your system recycle bin.

Before we go an further, lets take a moment to review what we have learned so far about this amazing subject. One email attachment exception is the .zip file. Zip files are encrypted and must be extracted before you see the content files and they are still not open. In this case, you're pretty safe. How many times do you unthinkingly download files, simply because they're free? You've got to be especially vigilant with downloads. If the file is in an .exe format, don't take a chance. On the other hand, .pdf files are generally safe. These files require a reader, such as Adobe Acrobat. The reader, downloaded separately, does not allow any system commands to be executed, nor does it allow writing to or deleting of files. Nonetheless, with any download, always view the security certificate verified by an independent third party, such as Verisign. The security certificate shows that the file(s) have been inspected and are encrypted. The date must be current, not expired. Computer viruses can be fatal to your PC. A firewall provides reasonable assurance of the security of your machine. Unfortunately, there's always another hole to be found by the hacker. No precaution is ever failsafe, but if you are cautious, skeptical, and proactive with system updates, your chances of acquiring a computer virus are as low as they go. If you carefully examine each paragraph that we have talked over about computer viruses, you will see a common thread of which to explore.
The author of this article Johnny aka Gnubas is the owner of homesecurity4u.net, which gives you helpful information about Online Security Is More Important Than You Might Think and Home Security Devices.

Total Views: 395Word Count: 604See All articles From Author

Add Comment

Computers Articles

1. Market Forecast: Conversational Ai For Intelligent Contact Center
Author: Umangp

2. Complete Guide To Ipv4 Leasing, Lease Ipv4 Address & Ipv4 Address Rental By Elite Server Management
Author: Elite Server Management

3. B2b Marketer’s Guide To Onboarding A Lead Agency Without Losing Months
Author: demandify

4. Why Choose Sataware?
Author: brainbell10

5. Best Laptop Service In Hyderabad For Fast Laptop And Computer Repair Near Me
Author: Vfix4u Seo

6. Microsoft Dynamics 365 Upgrade Process
Author: brainbell10

7. Transforming The Future With Legacy Migration: How Tech Gazebos Drives Modernization Success
Author: Tech Gazebos

8. The Hidden Cost Of Treating Iam As A Governance Platform
Author: Tushar Pansare

9. Sqlite Development & Integration Services In Usa
Author: davidjohansen

10. Rp80 Thermal Printer For Pos: Full Overview
Author: pbs

11. Real-time Vehicle Inventory Monitoring
Author: Actowiz Metrics

12. Software Testing & Qa
Author: davidjohansen

13. Market Forecast: User Authentication
Author: Umangp

14. Dell Laptop Repair In Wadala
Author: Laptop Repair Mumbai

15. Data Mining Tutorial: A Complete Guide To Concepts, Techniques, And Applications
Author: Tech Point

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: