ALL >> Computers >> View Article
Computer Spyware Infection And Repair
In this article I will talk about computer spyware and malware and how computers are attacked by these malicious threats. I will also explain how they attack computers and how to stop them.
Computer virus is software or a program that can do anything as planned by the creator. All computers in the world follow simple instructions that are developed in computer language. A PC computer runs on a windows program. A Microsoft word is a program that helps create word documents or excel documents can be created by the help of a Microsoft program called Excel. A virus, Malware and Spyware or adware are programs that are developed for specific purposes. Viruses are mainly made to attack Microsoft based PCs and laptops as they are being used at large scale in the world roughly around 70% percent of all computer market. In the next paragraph, I will explain why people make viruses and how they mange to spread these programs.
Computer users ask me all that time “why people make viruses?” I will share the answer with the online world in this article. There are multiple purposes of viruses and spyware. The number one reason ...
... is to steal important information from others computers without user’s consent. This information includes but not limited to identities, photos, documents like passwords, email addresses, banking information and more. There are a lot of programs on the Internet that look for music and movies online. I heard a story about a virus where a guy made a virus to help her mother’s computer repair business. He made this virus and shared it online and it spread on the entire Internet. There are some destructive programs that are in the news these days. The most destructive one is the crypto locker. The creator made a program that mainly attack business computers and encrypt anything that it finds on business desktop computers and laptops. After encrypting the data, it then sends the master key to the creator who then sends a notice to the user saying that “in order to decrypt the data, the user has to pay certain amount ($500-$2400)”. A data recovery in this kind of attack is almost impossible. We get cases like this most often. Another type of virus or spyware program includes software developed for stealing address books. Users are usually deceived by telling them to click on some important links in emails or face book and then malware is installed without user’s notice. Some people make viruses for fun. They think bothering others is a fun unfortunately.
The question is “how the virus can be installed on a computer?”. User always think their computer has no infection because they have security software (antivirus) installed. Well let’s talk about how the virus gets into the computer. As explained above, a virus is a simple program that can be installed on a computer in two ways. One is the visible installation that is the user can see the installation progress. The other way is to install the program in the background. How is this done? Well program installation is the process of copying files on the computer and this can be done easily in invisible mode. This is true for every operating system whether it is a Microsoft PC, laptop, Mac or MacBook Pro. It is true that Mac computers have less or almost no viruses but more and more programs are being developed for destructive purposes these days. The reason why Mac computers have fewer viruses is their market share and the operating system architecture. In the future when there will be more and more Mac desktops and Mac laptops, there might be more people to attack them but it is not the case right now.
So people ask the question “why their computer got a virus or malware when they have an antivirus?”. My answer is, everyday thousands of virus programs are written and it is not possible to update antivirus database to protect against these viruses which makes the detection process impossible. So what is the best way to protect against these threats? Well it is very important to have the latest operating system with latest updates. A good antivirus with firewall is a must. The antivirus must be up to date all the times. The browser must be up to date. Those users who have Windows XP computers must update to the newer version of windows and let say they cannot update windows, they should be using an up to date browsers like Firefox or Google Chrome (the reason for that is, they cannot update their browsers after certain version). This is extremely important.
Let’s talk about the nature of attacks and symptoms. After a computer gets an infection, user usually see lots of popups. The computer would freeze. Sometimes the computer would show very strange symptoms like restarting, blue screen, black screen. Some viruses and malware would cause opening the browser automatically. A virus can damage files or operating system in different ways. If it damages the file system, the user’s data may not be accessible. Some malware or viruses can damage a computer hard drive and data recovery might be needed if this happens. Sometime a virus can do strange things like display everything upside down. It can also damage device drivers like mouse driver, keyboard, video and sound or network drivers. In such cases these drivers are reinstalled but mostly the damage is so severe that everything has to be reinstalled including operating system and all applications.
In this article I talked about viruses, malware, spyware and how they attack computers and how to repair computers infected by these threats.
By khan
http://www.computerstar.ca/data-recovery-mississauga.html
data recovery onsite
Add Comment
Computers Articles
1. Exploring How Ai In The Cloud Can Transform Your BusinessAuthor: TechDogs
2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs
3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot
4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi
5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown
6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller
7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute
8. Top 7 Advantages Of React Js
Author: Bella Stone
9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone
10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD
11. Top 10 Healthcare Technology Trends
Author: goodcoders
12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith
13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press
14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.
15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA