123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Computer Spyware Infection And Repair

Profile Picture
By Author: Khan Mash
Total Articles: 22
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In this article I will talk about computer spyware and malware and how computers are attacked by these malicious threats. I will also explain how they attack computers and how to stop them.

Computer virus is software or a program that can do anything as planned by the creator. All computers in the world follow simple instructions that are developed in computer language. A PC computer runs on a windows program. A Microsoft word is a program that helps create word documents or excel documents can be created by the help of a Microsoft program called Excel. A virus, Malware and Spyware or adware are programs that are developed for specific purposes. Viruses are mainly made to attack Microsoft based PCs and laptops as they are being used at large scale in the world roughly around 70% percent of all computer market. In the next paragraph, I will explain why people make viruses and how they mange to spread these programs.

Computer users ask me all that time “why people make viruses?” I will share the answer with the online world in this article. There are multiple purposes of viruses and spyware. The number one reason ...
... is to steal important information from others computers without user’s consent. This information includes but not limited to identities, photos, documents like passwords, email addresses, banking information and more. There are a lot of programs on the Internet that look for music and movies online. I heard a story about a virus where a guy made a virus to help her mother’s computer repair business. He made this virus and shared it online and it spread on the entire Internet. There are some destructive programs that are in the news these days. The most destructive one is the crypto locker. The creator made a program that mainly attack business computers and encrypt anything that it finds on business desktop computers and laptops. After encrypting the data, it then sends the master key to the creator who then sends a notice to the user saying that “in order to decrypt the data, the user has to pay certain amount ($500-$2400)”. A data recovery in this kind of attack is almost impossible. We get cases like this most often. Another type of virus or spyware program includes software developed for stealing address books. Users are usually deceived by telling them to click on some important links in emails or face book and then malware is installed without user’s notice. Some people make viruses for fun. They think bothering others is a fun unfortunately.

The question is “how the virus can be installed on a computer?”. User always think their computer has no infection because they have security software (antivirus) installed. Well let’s talk about how the virus gets into the computer. As explained above, a virus is a simple program that can be installed on a computer in two ways. One is the visible installation that is the user can see the installation progress. The other way is to install the program in the background. How is this done? Well program installation is the process of copying files on the computer and this can be done easily in invisible mode. This is true for every operating system whether it is a Microsoft PC, laptop, Mac or MacBook Pro. It is true that Mac computers have less or almost no viruses but more and more programs are being developed for destructive purposes these days. The reason why Mac computers have fewer viruses is their market share and the operating system architecture. In the future when there will be more and more Mac desktops and Mac laptops, there might be more people to attack them but it is not the case right now.

So people ask the question “why their computer got a virus or malware when they have an antivirus?”. My answer is, everyday thousands of virus programs are written and it is not possible to update antivirus database to protect against these viruses which makes the detection process impossible. So what is the best way to protect against these threats? Well it is very important to have the latest operating system with latest updates. A good antivirus with firewall is a must. The antivirus must be up to date all the times. The browser must be up to date. Those users who have Windows XP computers must update to the newer version of windows and let say they cannot update windows, they should be using an up to date browsers like Firefox or Google Chrome (the reason for that is, they cannot update their browsers after certain version). This is extremely important.

Let’s talk about the nature of attacks and symptoms. After a computer gets an infection, user usually see lots of popups. The computer would freeze. Sometimes the computer would show very strange symptoms like restarting, blue screen, black screen. Some viruses and malware would cause opening the browser automatically. A virus can damage files or operating system in different ways. If it damages the file system, the user’s data may not be accessible. Some malware or viruses can damage a computer hard drive and data recovery might be needed if this happens. Sometime a virus can do strange things like display everything upside down. It can also damage device drivers like mouse driver, keyboard, video and sound or network drivers. In such cases these drivers are reinstalled but mostly the damage is so severe that everything has to be reinstalled including operating system and all applications.

In this article I talked about viruses, malware, spyware and how they attack computers and how to repair computers infected by these threats.
By khan

http://www.computerstar.ca/data-recovery-mississauga.html

data recovery onsite

Total Views: 515Word Count: 953See All articles From Author

Add Comment

Computers Articles

1. How To Develop An App From Scratch In 13 Steps
Author: goodcoders

2. 7 Steps To Create A Safe Mobile App
Author: goodcoders

3. Why Do Businesses Need Vendor Management Software?
Author: Kiran

4. React Native App Development By Alvi Software
Author: Alvi Software

5. Custome
Author: Owner

6. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

7. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

8. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

9. The Rise Of User Centered Web Design
Author: goodcoders

10. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

11. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

12. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

13. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

14. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

15. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: