How to avoid infecting your computer, or simply ignore many types of viruses

click fraud protection

viruses emerged almost simultaneously with the advent of computers.And now, for many users is still urgent problem of protecting the security of your computer.However, we should not exaggerate the danger and score a bunch of computer protection programs to keep different types of computer viruses behind.Why is that?The situation is simple: if in the early days of the Internet and personal computer programming skills had really decent people who could write something devastating, but now every student by copy-paste can write any virus on the knee and consider themselves a mega-hacker.

On the one hand, this is very bad, because there are a lot of individuals and the Internet is very fast.On the other - people are usually very stupid and to write something worthwhile, they simply did not have enough imagination.So they created viruses in the presence of a certain (very small) amount of experience almost dangerous and deal with them a breeze.But the chance to catch something from a professional is practically zero, because usually - just for fun - they do not infect computers.And besides, their work closely watched and under such terrible viruses immediately sewed patches on security.These viruses are introduced to the priority queue definitions in antivirus programs.In this article we will look at some tips that will help you, if suddenly, a little blood to get rid of or block the most common types of viruses.

risk groups

To begin with we shall understand with this for many non-obvious point.Very often you can hear that, they say, "Yes I viruses - I have nothing to steal."Ha, holy simplicity!If you use online banking, you play online games, are developing intellectual projects or just have an account in social networks, then you can steal a lot of things - trust.Remember, many viruses do not want to break your computer and steal intellectual property, and with it the money.

Computer viruses, types

1. Viruses: programs write their code into other programs - are infected.

2. Worms: in their name and their definition.They are able to "crawl" from one computer to another using a network.

3. Trojans: a Trojan horse.Sam can not infect files, so spreads are usually disguised as useful software - hence the name.

4. Spies: steal, collect and where to send the information.Usually written by the client, either individually or under the desired type of information.For example, under the codes of credit cards.

5. Phishing: the fishermen, the main mission of which is to extract money simpleton.Masquerading as important messages from various important structures.Example: You won a million dollars!Just enter your card number and VAT number to get the money.What is clear is that once you do this, the score immediately reset.

Tips for avoiding, minimizing the damage

If you have a suspicion that some of the viruses to attack your computer, then:

1) Check the startup.Maybe you're lucky - and there sits uninvited guests.

2) Download and update software only from official sites.They usually look like: * Name programmy.som

3) Never pay extortionists.Further threats "Slaman kamputer" they usually do not go - not enough brains.
4) If a virus is blocked you social.network or something else, copy the hosts file in the folder windose.

5) This item is inspired by the past - before you do something, ask Google - he knows the answers to almost every question.