Saturday, October 10, 2009

All About Computer Viruses

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.

You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?

Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.

In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.

In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.

A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.

When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.

This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)

These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.

Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.

For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.

But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking at the site, the virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.

During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.

Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.

Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves.

Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus in the email might just load onto your computer.

So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)

On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files.


OK, so we’ve talked about how the viruses get into a computer. How do they cause so much damage once they’re there?

Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to the example of the virus that initially infects your Microsoft Word program.

Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect.

This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.

Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said.

There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.

The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.

For these other intentions, we first need to explain the “backdoor” concept.

The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.

Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.

Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate.

Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.

OK, so the virus writers now control these computers. What will they use them for?

One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.

That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don’t want that.

Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.

Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.

Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know!

Feel Free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know where it appeared: kara333@earthlink.net

Kara Glover is a Computer Tutor and Troubleshooter. You can find her articles and tutorials on topics such as Microsoft Word®, Excel®, and PowerPoint® on her website: http://www.karathecomputertutor.com

kara333@earthlink.net

9 Steps to Protect your MS Windows System from Viruses

9 Steps to Protect your MS Windows System from Viruses

Nowadays as the Internet and other networks are greatly developed computer viruses are distributed rapidly and intensively. Everyday several new viruses capable to damage considerably your computer system arise. Anti-virus specialists work hardly to make updates their software against new viruses as soon as possible. The viruses can get inside computer in different ways. That is why there is no simple method to protect system. Only series of measures can give you reliable protection from the infection. Below are 9 steps to protect MS Windows based PC system from viruses.

1. Make regular backups. It should be said that there is no absolutely safe way of protection. Virus creators regularly find holes in new computer products to use them for infection of computer systems. Some dangerous viruses can considerably damage data files or even erase entire file system. Make regular backups of your data files to separate file storage device. It can be separate hard drive, flash card, compact disc or another file storage device which you choose. To ease the procedure you can use some automatic backup software. And be ready if the system will die because of virus infection.

2. Be ready to reinstall your system if it dies because of viruses. Get distributives of your operation system and distributives of software which you use and keep them together, for instance, on a set of CDs not far away from you. In this case if virus infection will cause unrecoverable system failure you can rapidly reinstall your working medium.

3. Protect your network connection with Firewall. Firewall is a software which blocks suspicious potentially dangerous connections to preventing viruses from network to penetrate into your system. Windows XP system has quit simple but reliable built-in firewall. You can enable it as follows. 1) in Control Panel, double-click Networking and Internet Connections, and then click Network Connections. 2) Right-click the connection on which you would like to enable firewall, and then click Properties. 3) On the Advanced tab, check the option to Protect my computer and network.

4. Use antivirus software. Install antivirus software which will scan your system searching and erasing viruses on a regular basis. Leaders in antivirus software products for Windows systems are Norton Antivirus, McAfee, Kaspersky Anti-Virus and PC-cilin.

5. Regularly update operating system. Windows XP has built-in automatic update service. It regularly contacts Microsoft server to find updates and notifies you if updates are ready to be installed. Updates are important because hackers regularly find holes in operating system which are often used by virus creators.

6. Don't install and don't run suspicious software. Check new programs which you are going to install with anti-virus software. Don't download software from suspicious websites. To download software always seek website of software creator or official distributor. Do not open applications received by email from unknown persons.

7. Limit access to your computer. Protect enter to system with password.

8. If you use Internet Explorer, consider moving to another browser. As IE is the most distributed browser today virus creators actively use defects in its security system to infect computers. Infection may arise if you will visit webpage which contains invisible harmful code. You are more safe if you use less known browser only because virus creators do not pay much attention to it. Major IE competitors Firefox and Opera browsers provide now the same comfortable interface and range of services for working on the Web.

9. Use spam protection. Viruses are often distributed via email. Switch on spam filters in your email box to block spam receiving. If you need assistance with using of the filters you can ask your email service provider.
About the Author

Evgeny Kovalenko is the Editor of FSSD computer software directory with free submission service for software developers and distributors.
banner Lot of Visitors Global Promotion Alliance > http://www.bigextracash.com/aft/4c2c61ad3e763/2a7dab89.html
Extra Cash From Your Website

Pouring Cash Directly Into Your Pocket!!!

It works round-the-clock, and for not just days or weeks, but for months and months, very own Money From Your Website making you tons of CASH!
It works round-the-clock, and for not just days or weeks, but for months and months, very own Money From Your Website making you tons of CASH!

Have you ever dreamed about a real and easy way to get revenue in Internet, even if you have absolutely no experience?
We have good news....

Make cash online now


Turn your expensive web site traffic into money. Join our partner program. We offer the most pay-per-click rate to help maximize your money stream.

Imagine running of a something that never failed to provide you with money-flow. A never ending income generator, a system so amazingly gainful that you never had to work for a boss ever again!

0 (zero) investment program

We designed this system specifically for NO COST methods, to make thousands, if not millions of dollars, without spending money.

Join our revenue making program absolutely free and 100% risk free.

Get Started now

Sign Up...

Signup is free

Income while you sleep.

Earn $1,000... $2,000... $5,000...
Turn your site traffic into cash!

You get paid for every visitor that clicks on our commercial. Our goal is to enable you to make as much as possible from your promotion space. We pay monthly, either by check, or instantly through PayPal.

Our program enables you to generate a steady stream of income, 24 hours a day, 7 days a week, 365 days a year. Allowing you more time to focus on the things you love. You'll even be making income while your sleep!

TESTIMONIALS
TESTIMONIALS
"...It's great idea making money online..."
"...It's great idea making money online..."

Thank you so much for creating this unique opportunity for me. I'm studying at the University of Manitoba and I have always been motivated to find new ways of making money. Your website is perfect for me making extra income. It's great idea making money online!

Christine Taylor, CA

Will my Web site work for me?

Yes, absolutely! With our partner program everyone can earn every day! You will earn revenue from 100,000 advertisers. Also you can be absolutely new to use our system - you don't have to have ANY experience. That's really simple.

We have successful members from all countries of the world and they are part time employees, students, house wives, retired people, just everybody. Because our system works anywhere and for everyone!

Any proof of earnings?

Sure. For example, look at the results of using our partners program. Here is real screenshot of bank account presented by a partner:

TESTIMONIALS
TESTIMONIALS
"...I have been looking for something like this..."
"...I have been looking for something like this..."

Hi, this is wonderful!!!! I have been looking for something like this! I found your site and just wanted you to know that I think this idea is splendid. Good luck to you.

Iohan Vanden Broek, NZ

Here's All You Have to Do...

  1. Fill in the registration form

  2. Insert received code into your web page

  3. Watch that your cash grow

Get Started now





Sign Up...

Signup is free



Windows Live space - Windows Live Windows Live space - Windows Live

affiliate program

EARN INCOME FROM YOUR WEBSITE

Turn your valuable blog visitors into cash. Work online and join our free money making affiliate program. We offer the most pay-per-click rate to help maximize your money stream.

Join our money making program absolutely free and 100% risk free.

Sign Up...

Mountain a steady stream of income

Our money making system enables you to establish a steady stream of money, all around the clock. Allowing you more time to focus on other tasks.
You will even receive money while you not working!

FREE INVESTMENT PROGRAM

We created this free money system specially for NO COST methods, to make hundreds, if not millions of dollars, without spending something.Income while you sleep

CASH WHILE YOU SLEEP

Earn $1,000... $2,000... $5,000...

Turn your site traffic into cash!
You get money for every visitor that clicks on our advertizing. Our wish is to enable you to make as much as possible from your webpage. We pay monthly, either by check, or using PayPal.

Turn A $2.00 Gift Into $92,500.00 In Gifts From Others! Make Money With CashGiftsPro

Get cash from your website. Sign up as affiliate

Wireless cell phone video surveillance solution is here adding a sense of private security and safety it offers you real-time video monitoring.

Wireless mobile phone video surveillance solution This technology utilizes the most powerful software applications for distantly monitoring from Anyplace in the globe.
This is a solution that will turn any ordinary cell phone into a high end surveillance device.
The security system brings video from video source such as USB or IP Camera to your mobile phone. It contains both the client and server software.

You can view your room, corporation, babysitter, parents, pets, etc.

You can watch live shots from your webcams on mobile phone via any kind of online connection from any location in the world. In case of invasion, a real video helps prevent false siren and cancel police dispatches to avoid the fines.
Enjoy the freedom of viewing all your webcams on cell phone anytime and from everywhere with just the touch of a button.

How does cellular surveillance work:

You attach your webcam (USB, IP camera, or Camcoder) to your home pc and install the application.
The software captures video and audio from webcam and sends it, as compressed media stream, to web server.
You login to this Web server from your cell phone and see your webcam.
No particular software for your mobile phone is needed.

All regarding cellular video surveillance.

Advertise to over 10 million individuals

Promote to over 10 million users around the globe.

We advertise your company in global network of partners webpages, each with own targeted auditory.
Our company gives you innovative advertising methods that makes your business profitable on the Internet.
We will provide you with real and visible results and take your website to the next level.
Advertise to Millions users Now...

Increase search engine rank

Increase your website search engine rankings

Be presented on search engines is one of the most important strategy to increase web-site traffic and show your business or service to individuals that might be looking for what you are offering.
All big search engines use a software to calculate your website ranks.
They know how many sites are linking to your web-site; more referrers and visitors better rank for your web-site.
Get Higher Rank...

Millions of Shoppers

Millions of Shoppers

Reach millions of customers looking for products and services.
Our auditory is constantly increasing and now it's over 25 million unique shoppers every month. We only work with high-quality local and global promotion sites, which bring potential customers from North America, Western Europe and upcoming markets.
Get More Hits, Get More Shoppers...

Technology Blogs - Blog Rankings Blog Advertising

Alternative Options for Treating Allergic Rhinitis

by: Stacey M Kerr MD

Here in northern California, allergies are a significant health problem leading to fatigue, sick days from work and school, and secondary infections. Allergic rhinitis is a reaction to seasonal airborne allergens. It affects about 7 percent of the population of North America and is a risk factor for 88 percent of asthma patients. We have some excellent prescription medications for treating this, and there are many over-the-counter medications available also. However, BEWARE of the sedating effects of those nonprescription medications!!! Recent studies have shown that an individual on a therapeutic dose of diphenhydramine (Benedryl) is a more dangerous driver than one who is legally drunk on alcohol.

Fortunately, there are also some effective alternative therapies for allergic rhinitis.

Remember: no matter what method you use to treat your allergies, nasal rinsing to clear the mucus membranes of trapped allergens is essential. It only takes about 30 seconds, doesn't hurt a bit when done correctly, and makes all the difference. I recommend Nasopure®, a product developed by Dr. Hana Solomon, a pediatrician who has put together in one simple kit all you need for successful nasal rinsing. There is an excellent article about this on the Nasopure website (www.nasopure.com). If you are regularly using your Nasopure®, and still having difficulties, you can try some of the following remedies without significant side effects.

Vitamin and mineral supplements:

* Vitamin A - 10,000 IU/day

* Vitamin B6 - 50-100 mg/day

* Vitamin B5 - 50-75 mg/day

* Vitamin C - 1,000 mg/day in 3 divided doses

* Vitamin E - 400 IU/day

* Zinc - 20-30 mg/day

In addition some herbs and nutrients can help:

Quercetin has anti-allergy and anti-inflammatory effects if you take it 250mg two or three times a day.

Freeze-dried stinging nettles (Urtica dioica) can relieve symptoms of allergic rhinitis at a dosage of 300mg twice a day.

Eicosapentaenoic acid (EPA) and docosahexaenoic acid (DHA), also called fish oil, can help asthma patients with allergies by stabilizing the airways. They come in capsules and the total dose of the combination should be 2-4 g/day.

Acupuncture has given many patients significant relief. The Chinese medicine paradigm is very different than Western medicine, so I can not explain the mechanism of action. But I know that it is effective!

See your doctor about allergy symptoms if you are unable to manage them on your own - the nonsedating antihistamines and anti-inflammatory nasal sprays available today are excellent in treating this significant health problem!

Stacey Marie Kerr, M.D. graduated from the University of California Davis Medical School in 1989 and is currently a board certified family physician. Dr. Kerr is a member of the California and American Academy of Family Physicians. She holds a B.S. in Education/Special Education from the University of Missouri, Columbia Missouri. She hosts a website the-doctors-inn.comthat provides personalized answers to medical questions.

To find other free health content see e-healtharticles.com

new7wonder
bigtrash Get cash from your website. Sign up as affiliate.
Blog Ping Site