We must never meet or perhaps even often dealing with the name of a computer virus. The virus is an issue that is quite troublesome to us, because if our computer is infected by the virus, can cause a range of negative effects such as loss of data – data on our computers. Computer work seemed to become heavy, many files that arrived – arrive corrupt or hidden, and many more negative effects that can be caused by a computer virus.
A computer virus can usually be damaging software on the computer by inserting a copy of itself to a program or document – document on our computer. The virus can also damage the hardware on your computer, but not directly, by forcing a continuous process or over process at a specific device, such as a memory that could cause a load of memory being high and can affect his performance or can even cause damage to the device.
Virus itself is very many types and types. According to how it works, some viruses exist like a worm that duplicates itself in storage media such as hard disks, so our media storage will be filled with worms. Then this is what is known as Trojan so it is important to know that Trojan herself has been infected.
Next is spy ware whose job is to monitor the infected computer. Once you know the definitions, types, and dangers that can be caused by virus attacks, then it’s good we pay attention to computer security that we have. This time I will be a variety of small tips that can try to minimize virus attacks on your computer. Okay just take a look at some easy tips to secure your computer from viruses:
With 7 Easy Tips to Secure your Computer from Viruses
Table of Contents
1. Use Antivirus
True to its name, useful anti-virus to protect us from attack or access virus, worm, or Trojan. Anti-virus can scan files-files that are already infected with the virus so we Can cope so as not to spread more widely. Many anti-virus options that exist, ranging from free to paid version dependent we want to choose which. After installing anti-virus it’s good that we continue to update the latest version with the aim to renew the anti-virus database. Thus, the performance of anti-virus will remain optimal and still be able to scan and do the handling to the virus – the latest virus though.
2. Do the Scanning Routine
Over a period it scans the system as a whole, and also always scans in advance external storage media that will or are currently connected to our computer. This step is intended to prevent the widely circulated viruses that are brought from devices such as Flash disk or SD Card to your computer. Do not also open files – files that are considered suspicious files such as shortcuts that exist in the pen drive.
3. Turn on the Firewall
Firewalls are used to control the access security between the internal network securely with entrusted network (entrusted) such as the internet. Other tasks that can be done is to do the authentication credentials access firewall, protecting internal network resources, and noted all incidents and report them to administrators. For windows users, can enable Windows Firewall features that are already available on the windows operating system. Can also install commercial firewall program such as Sunbelt Personal Firewall, Como do Personal Firewall, etc.
4. Beware of Strange Emails or Spam
One of the media that can be used for the spread of the virus is email. Don’t open spam email from a source that is not clear, because the file – file is suspected to contain viruses, malware, and the like will usually be directly inserted into the spam folder. And if we get an email which accompanied the file attachment (attachment), do scan it first against the file before opening it.
5. Do not Carelessly Install Applications
Try to install the required applications and we know enough, don’t try – try or install any application. This will be problematic on your own computer on which the effects, so take note of applications that have been or we want to install.
6. Read First when Install Program
Most of us when install program definitely further origin only. But a lot of things you need to consider. For example, typically a program requesting approval to install additional programs that in fact it is ad-ware. Well, don’t just check the origin of the small on the box.
7. Restrict access rights
Do not give full rights over the computer’s response to just anyone. Better give special permissions that require authentication credentials if that person wanted to do something related to the system, such as to install the application. Thus, the computer system will be more secure.
Well, now we’re getting a Little more out about viruses and how to overcome, no need to get confused in tackling the virus. Simply read this article over and over again.