Understand how viruses infect your computer

9 November 2009 | In Matters | 373 views | By

Click & share: 

virusTo meet the ‘ ’ attack vectors, it becomes easier to protect themselves from pests. See how viruses attack and how to take precautions to avoid them.

Viruses are restricted to a few ways — or "attack vectors", na linguagem técnica – para chegar até um computer. So, not worth worrying about all the time with rare situations or requiring a series of conditions for work. To know the main attack vectors, today's column theme, You can take precautions to avoid most of the viruses. See how they arrive until the machines and, in the text below, How to protect yourself from these pests.

If you have any questions about information security (antivirus, invasions, Cybercrime, data theft, etc), go to the end of the matter and use the comments section.

msn1>>> Instant Messaging and social networks
Any means of communication on the internet can be abused by criminals. How users are friends or acquainted, the tendency is to rely on what you receive. Various pests, When it infects a computer, make instant messaging programs send links or files spreading the virus to the victim's contacts.

In the worst cases, the virus could exploit a loophole in the instant message program or social networking site (and in web browser, see below). With this, the infection would be automatic, without having to click anything. But this is very rare.

Therefore, a tip to avoid problems is to confirm with the contact if he really sent the link before clicking the address indicated for that person.

firewall>>> Loophole in the system
Programas de computers possuem falhas e erros. Operating systems are no different, and gaps in system components can have a big impact. Some of these vulnerabilities have allowed virus to spread from one computer to another without any user action. Simply be connected to the internet to become victim.

This type of virus is easily avoided. Just use a firewall, access the internet through a router or keep the system updated. This last, Incidentally, should be done one way or another.

seguranca-google-chrome>>> Loophole in browser and plugins
It's easy to be taken from one site to another via links, Automatic redirects and varied searches on the web. We visited many sites and most of them are legit and secure. We access short links on Twitter that we don't even know where they're going. That's how you browse the network. Unfortunately, not all sites are harmless.

You can avoid some very suspicious content, as piracy, but estimates indicate that approximately 6 millions of web pages are infected each semester. In other words, criminals can invade and change the sites, making your visitors victims.

The best way to protect yourself is to keep the web browser and all plugins, How to Flash, PDF, QuickTime and Media Player, updated. This prevents a hacker can create a page that automatically infect your system.

Browsers have automatic update systems. O Internet Explorer depende do Windows Update. The plugins need to be extra careful, because not everyone has efficient auto update systems. The Flash, from Adobe, for example, does not have. Firefox is warning users about out-of-date versions of plugins, but other navegadores não fazem o mesmo.

email>>> Emails
The email is a very effective way to disseminate viruses. Millions of emails can be sent to a low cost, often from previously infected computers.

There are several common ways to spread a plague by e-mail. The automated pests send automatically generated messages. The malicious file is attached. There are cases, However, in which the criminal constructs a email to deceive victims and the files are, normally, referenced by links. Check out here some examples of these emails.

As well as the instant messaging programs, websites and email clients can also help criminals abusing of trust among Internet users. But attention: the "field Of:"in an email can be forged. So, be careful when relying on sender information. Analyze the message and, If you come from a known and she is suspected, confirm that the same was submitted. If you come from an unknown and a very serious theme or scandalous, do not open!

pen-drive>>> Pen drives
Ten years ago, the problem was with the disks. Today replaced by thumb drives, the virus also adapted. Using the AutoPlay feature ("Auto Run") of Windows, a virus can copy itself to a thumb drive and force their implementation as soon as the device is connected to a computer.

To prevent this from happening, You can install a Windows security update that disables the AutoPlay on USB sticks. With this, the virus still remains stored, but will not run on your computer. In other words, You can connect USB devices on your PC with more tranquility.

trojan-horse-pc>>> Social Engineering – "the Trojan horse"
There are many "Greek gift" on the internet. Programs that promise to sensational functions, software that hasn't even been released and aid for cheating in games are just a few examples. Ao fazer o download de um desses applications e executá-los, You may be being deceived. In other cases, a virus will come from "date".

There are also software that promise, for example, monitor someone else's computer. Along with them comes an extra component that will monitor the computer who downloaded the program.

The tip is wary of what sounds too good, and stay away from cheating and piracy.

These were the tips of the Security column for the PC today. If you have a question about security, leave it in comments area, just below.

Source: G1

In Ivaiporã-PR, Computer engineer, Workgroup Administrator Tips in General. Passionate about technology and Informatics.

A bit about us

    The Group generally appeared in Tips 2007 from innovative ideas on troubleshooting problems faced daily by those who use the technology and computer science, both ordinary users and technicians. But where did, why and what is the purpose of this site?

Click here to read!

Siga o Dicas em Geral no Google+

Video of the week