Friday 10 August 2012

Computer Viruses: Causes and Solution

August 10,2012
Computer virus can be described as a software programme coded with the ability of replicating or reproducing itself with an ulterior aim which can be harmful to files, programs and the entire computer machine. It is a program that can alter the normal operation of a computer machine.The ability to replicate itself is intentional by the designer because the more the computer machines are infected by the virus the greater chance for them to achieve their intent. I think this is a simple answer as to what a computer virus is.

It depends on the type of virus, some may not be harmful but this is still debatable and unacceptable by computer anti-virus professioners. Computer virus when unattended to can wreck untold havoc has they have the ability of erasing very important files from your computer, access personal or confidential information, corrupt existing files and can completely crash a computer machine.

The programming of virus infected software is such that the aim of the sender is achieved without your knowledge. A virus can appear as a useful program attached to files, applications and program files usually downloaded from other computers and the internet. The virus-infected files are executable and can open just like any other program and can run side by side other useful applications.

Sources of Computer Virus

Computer virus is designed by a person with the aim of gaining unlawful access to files and program containing other people data and information. It is a means of exploiting loopholes that they may discover for their own advantage. Viruses can be contacted through the following means:

1. Attachment from email: Computer virus can be downloaded alongside an email attachment. You have to know or be sure of the source of any document, program, files and application downloaded on the internet.
2. Removable Storage Device: Virus can be contacted through infected removable devices such as CDs, floppy disk, USB Dongle and other external storage facilities.
3. Through Bluetooth: Infected files transfer through Bluetooth to another computer machine can bring about virus invasion.
4. The type of website: Some Sites are very notorious, referral to a site you don’t trust should be avoided.

Computer virusinfection can be managed and avoided. It pays to take the following precaution than to be caught unaware; the effect can be devastitating especially when the damage has been done. Recently some of these viruses have the ability to reproduce to the extent that they can occupy every available space in your PC internal storage system. This is to prevent you from having space to upload anti-virus and they can be very difficult to delete manually.

They can also affect core operating files and program of your system such as Microsoft windows. The essence is to deter you from access to websites for any possible assistance from your PC as they carry out their ulterior motive. The following measures will be found useful to avert the ugly effects of malicious software invasion:

1. Install Anti-Virus software to your Computer machine: This is one of the most reliable means of avoiding computer virus. There are various types of computer anti-virus; you can find details in my article on Types of Computer Anti-Virus. Antivirus can be strong or weak. Ensure that your system has a very strong and trusted antivirus that is equal to the task because some computer viruses can be very evasive. This has to be updated as required by the vendor of the software. You can also do well by scanning your PC manually regularly to discover any possible infiltration of unwanted files and programs.
2. Installation of Firewall: This prevent your machine from unauthorised access to sensitive files both when you are online and offline. Hackers are all over the place, it deter them from sending malicious software that can be injurious to your computer system. You can set up both software and hardware Firewall on your machine, it is a strong backup for your anti-virus software as it is the first target of most computer viruses.
3. Attached Documents: As much as possible, read online documents that are in the form of attachment you are not sure of the reliability of the source. Don’t auto-launch your email as this can be dangerous, it can send virus directly into your PC since it is an attached document. If you have such program in your system get it disabled. But if you most necessarily download the document make sure that you scan it before doing so.
4. Scan External Storage Devices: All external storage devices should be scanned for virus before usage irrespective of the reliability of the source.
5. Protect Your Privacy: Once you are through online, make sure you log out either from your email account or your website. Failure to do so can be exploited by hackers.
6. Install Anti-Spyware and Ant-Malware Software: This help continuously to scan for unwanted software or program on your computer machine. No matter how strong any anti-virus is, there is the need for a back up, and that is the function of these software.
7. Automatic Scanning: Ensure automatic scanning of your computer machine when in use. This will help detect any malicious program or file that may find their way into your system. Most of the anti-virus programs have this setting, ensure that you activate it.
6. Computer Expert Services: If you are not very versatile in the operation of computer systems, you should employ the services of an expert with respect to this subject especially for corporate organisations. Don’t be naïve and be a victim of hackers, computer viruses are real. Once your computer system is infected, you will need to employ a computer virus remover. The type of computer virus remover recommended will depend on the kind of virus in question as discussed in my article, Removing Viruses from a Computer Machine.

If you find this post Computer Virus useful, feel free to make comment, observations, questions and contribution. You can bookmark this site for easy access and share it with others.

No comments:

Post a Comment