...of anti-virus protection is to detect malicious software; it does this by scanning files and software though the database, this is known as definition files. Anti-virus protection will protect the computer from malicious software and viruses. Malicious software is self-replicating so that anti-virus protection is used to stop this kind of software replicating. A virus will make the computer shut down, so anti-virus protection is put in place to prevent this from happening. There are different forms of viruses which anti-virus software prevents; these include adwok, malware and worms. Adwok are advertisements which users may see on websites they visit, for example you may visit a website like eBay, and then when you go on to...
Words: 1817 - Pages: 8
...attached to your machine. So, what is a cookie? According to the Microsoft website, “Cookies are small files that websites put on your computer hard disk drive when you first visit.” Cookies in and of themselves are not necessarily damaging, but they can use up valuable space on your machine. You must regularly delete cookies or they will slow down your computer. There are several ways to do this. I currently use CC Cleaner. This is a free download that will allow you to clean up both cookies and caches. A cache is a collection of data. It is fairly straightforward to run CC Cleaner. Simply download from http://www.piriform.com/ccleaner and then follow the program directions. You may also use the Microsoft directions for deleting cookies. As per the Microsoft Support website, the steps are given below. 1. “Open Internet Explorer by clicking the Start button. In the Search box, type Internet Explorer, and then, in the list of results, click Internet Explorer. 2. Click Tools from the menu, and then click Delete browsing history. 3. Click the Delete Cookies button 4. Click Yes when asked if you want to delete cookies” How frequently you delete cookies and caches are entirely at your discretion, but I try to use both of the above methods on a weekly basis. You must also protect your computer from viruses. There are many, many tools on the market designed to do...
Words: 857 - Pages: 4
...We all know that any type of USB Mass Storage Device is susceptible to a virus infection. Yes we do have Antivirus,you have [Insert your best bet AV name],but at some time the virus can and will bypass the security measure that have been placed by our security system software. We also have to remember that the av's rely heavily on its database signature of virus. This means if your system is to be infected by a newly crafted virus ,chances are your av won't detect it at all eventhough its equipped with a highly advanced heuristic scanner. Enough with the bull. What i'm really trying to say is how dangerous it is for us to double click/"Open" your pendrive's drive in "My Computer" right after you plugged in your USB storage device. When you double click or "Open" ,you are actually trying to launch the virus itself embedded in the USB storage device or more specifically you are actually excuting the program stated in the file named autorun.inf.example of the content of the autorun.inf file: [autorun] open=yxcm.exe This is the only way a virus can move,run or to be excecuted. So this method of propagation highly depends if the host has the following.. etc weak av,unupdated av,computer illiterate user. We can safely say that every infected USB storage device have both autorun.inf and atleast an executable. Usually these two files are extra hidden and can only be seen using the Command Prompt. To see the hidden files using the command prompt. Launch the command prompt by clicking...
Words: 507 - Pages: 3
...Running head: Malicious Code MyDoom Worm Daniel Stevenson 11/22/2013 ITT-Tech North Las Vegas Abstract In this paper I will be detailing the Mydoom worm and what this has done to computer systems as well as what was the steps in how to prevent or remove this hazard from your computer. MyDoom Worm No one wants a virus on their computer, especially when it means that you may be spending money to remove these nasty pests from your system. There are all sorts of things that can infect your computer from viruses, worms, rootkits that make your computer into a puppet and also malicious spam ware and malware. All of these things can wreak havoc on your network. In this paper I will tell you about a worm that still has the record for being the fastest spreading virus. This virus is known as W32.MyDoom@mm. This worm has other names but this is the one that it is most known by. The Beginning MyDoom was a worm that came to the public eye at the beginning of 2004. Finnish security company F-Secure named is the worst virus to date because of the way it quickly infested users emails and quickly attached itself to any email that was going out that had an attachment. When the worm first came into the spotlight F-Secure stated that the worm was on 20-30% of the worldwide internet traffic. Another company that screens emails for companies, MessageLabs, also stated that it had intercepted the worm more than 3.4 million times at a rate of every 1 in 12 emails at its highest. This...
Words: 809 - Pages: 4
...Introduction This survey is conduct to measure people awareness toward the email fraud and virus through the spam email or junk email that included Nigeria Sting operation, phishing and stock manipulation schemes. Besides that, this survey also will show how people react through the every email that they receive in spam and how they react for email that they didn’t have the information of the email. Then the action of the email user to avoid having junk email that can affect theirs computer and overall action towards this problem. Research objective The objective for this survey is to find solution to determine the email is a scam or not. Besides that, this survey also allows people to realize about the awareness of internet email scammer. The information that I receive will show the public awareness to this kind of problem and also provide me some suggestion due to find the solution. Besides that, through survey we want to find solution for user to manage junk mail that they receive and how to recognize if the sender of the mail is being hacked or not. Data collection process This survey will conduct through online survey among my friend who is also an email user. This survey was sent to 5 students among the UUM. The survey content questionnaire about how they react towards email that didn’t have any information of the sender, what their solution and also if they have encounter any type of email that consist Nigeria sting operation, phishing and stock manipulation...
Words: 1078 - Pages: 5
...Computer Virus Good afternoon, ladies and gentlemen, I’m glad to bring my presentation for everyone. Before the start, I want to ask a question, I think most people like searching internet, someone like play computer games, someone like shopping, someone do other things. Whether you have the experience of account theft, information loss, and other internet security problems. So, today my topic relate these problems, computer virus. What is computer virus? CV is a computer program that can replicate itself and spread from one computer to another, and it cause the damage of computer function or destruction of data. Does anybody who knows the first computer virus in the world? Generally believed that as early as 1981, Apple gave birth to the first computer virus. In 1986 a personal computer virus, comes from a pair of Pakistan's brothers, Buster and Amjad for the purpose of preventing piracy written in C-the BRAIN virus. It is estimated that there are about 2 million mature hackers in the world, and over ten thousand new virus every day, the virus caused the loss of $ 100 billion annually. (1) Computer virus is a new derived in the form of computer crime A computer virus is a high-tech crime, transient, dynamic and random. Difficult to evidence, the risk of small damage, so stimulating crime awareness and crime activities. The virus does not come from the unexpected reason, most virus can be found in the author and origin information, from the statistical analysis of a large...
Words: 598 - Pages: 3
...Check your computer for spyware. This is a type of software that runs in the background and monitors your usage, sending information back to companies without your approval. Image titled Make Your Laptop Work Faster Step 44 Install anti-virus software. This may seem counter-intuitive, but anti-virus software keeps malicious programs from invading your computer that could slow it down a lot more than an anti-virus program could. Image titled Make Your Laptop Work Faster Step 55 Keep big files off the desktop. If you tend to download a lot of things off the internet, chances are you keep it on the desktop. If your desktop looks cluttered, move any non-essential files into a separate folder. This keeps your computer from having to keep track of them whenever it is turned on. Image titled Make Your Laptop Work Faster Step 6 6 Disable Windows Aero. Aero makes the edges of windows pretty (semi-transparent) making your computer seem "smoother." If your computer isn't up to all these graphics, Aero will bog it down. To disable Aero, right click anywhere on your desktop and select "Personalize" from the drop-down menu. On the list of themes that appears, scroll to the bottom and select "Windows Classic." Image titled Make Your Laptop Work Faster Step 77 Upgrade your memory. If you want great performance without sacrificing your programs, you may want to consider a memory upgrade. These typically run $50 - 70 for laptops, and most small places will install it for free. A memory...
Words: 965 - Pages: 4
...Explain how software utilities can improve the performance of computer systems D1 Virus Protection Virus protection improve the system performance by maintaining a healthy environment for the computer user to keep out malware that slow down system performance and the computer effectiveness this is because it stop malware from getting in the system, noticing or detecting any malware that is found in the system and it will eventually remove that malware from the computer. When the system becomes malware free its run smoothly and effectively without interference or performance downfall, without anti-virus protection malware will be on the system unnoticed. Unless you found it in your system then you can delete the malware, virus protection helps the user and this always speeds up the process as it is designed to perform this function. Firewall...
Words: 493 - Pages: 2
...among both law enforcement personnel and computer scientists who specialize in security that both the number of computer crime incidents and the sophistication of computer criminals are increasing rapidly. Estimates are that computer crime costs victims at least five billion dollars each year in the USA, and the true value of such crimes might be substantially higher. In computer security, there is a new word: "information warfare." While "information warfare" is just another name for computer crime, the word "warfare" does fairly indicate the amount of damage inflicted on society. There are three major classes of criminal activity with computers: unauthorized use of a computer, releasing a malicious computer program (called a “virus”) and harassment on the Internet. These are in contrast to merely using computer equipment as a tool to commit old crimes. Unauthorized use of computers generally takes the following forms: Unauthorized viewing of computer files, changing data, deleting data, and denying service to authorized users. Most unauthorized use is accomplished by a person who uses a modem to access a remote computer from his house. In this way, the computer criminal...
Words: 1218 - Pages: 5
...Explain the purpose of different software utilities (P3) and explain how software utilities can improve the performance of computer systems (D1) Security Virus Protection is in place to protect your PC from any sort of viruses that may infect and harm your computer. Viruses can come in many different forms and can be hidden in different ways to get into your computer. A virus protector will scan through any files/links/websites that are opened on your computer to detect viruses from a ‘dictionary’ of known viruses. If a virus was to infect a PC the effects on the PC can be irreversible and very harmful. It is important to have virus protection running on your PC as even though in rare cases this slows down the computer, the prevention of virus infection is vital to the security of your PC. Firewalls are in place to protect your computers server and keep its identity hidden when using unknown servers to connect to the internet. They also monitor ingoing and outgoing data and anything that could be harmful to your PC is scanned for viruses/malware. Firewalls improve the performance of the PC as they filter through any communications between servers and blocks and malicious communication attempts. They can also be programmed to block certain types of websites and servers to aid even more to the prevention of your PC being infected. Clean Up Tools Removal of cookies is important as they are bytes of data from your computer that hold personal information and can even hold your...
Words: 652 - Pages: 3
...How to detect if a Keylogger is installed? - Microsoft Answers 1 of 8 Applies To: Windows Windows Vista http://answers.microsoft.com/en-us/windows/forum/windows_vista-sec... Security, Privacy, and User Accounts Question Secure_Leonilo asked on August 22, 2010 How to detect if a Keylogger is installed? Hi, I would like to get some help... I suspect that the computer I use at work probably has a keylogger installed. Could you recommend an online, free, and reliable tool to detect keylogger? Please recommend a couple of tools, so I can try them in case one doesn't detect anything. On the other hand... is it possible to know where the log files generated by the keylogger are sent to? As far as I know, they are sent to an email address that belongs to the person who has installed the keylogger on someone else's computer, so that he can see all the victim types. I suspect that I got keylogger installed from a work partner. thanks a lot in advance! Reply Reply with quote Report abuse Email updates Answer A. User replied on August 22, 2010 Was this helpful? 1 Vote Try these Programs: If necessary, do all the work inSafe Mode with Networking. To get intoSafe Mode with Networking, tap F8 right at Power On / Startup, and use UP arrow key to get toSafe Mode with Networking from list of options, then hit ENTER. Read all info below before starting: http://www.malwarebytes.org/mbam.php Malwarebytes is as the name says, a Malware Remover...
Words: 3159 - Pages: 13
...Minwossi Zerbo Mrs. Jensen English 1A-21 14 November 2015 Computer Security: Worms and viruses Nowadays, in the domain of computer sciences, there is a big problem to face: Worms and viruses. Being in the technology is a good thing, but being n the technology without knowing how to avoid the consequences of the technology is worse. Viruses and worms affect the computer and damage, or in other words corrupt some files that are important to the good functioning of the computer. Viruses have many ways of penetration that computers user ignore, and that’s what makes the damage even more severe. First of all, let’s start by defining a viruses and a worm. A virus is a malware program (not a computer program), that auto run, and replicates by adding copies of their code into other computer program, any other type of data that it comes across. This will create an overall corruption of your database and your computer. In reality, there are three categories of computer infections malwares and we defined the first one which is viruses. The two second malwares are worms and Trojan horses. In a questions of codes or designs they are all similar, but the differences come in the way these three categories act. Contrarily to viruses that need a human action to spread, such as sharing files, running an infected program, and so on, worms have the ability to auto spread themselves, which mean that they don’t require the action of a human. They can travel by themselves by taking advantages...
Words: 1076 - Pages: 5
...will inform the user that they need to enable macros to view the document correctly. Macros are saved and execute a binary file that downloads and installs the malware from a remote server. 2. Installed using the rundll32.exe file, which is considered safe by anti-virus software. When Locky is installed, a binary is copied to the %TEMP% directory and renamed to svchost.exe, to make it difficult for people to find and delete (blog.avast.com). Locky encrypts all the drives on the victim’s computer and deletes all Shadow Volume Copies so these cannot be used to restore encrypted files....
Words: 712 - Pages: 3
...The person might have a computer virus infection when the computer starts acting differently. For instance getting slow or when they turn the computer on, it says that all the data is erased or when they start writing a document, it looks different, some chapters might be missing or something else ubnormal has happened. The next thing usually the person whose computer might be infected with virus, panics. The person might think that all the work that have been done is missing. That could be true, but in most cases viruses have not done any harm jet, but when one start doing something and are not sure what you do, that might be harmful. When some people try to get rid of viruses they delete files or they might even format the whole hard disk like my cousin did. That is not the best way to act when the person think that he has a virus infection. What people do when they get sick? They go to see a doctor if they do not know what is wrong with them. It is the same way with viruses, if the person does not know what to do they call someone who knows more about viruses and they get professional help. If the person read email at their PC or if they use diskettes to transfer files between the computer at work and the computer at home, or if they just transfer files between the two computers they have a good possibility to get a virus. They might get viruses also when they download files from any internet site. There was a time when people were able to be sure that some sites...
Words: 366 - Pages: 2
...Windows, Mac OS etc. A root kit is a set of tools used by a hacker to infiltrate a computer system without the knowledge or consent of the system's owner. These tools help the intruder gain access to the system in order to perform malicious activities at a later date without being detected. WHAT MAKES IT DIFFERENT FROM A VIRUS? Most often, rootkits are used to control and not to destroy. Of course, this control could be used to delete data files, but it can also be used for more nefarious purposes. More importantly, rootkits run at the same privilege levels as most antivirus programs. This makes them that much harder to remove as the computer cannot decide on which program has a greater authority to shut down the other. DETECTING AND PREVENTING ROOTKITS One issue with rootkits is that they are constantly updated; even with all sorts of computer security protocols programmed every day to specifically eliminate rootkits, people who program them continue to develop and update the rootkit, or make new ones. It doesn’t mean, though, that they cannot be prevented. Methods through which RootKits can be prevented are: * Anti-virus software. While anti-virus software may not necessarily remove a rootkit, it can intercept and quarantine viruses and malware that may have entered the computer system because of a rootkit. * Secondary boot device. Another way to detect a rootkit would be to use another booting device (like a copy of Linux on a USB disk) to access the computer...
Words: 1362 - Pages: 6