How to Prevent a Computer Virus and Protect Your Email ?


Viruses and other malicious PC threats can easily infect our computer systems. Basing on my personal experience and study from the Internet, I would like to share some tips about how to prevent computer virus and safeguard your email.

How to Protect your Computer from Viruses?

Never open the attachment from the unknown email or unexpected email, even if the attachment seems to be a.jpg image file. This is because Windows allow users add multiple suffixes on the file name, while many email applications usually display the first suffix only. For example, if you see an attachment named wow.jpg, its full name actually is wow.jpg.vbs. Therefore, to open this attachment will result in the running of a malicious VBScript virus.

Before you insert a floppy disk, CD-ROMs and other removable media, make sure they have been scanned for viruses. And, make sure your computer can automatically check for viruses when the removable media inserts or emails and network file are received.

Guard against fraudulent virus. If you receive an email from your friend which claims that there is a most lethal new virus and requests you to forward this warning email to all your friends. This may be a fraudulent virus actually. You are suggested to turn to the antivirus software vendors, such as Symantec's website, to confirm the claim.

Use other forms of documents, such as.rtf (Rich Text Format) and.pdf (Portable Document Format). Common macro viruses spread through Microsoft Office programs. Therefore, the less use of these files types will lower the risk of being infected by viruses. Try to use Rich Text to save your files. This does not mean that simply use.rtf suffix in the file name, but that in Microsoft Word use "Save as" command, and in the dialog box select Rich Text format to save the file. Although Rich Text Format may contain embedded objects, it itself does not support Visual Basic Macros or Jscript. The pdf file is not only a kind of format available in many platforms, but also more secure.

Use the client-based firewall or filtration solution. If you are using the Internet, particularly the broadband, and you are always online, then it is very necessary to use a personal firewall to protect your privacy and to prevent the unexpected visitors to access your system. If your system does not have an additional effective protection, your home address, credit card number and other personal information could be stolen.

If there are share files set with full access by users in the local area network, viruses may very easily come in. This also brings the frequent access of the infected computer to the share files, and results in network congestion.

http://goo.gl/pte1E

How to Check Virus Email Threats ?

One of the downsides of the computer age is having to worry about hackers who are trying to infect your computer with viruses sent via email. While opening a suspicious-looking email may not trigger the virus, the safest course of action is not to open it at all. If it's too late and you've already opened it, don't click on any of the links associated with it or open any of its attachments. There are several online resources where you can check virus email threats

Instructions

Open your Internet connection, and log on to Snopes.com.

On the Snopes.com homepage, click on the "Computers" icon.

Select the "Virus Hoaxes and Realities" link.

A list of Virus Hoaxes and Realities will appear. If you see the one you're wondering about, select it. If it is not listed, type it into the search box at the top of the page.

Snopes will give you the following information: the name of the virus; whether it is real or a hoax, an example of how it might look in your email inbox; what any legitimate emails on the same topic look like; the history of the virus, any additional information; and the date of the information's last update.

Read more: http://goo.gl/y8al7

Choosing right Antivirus Software Against The Ongoing Virus Threat

Your computer is indispensable in that it stores all your precious data and information, so just imagine your frustration at losing them if a virus infects your computer. Computer viruses can easily enter your computer via the internet and infect the programs and files on your computer, causing valuable data to be lost forever. If you do not want to face this nasty dilemma, it is crucial that you protect your computer, programs and data with good anti-virus software.

Antivirus software scans your computer to search for any computer virus, old and new. If it finds any virus, the antivirus software eliminates it from your system. Some antivirus software also has the capability of adding antivirus updates and fixes to your computer system that helps protect your computer from newer versions of viruses as well as from spreading them to other computers.

There is a wide range of sophisticated antivirus software available these days. However, the effectiveness of any antivirus software is measured by its ability to detect the ever-changing virus threats. Even as antivirus software improves, computer viruses are becoming even more virulent, with new sets of viruses released every other day. Your current antivirus software that sits on your computer often fails to recognize these new sets of viruses, so it is extremely important to keep your anti-virus software constantly updated to include protection against new lists of virus threats.

When the antivirus software detects a virus-infected file, the software can either repair the file, or remove it to prevent the viral code from spreading to other files in the system. Once a new virus is detected, the codes are sent to virus analysis centers. These centers then conduct a thorough analysis of the virus, and work out a string of programs to identify and protect against this newly discovered virus. The fix is then added into a database from where the users can download the updated version of the antivirus program.

Most of the advanced antivirus software follow four main methods of virus detection. These methods include: scanning, integrity checking, interception, and heuristic detection. Scanning and interception are the most commonly used methods for most of the popular anti-virus software. The other two procedures are used by some lesser- known antivirus packages. However, the scanning process used by major antivirus programs can only be effective when the virus is recognizable to the software. Scanning, however, is not an effective solution for dealing with new viruses. Thus the role of antivirus analysis centers becomes extremely important and significant in the ongoing fight against new virus threats.


Article Source: http://goo.gl/C5i5w

Protect Your Computer From Computer Virus Threats

A computer has to deal with lots of different worries on a daily basis while performing at a high level of service. It's our tool to get work done, pay bills with, and stay in contact with loved ones around the world. We need it to be at the top of its game, otherwise we're left in limbo and feel lost without its capabilities. This is why computer virus threats can be a nightmare if you don't have the protection set up to handle the newly created bugs from entering your computer and reproducing in its files.

If you don't keep up on things, there are always new computer virus threats appearing. There can be countless ones every day. It can be hard to keep track of all of them if you don't have a protection program set up to handle the threats. There's no way of knowing if something slinks into your computer if you don't have protection software. Antivirus and spyware blockers work hard to protect your computer against the nasty bugs. The cleaners watch the computer's registry like a hawk, making sure nothing gets past their defenses. They scan the hundreds of registry files making sure there are no invalid entries, because if there are, it could cause you more problems down the line. If there are any errors, it will provide a list and allow you to clean a specific one or automatically take care of the entire problem. You need protection that's going to notice the smallest of changes and will fix the problem without the bug causing damage to your files. It's also important to make sure the program you use has automatic updates, which helps it handle the new swarm of bugs wanting to take over the system's files.

You can go to different places and find the upcoming viruses, spyware, and adware that will be new to the information world or see the newly created ones already causing havoc in people's lives. Companies have to work hard to stay ahead on the battle front, which is why many offer free updates on a continuous basis so you have the newest protection against computer virus threats. This helps take care of any security gaps that come up in your current software protection. This can be a difficult battle to fight, but it will be easily won if you have the right protection software installed on your computer. Research what's available and read the reviews and you'll be able the perfect protection for your system.

Pros:

  • You have heavy-duty protection software to handle new computer virus threats.
  • There are automatic updates for protection against any new bugs.
  • Companies are constantly on the offense to fight against security gaps.

Cons:

  • Your program doesn't have automatic updates.
  • Software isn't upgraded to handle the new swarm of viruses ready to hit the information highway.

To protect your information from computer virus threats, make sure you have appropriate protection in place.

Article Source: http://EzineArticles.com/4629231

The History of the West Nile Virus – Threat in North America

The West Nile Virus (WNV) has been a confirmed threat to human health ever since the thirties, when the world recorded its first known case. The case was a febrile (suffering from fever) adult woman in the West Nile district of the country of Uganda, which is in Africa, and was then a British ruled territory.

After the 1937 beginnings (or confirmation and isolation at least, the virus itself has most probably been around for much longer as an unrecognized factor in illness) it soon spread, moving across Africa, and then northwards to the Mediterranean coast, and Egypt in particular during the 1950’s.

From there the West Nile Virus took a short hop across to Israel, where in a 1957 outbreak, it was realized that it could be the cause of severe encephalitis (inflammation, or a swelling of the brain) and meningitis (inflammation of the membranes that line the brain and the spinal cord) in older patients.

Horses and Birds are affected too

But it was not only humans that were to suffer the effects of this newly discovered danger; horses were the victims of outbreaks in both Egypt and then France and southern Russia, as the WNV reached the shores of Europe for the first time in the sixties.

Now it was in Europe, it was responsible for irregular outbreaks throughout the continent, the Middle East and North Africa over the next decades: Belarus and Ukraine were hit in the seventies as well as the eighties (then still part of the Soviet Union); Algeria in 1994; Morocco in 1996; Romania and the Czech Republic in 1997; Italy in 1998; and Russia again in 1999; France and Israel in 2000.

It has also returned to Africa with an outbreak in the Congo, and spread across Asia at various times in the past half century. Oceania has not been spared either, with the subtype of WNV known as Kunjin making itself known there.

Why the West Nile Virus should choose to make such periodic and erratic appearances is not fully understood. But scientists have come up with a number of theories that might explain how the mosquitoes which carry the disease can breed more successfully at some times than others, which include; fluctuations in temperature; changes in rainfall patterns with more subsequent flooding involved in the equation; different human irrigation habits; less successful predation of mosquitoes because of accidental human interference with the breeding habits of mosquito predators; and other environmental concerns.

North America joins the list

Birds are also victims of this disease, and it was the death of some wild birds (mostly crows) in New York starting from June 1999 as well as some Flamingoes and Pheasants at the Bronx Zoo in September, that was a signpost of the first appearance of the West Nile Virus in the Western Hemisphere.

People were suffering too, starting in early August, as well as horses on Long Island a little later. Public health officials knew of an outbreak of an arbovirus (an abbreviation for arthropod borne virus) which was causing this encephalitis, but it had at first been put down to the closely related virus known as St. Louis encephalitis (SLE), which is endemic (native) to the United States.

However, the detective work began in earnest across various laboratories, and soon the researching scientists began to realize that something new and slightly different was responsible for the severe illness they were encountering.

Vets help the Doctors

As well as the CDC (Centers for Disease Control and Prevention) who were already on the case they were helped out by APHIS (Animal and Plant Health Inspection Service), an agency of the USDA (United States Department of Agriculture).

A part of APHIS is the National Veterinary Services Laboratories (NVSL), and they were contacted by Bronx Zoo, and asked to provide assistance in isolating the virus that was responsible for the death of their birds.

And so, on September 14, 1999, the culprit was found. Using advanced diagnostics NVSL isolated a virus from brain tissue and sent the findings on to the CDC for further identification.

Thirteen days later CDC announced that this finding, along with their own research on serum and other tissues collected from human patients in the New York area, and specimens of mosquito vectors, as well as other work carried out on infected horses, apparently showed that the West Nile Virus was the cause, and that therefore it had finally arrived in North America, and they later confirmed this to be so.

This initial outbreak would kill seven humans out of a total of sixty two that were infected with severe disease, and deal out death to eight horses from twenty three infected.

WNV starts to spread across the land

This was only to be the start.

A spraying regime was initiated in New York City, especially in the southern area, which is a region of ponds and wetlands where mosquitoes breed in huge numbers. But despite such preventative measures, it was surely inevitable that the virus would spread.

And it did. West Nile Virus returned to New York in late July, 2000 when it killed two more people out of a total of twenty-one infected, and was then found in New York state and Connecticut; and soon wider than that. It went up to Canada and raced out across twenty seven U.S. states by the close of 2001.

In that year, neuroinvasive diseases caused by the virus was directly responsible for nine more human fatalities, out of sixty six serious cases. Horses were faring no better, there were more than six hundred and fifty cases across nineteen states, much more than the sixty or so from the previous year. How many wild birds died is not known, but many thousands tested positive.

The next year brought more mosquitoes and more victims to disease triggered by West Nile Virus infection - 284 deaths out of 4156 cases in humans.

In 2003 there were a total of 9862 cases in the United States reported to CDC from ArboNet (an electronic surveillance scheme created by CDC to help the different states with collating West Nile Virus information). The majority of theses were of course WNF or West Nile fever, which is only a mild and short term flu-like ailment.

But some were less lucky, and serious disease such as West Nile encephalitis and meningitis struck as well, causing 264 deaths. The five worst hit states in this year were Colorado with 63 deaths; Texas with 37; Nebraska with 29; South Dakota with 14 fatalities, and New York which recorded 11 deaths.

By now, in the United States, only Alaska, Hawaii and Oregon have escaped the effects of the West Nile Virus in either humans, birds, horses or other animals.

The Government is watching

Surveillance was of course, begun as soon as the threat from WNV was recognized. These various methods are for the purpose of monitoring the spread of the virus as it jumps to new geographic locations, and re-emerges from where it was thought to be removed.

The collated statistics and other information are also used by the relevant health and environmental authorities to plan control and prevention measures, and otherwise assist with overall strategies for fighting back against this new danger.

This is why citizens have been encouraged to report any dead birds they find, but this is only a part of the whole. Mosquito populations are now monitored carefully across the land, and helpful reminders of prevention techniques can be released to the public if the level of infected mosquitoes begins to rise in any region.

The CDC’s “fight the bite” campaign is one such example, and is helpful to reduce instances of West Nile Virus infection.

Although the percentage of those infected developing any symptoms at all, let alone severe and life threatening disease are relatively low, and some campaign groups regard the spraying of adulticides to kill mature mosquitoes as potentially more harmful in the long run to public health than the WNV itself; chances cannot be taken that this newly arrived virus to North America will not become increasingly prevalent. This is especially so while no vaccine to West Nile encephalitis exists for human use.

So although the West Nile Virus has only been on American and Canadian land a few brief years, the two governments would like its stay to be as short as possible.

About The Author

Matt Jacks is a successful freelance writer providing advice for consumers purchasing mosquito repellents and various mosquito control products and tips on recognizing symptoms of the West Nile Virus. His numerous articles offer tips and valuable tips and insight on a wide range of topics.


Source:-thehistoryof.net

CONFICKER VIRUS THREAT FOR WNDOWS VISTA AND WINDOWS 7: SECURITY EXPERTS PUZZLED

So you think that you have the latest security software to keep your pc or mac safe?well think again.The Conficker virus has opened a new can of worms for security experts , as low security networks, memory sticks, and PCs without current security updates are in grave danger of being severly damaged by the conflicker virus also known to be Downadup or Kido and was first discovered in October 2008.

Portable storage drives such as USB sticks infected with the virus trick users into installing the worm. According to security experts, a ‘social engineering trick’, which exploits the way humans think and act is said to be the biggest challenge that this virus puts before us. Even though the bogus option is marked as being in the category ‘Install or run program’, many users will see the familiar ‘Open folder to view files’ wording and icon that they click on it without thinking.

The "Autoplay" function in Vista and early versions of Windows 7 automatically searches for programs on removable drives.However, the virus hijacks this process, masquerading as a folder to be opened. When clicked, the worm installs itself.


How does the worm work? - Method of infection

Microsoft says that the worm works by searching for a Windows executable file called "services.exe" and then becomes part of that code.It then copies itself into the Windows system folder %Sysdir% as a random file of a type known as a "dll". It gives itself a 5-8 character name, such as piftoc.dll, and then modifies the Registry, which lists key Windows settings, to run the infected dll file as a service.

The virus attempts connections to one or more of the websites such as getmyip.org ,getmyip.co.uk ,checkip.dyndns.org to obtain the public ip address of the affected computer.As soon as the worm is up and running, it creates a HTTP server and then resets a machine's System Restore point (very hard to recover) and then downloads files from the hacker's web site.Later variants of w32/Confickerworm are using scheduled tasks and Autorun.inf file to replicate on to non vulnerable systems or to reinfect previously infected systems after they have been cleaned.

How does Conficker differ from other virus/worms?

Most malware download files from easily detectable malicious or attack sites, making them fairly easy to spot, and immediately shut down the file download.But the worm uses a complicated algorithm based on timestamps from websites such as google.com to generate hundreds of different domain names every day. Only one of these will actually be the site used to download the hackers' files,making it extremely difficult to trace the target site .

Impact and damage caused by the worm so far

It is estimated that a whopping 9.5m PCs are infected with this virus. Once the Conficker worm is executed in a pc, the downadup virus disables essential security services such as windows automatic updates,security center, defender and error reporting to name a few.Along with downloading and installing malware on your computer and gathering your personal data, the conflcker adheres or sticks itself to key windows processes like svchost.exe, explorer.exe.


Removal

It is of paramount that one should turn off autorun and autoplay features in your pcs to prevent the worm from gaining a foothold onto your syatem.Windows users are urged to download the KB958644 Security Update from Microsoft to mitigate the risk of infection.

Microsoft's amlicious software removal tool (KB890830) and f-secure malware removal tool are some of the software that are available to keep conficker at bay.Keeping your antivirus software updated regularly to keep track of the constantly evolving virus definitions is a good preventive measure that would go a long way to ensure safety to your pc.As they say' better safe than sorry'.

Source :--threats.blogspot.com

Reducing Virus Threats

Every computer user dreads the moment when a virus will manage to penetrate the computer system and become the uninvited party crasher. In an effort to minimize the probability of having to experience such a stressful moment, most computer users have now installed in their computer's memory, software programs that act as shields against such malicious threats. These defenders, called antivirus software programs are designed to recognize and thus prevent malicious computer code from being executed without the user's knowledge or permission. Most of today's computer users have at least one antivirus system installed in their computer's hard disk.

Just like mothers advise their children to dress warmly and drink lots of fluids, like orange juices which contain high quantities of Vitamin C, in order to protect their health during the cold winter season, so should a computer user take good care of his or her personal CPU. First, it is important to be aware of the different types of viruses that exist and also to know how they work. But most importantly, one has to keep his or her computer current with the latest updates and antivirus tools. Knowing which the recent threats are is not enough. It is of immense significance to frequently update the antivirus program installed and to follow some simple basic rules when surfing the Internet, downloading files, and opening attachments. According to those who had suffered from malicious code, it does not matter what is the type of virus that your computer has been infected with, or through which method it was led to your computer's hard-disk, as it is critical for you to be able to remove it and to prevent any further damage from taking place.

Towards that direction, computer developers have developed antivirus software systems, Internet firewalls, and antispyware programs. Each of these methods can decrease the possibility of a computer being affected by a dangerous virus, but nothing can 100 percent guarantee that a computer will stay virus-free forever. The only thing one can do towards that direction, is to continue improving his or her computer's security by keeping the firewall system up-to-date and maintaining a current antivirus software subscription. Following the generally accepted guidelines, of never opening an email attachment coming from an unknown sender or to avoid downloading programs from not-trusted sources, can lead to a safer online navigation. These simple rules, along with the performing frequent system updates and keeping backup data files, might be the only methods computer users have so as to continue enjoying a virus-free life.

Source: http://goo.gl/CVNp0