Know More about Your Enemies


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Know More about Your Enemies

  1. 1. Know about Your Enemies
  2. 2. Know All about Your Enemies Whenever your computer starts acting weird and makes it difficult for you to work on, the first thing that comes to your mind is whether a virus has affected your computer. This issue is dedicated to explain the most common threats that you may face. It gives you some details to help treat the root cause of any problem. Here are some definitions on these threats: Malware is any malicious program or software that’s designed to exploit a computer user. Malware is basically an umbrella term covering computer viruses, worms, Trojan, spyware, rootkit etc. Virus replicates itself in computer memory when initiated by the user. They contain some malicious codes which can affect your files, your operating system or even your master boot records thereby making your computer start slow or not boot at all.
  3. 3. Know All about Your Enemies Rootkits are computer programs that are designed by attackers to gain root or administrative access to your computer. Once an attacker gains admin privilege, it becomes a cakewalk for him to exploit your system. Trojan horse is a program that appears useful by pretending to do certain things in foreground, but in reality they are working silently in background with the only objective of harming your computer and/or stealing valuable information. It penetrates your computer through downloading malicious software like keys, cracks, free illegal music, wares etc from an unknown source. A worm is an evolved form of a virus. Like virus, worms replicate and spread themselves but it happens on a bit larger scale. They not need a human action to replicate and spread and that’s what makes it more dangerous. It always seeks for network loopholes to replicate from computer to computer. Therefore, it is not recommended to download any email attachments or to click the links friends share with you in a chat window.
  4. 4. Know All about Your Enemies (part II) Here are more details on these threats: Spyware , unlike any of the above, doesn’t harm your computer in any way. Instead, they attack you! Once installed on a system they run in background and keep on collecting user’s personal data. These data can include your credit card numbers, passwords, important files and any other personal stuff. It is always advisable to download and install software from trusted sources. A backdoor is a method of bypassing normal authentication procedures. Once a system has been compromised, one or more backdoors may be installed in order to allow easier access in the future. Backdoors may also be installed prior to malicious software, to allow attackers entry. It is worth-knowing that crackers use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors, crackers may use Trojan horses, worms, or other methods.
  5. 5. Pick up Your Armor and Face Your Enemies Through the previous issues of Softex newsletter, you were introduced to your enemies and were given detailed description on each of them. I believe now you need your shining armor and sword to confront these vicious threats. In this case, regular scanning and an effective antivirus system are essential for the security of your system, which prevents damage and data loss. The following steps will guide you to choose the best antivirus for you: Step 1: Make a list of your requirements You have to assess your requirements and know all about your operating system in order to know which antivirus (for your PC, Business or Mobile ). For example, if you are looking for business features, however, you will want offerings of a full suite such as anti-spyware, spam filter, anti-virus and firewall.
  6. 6. For More Related Articles, Please Visit