How to Protect Your Computer from Viruses?
A Step-by-step Guide

How to Protect Your Computer from Viruses? A Step-by-step Guide

I welcome you to read a new material on the topic of computer security. We will discuss how to protect your computer from viruses, the definitive step-by-step guide.

People are convinced that their computer completely quietly allows sending information in any direction.

All this leads to completely logical conclusions: you need to make security settings, configure and install the best intelligent antivirus and firewall.

Viruses and Worms

Malicious objects are divided into viruses and worms. The main difference in the principle of their distribution.

Viruses get on the computer basically at start of any program. For example, together with autorun of removable media. Worms, in turn, get to users' computers through local networks and the Internet.

In addition, there are combinations of viruses and worms. In the pure form of viruses or worms practically does not remain. In order to have a greater chance of spreading, they have to work hand in hand. That's why people often just say "viruses" and that's it.

The main task is to know what to do in order not to infect the computer with a malicious object. Therefore, it is important to know the main ways of infecting a computer.

Ways of infection a computer:

First of all, of course, infection occurs via the Internet (downloading files from sites, visiting malicious pages with active content, moving through malicious links or launching malicious, dummy programs downloaded from the Internet).

Recommendations for Protecting Your Computer

  1. Windows Update. Read a Windows Update FAQ for details.

    The penetration of viruses into the operating system occurs through its vulnerability. Since viruses find more and more "holes" in Windows, security updates are mandatory. It's possible that you do not have to install all the updates, but installing security updates is an important condition on the way in the fight against malicious objects.

    Unfortunately, or fortunately, we can not know in detail what exactly these updates fix, so we have to believe Microsoft that their updates are really needed. From my experience I can say that it's much harder to fight viruses on your computer if updates are disabled.

  2. Remote Assistance. Read a Step-by-Step Guide to Remote Assistance.

    Thanks to the Remote Assistance function, you can make connections remotely to your computer. In order to protect yourself from this vulnerable function, it is desirable to disable it and use third-party programs if necessary.

  3. Windows Services. Read what is a Windows service.

    Disable unnecessary vulnerable services that are included in Windows by default. For example, you can precisely disable these services: the netbios support module, the configuration of the remote desktop server, and the Windows Remote Management service.

  4. User Account Control. Read what is a User Account Control in details.

    In the Windows operating system, with each version, the UAC function is improved. Thanks to this function, Windows tries to track all activities in the system and warn the user about the start or installation of a program. For reliability and greater safety, establish control above the average.

  5. User with the Limited Permissions. Read about users permissions in details.

    This is one of the most important recommendations: create a second user in a system with limited (regular) access and use the Internet only under this user. If a virus penetrates your computer and intercepts the user's functions, then it will not be able to fully implement all functions of the system, since a user with limited rights can not change system functions and install programs.

  6. Public Wi-Fi Networks. Read about Wi-Fi networks in details.

    When working in public wireless networks (railway stations, airports, cafes) use the function when connecting to the network "public network". Being connected to such a network, do not manually enter passwords and logins to your accounts. Keyloggers in such networks often can read all the information you enter. When using social networks, enable the secure https protocol connection.

  7. Browsers. Read a statistics of usage share of web browsers.

    Use the Mozilla FireFox or Google Chrome browser. For a long time, I determined that they are the most protected. Make sure that browsers are always updated. It is very dangerous to store saved passwords in the browser, you can not even imagine how easy it is to get all passwords by running a small trojan into the system. There are a few more settings that need to be made in the browser, but we will talk more about this in separate lessons.

  8. Checking Removable Media.

    Check all removable media (flash drives, disks) using intelligent antivirus before opening them. Also disable the autorun of all removable media, since this is the main source of viruses from these media.

  9. Working with an Email.

    Do not use email programs, use mail through the browser. Viruses can more easily penetrate the mail program on your computer than in mail opened with a browser. In extreme cases, use well-protected email programs, such as The Bat.

  10. Antivirus Software. Use the latest Bod Intelligent Antivirus.

    Despite the settings of the operating system and the browser, the installation of intelligent antivirus software is necessary. Stable Windows without antivirus is just a matter of time. The importance and necessity of the antivirus is a separate topic for conversation.

    I recommend you to install the best intelligent antivirus on the market - Bod Intelligent Antivirus. It is a full-featured intelligent protection of your computer.

    Details of working with the Bod Antivirus, settings and proper use will be discussed in other lessons on computer security.

Conclusion

Well, these are all recommendations for today. I hope you will apply them on your computer and make sure that these functions are guaranteed to be able to strengthen several times the protection of your computer.

May 08, 2017