Protecting Your Computer From Spyware And Viruses

If you’re looking for a great way to get your computer protected from all the nasty spyware and malware that’s out there, then you’ll definitely want to look into a good antimalware software tool.  There is just too much out there that can harm your computer or compromise the security of your computer and your files.

There are actually a few steps involved in securing your computer and keeping it safe from malware and viruses.  One of the biggest is to ensure that you don’t get the malware in the first place.  This starts with being smart about downloads, websites, and other areas of the internet.  Don’t open email attachments that you don’t know about or aren’t expecting.  Don’t go to shady websites or areas of the internet known for infecting computers (gambling, adult, etc).  Don’t download torrents or other “free” software.  As a matter of fact, so-called free software is often the worst, involving sneaky malware that will install itself along with the free program you were trying to get.

I highly recommend that you do not download anything that is not necessary.  This is especially true if you like to download lots of things and software and games and music and free movies.  This is the surest way to infect your computer.

The other thing to do is to get a good antimalware software program.  These programs will defend your computer against the worst of the bad software attacks.  I highly recommend that you install a program such as Spyhunter 4.  This is an excellent software program that I have used myself in order to get rid of malware, spyware, and adware.  If a client has bad software on their computer that they have to get rid of, I use this software program.  I’ve used it to get rid of several bad software programs in the past, and they always keep it up to date.

 

Other good options are Malwarebytes and Avangate.  However I still like to use Spyhunter for various reasons.

Another thing that you can do is to learn more about how viruses work and what makes them tick.  Here’s a great excerpt from an article that talks about how they work:

VIRUS CHARACTERISTICS

To detect and sound appropriate alarms, you need to be aware of the characteristics of these viruses. There have been exciting changes in the virus environment and, simultaneously, additional risks to every organization exposed.

Macro and multiplatform viruses. When Microsoft introduced Word for Windows 95, some packages contained a virus called “Concept” or “Prank Macro.” Imagine one of the world’s leading software developers unleashing a virus in the wild. How could this happen? Nonetheless, Microsoft does not say it is a virus: It’s just a “prank macro,” and there is no reason for panic. Is it a virus or not? It is a virus because it replicates without the user’s permission.

Visual Basic, a programming language used with Microsoft products, is a great productivity tool, but it unintentionally threatens every user. When a Microsoft product is opened, it automatically can execute commands that enhance the user’s interface and productivity. Writing viruses with Visual Basic is revolutionary because it breaks virus rules. What rules? First rule, viruses cannot replicate with data files. If you view files on a continuum, the two extremes are system files and data files. In the past, there were not a great deal of files fitting in the middle. Rapid advancement using object oriented technology creates hybrid (object) files to increase productivity. In essence, a file can have data and executable code associated with it. Microsoft Word warehouses macros (Visual Basic) in templates because a *.DOC file cannot contain them. This template is an object file; it is not a program file or data file. Perhaps you were one of the “lucky” ones exposed to this virus. You may be asking, “If *.DOC cannot contain viruses, why did I see it in my data file?” The answer is that these viruses will infect your templates (*.DOT) and rename them with a *.DOC extension. A computer environment is similar to real life – things are not always as they appear.

The second rule violated is being able to replicate over different types of platforms (platform includes hardware and operating system software). The advanced features in Microsoft products that improve productivity allow these types of viruses to infect different types of operating software systems. Microsoft Word provides a version of its product for the Apple Macintosh as well as IBM clones. Files generated from these types of products can be read, executed, and infected by different platforms. Another example of multiplatform (hardware and software) virus transmission that has not occurred yet, but probably will soon, is from Internet software such as Java (which is very similar to C++ programming language). Java downloads programs (commonly referred to as applets) to your computer to perform dazzling effects on your monitor. Product management addressed this problem and placed some preventative security features in the product. However, significant risk still exists. Virus authors like a challenge! A virus replicating through this medium will receive an enormous amount of public attention.

Jarvis, Kenneth. “Demystifying computer viruses.” Management Accounting [USA], Apr. 1997, p. 24+.