external image cabecera_articulos-37.jpg

Julio Morales Rosales works as a web-developer and computer technician. He has created websites such as www.oposicionesyconcursos.es , www.ofertasdetrabajosyempleos.com , and www.findjobvacanciesin.com , www.creartest.com



Computer viruses
The sole purpose of a computer virus used to be to destroy a system, but nowadays, the creators of these viruses prefer money. That explains the spectacular increase of malaware and badware threats to the point that today we can find more virus than legitimate programs.

The best defense is knowledge. In this manual I will provide you with some help, starting with some more common symptoms and finishing with some recommendations.

You computer is possibly infected:

1 If when you open your browser you detect a lot of pop-ups with advertisements. This is a sign that you have an ad-ware.

2 If your browser can't change its homepage or a tool-bar despite the fact that you have manually attempted to change these settings.

3 When an anti-virus which you haven't installed shows a message that you are infected. This may be a fake anti-virus which your authentic anti-virus doesn't detect. It usually asks you to buy the anti-virus to fix the problem. Another variant of this infection will ask you to click somewhere to remove the virus. If you do this, you will actually install the real virus .

Other symptoms of a computer virus are the following:

1 Your computer runs very slowly.

2 Your program crashes unexpectedly and excessively often.

3 You have lost a lot of files and very often.

4 Your operating system refuses to start.

5 Your computer seems as if it’s being controlled. This could be a Trojan, which is a virus that controls your computer remotely. That's why you can see that some people cover their webcams with a piece of paper to prevent being watched by strangers.

Recommendations

You should update your anti-virus software , the browser and the system. Firstly, the anti-virus gets new databases to fight against new virus. Secondly, the program and system updates fix critical security problems.

Don’t forget to backup all your files.

If your computer has been infected, you should change your passwords on a secured computer because hackers can see what you are typing.

If you know how the cyber criminals think, you will discover that they want to attack the maximum victims and then they work to attack the most used operating systems, browsers and programs. That's why using a nonstandard program or system can be more secure.

When your anti-virus detects a virus, you should check and update the entire system to be sure that all files and programs are secure. If a virus appears again and again, you should find the source, which could be a virus that is creating other viruses or a vulnerability in your system that must be repaired. In some cases, the system will have to be deleted and reinstalled because the computer is too damaged to be fixed. However, the technician should try discover everything about the virus in order to set up a more secured system before deleting all the content of the computer. This research is especially critical for spy agencies and important institutions such as banks or governments.


In my opinion, you should take into account that antivirus software developers are always working to create a secure system because they need to sell their products, so don’t panic.


Crossword: Computer viruses terminology

Trojan:
A malicious virus to control a computer remotely

Firewall:
A program that protects your computer information from other networks. It isn't an antivirus but it is an extra security method

Browser:
A program which is used to access webpages. For example: Internet Explorer, Firefox, Crome...

Spyware:
A malicious code to obtain personal computer information

Toolbar:
A group of icons at the top of the browser that activate commands or functions when clicked

Pop-up:
A window that suddenly appears on a computer screen. Its most common purpose is for advertisements.

Phishing:
A way of trying to get our usernames, passwords or credit card details. The criminal pretends to be a trustworthy entity, asking us for our information.