A Beginners Guide to Avoiding Viruses

"Aaaaaahhhhhh! I've been invaded by a virus!" Getting a virus means getting sick and no one in their right mind wants to be ill. Well, now that computers have become our close friends, it's a shock to learn that foreign bodies too can invade them with malicious intent. No, your computer doesn't get a runny nose or diarrhea. This is a sickness that stops your friend from functioning properly, sick in bed, incapacitated.

Well in Nature viruses occur from a power outside of our control. But, with computers it's different, humans, mean or ignorant humans are creating these viruses. Why? Usually these are disgruntled people who want to wreak some havoc on others or companies that they feel have done wrong to them. In any case we have to be in the know and prepared to deal with these debilitating scourges.

There are many ways to approach the protection of your computer. First of all there's the step of awareness. Be aware of how viruses are transmitted. You can catch them from a disc but in most cases it is through your email system. Check your email carefully. Be very wary of anything that has an attachment. Check whom it's from and look at the title of the mail, is it something you were expecting? Even if it's from someone you know, be careful as their computer could be infected and the virus being transmitted without their knowledge.

Next, read the cover message, you can't catch the disease without actually opening the message. Look at the name of the attachment; remember viruses are written to entice you. Beware of free offers and generally anything from people you don't know, as well as messages that sound irrelevant to your contact's usual style. Delete them straight away. Delete, delete, delete. This will ensure you of a lower risk of infection. You can even send the message back to the sender without opening it to make sure it is valid.

Now for the heavy protection: Virus scanning and virus protection software, and rescue discs are all readily available and easily utilized. Some are free, and others are obtained for a very small charge. Most software manufacturers offer subscriptions for updating services, which automatically download protection to the latest viruses.

There are two main types of virus scanning software: one searches through your entire computer files looking for recognizable viral signatures, the other scans your incoming and outgoing emails. Alerts will show you when a file needs to be erased or repaired. If you do receive a virus that none of the software can repair you can send a copy of it to a company like Symantec who will be happy to develop a cure for it.

The main message here is not to get too worried about your good friend Mrs. PC getting ill or sick. The humans are on top of the case and they seem much better adapted at fixing their technology than they are at beating the viruses that attack our physical bodies. If only we could cure human virus and illness as easily as we solve the problem of computer sickness.

About The Author

Jesse S. Somer is an analyst hoping to show fellow humans how far the computer age has come in terms of its strengths and weaknesses; http://www.m6.net

limo prices to midway Crystal Lake west of Randal .. Lockport Chicago limo O’Hare
In The News:

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The number of people affected by a UnitedHealth data breach in February 2024 was actually higher than previously reported and was the largest medical data breach in U.S. history.
A phishing campaign uses Google Calendar to schedule fake meeting invitations that appear legitimate, redirecting targets to phishing sites.
Toll road text scam: Fake messages claim unpaid fees, seek payment via fraudulent links. Kurt “CyberGuy" Knutsson says this scam is becoming increasingly sophisticated and widespread.
Kurt “CyberGuy" Knutsson says these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.
Tech expert Kurt “CyberGuy" Knutsson offers tips on how to protect your identity: Be vigilant, monitor accounts, use smart security, know theft response.
Tech expert Kurt “CyberGuy" Knutsson says cybercriminals are exploiting iMessage phishing protection, tricking users to reactivate links.
It's hard to imagine life without in-flight Wi-Fi these days – but sky-high web surfing comes with its own set of privacy concerns. Here's how to protect yourself.
Over 400,000 cases of credit card fraud were reported in 2024 to the Federal Trade Commission. The CyberGuy explains how to protect against becoming another victim.
A nondescript metal box transforms into a fully functional electric motorcycle that blurs the line between vehicle and urban infrastructure.
Many apps unrelated to location still ask users for tracking permission, and Texas Attorney General Ken Paxton has filed a lawsuit seeking to end this alleged practice by Allstate.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Melody, the artificial intelligence-powered robot, is life-sized and represents a move toward creating robots that resemble people in appearance and interaction.
Here are five easy smartphone rules from the National Security Agency that you can follow to better protect your mobile device from hackers and scammers.
A U.S. robotics company has developed "Jennie," a robotic pet powered by artificial intelligence that's designed to comfort those facing mental health challenges.
Healthcare records for more than 184 million Americans were breached in 2024, but you can take steps to minimize that risk. Kurt the CyberGuy explains.
The Skyrider X1 from Rictor claims to be the "first amphibious flying passenger motorcycle," and it combines land and air travel in one sleek design.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Home inventory and restoration apps help itemize and track every item in your home in the event you have to make an insurance claim after a natural disaster.
The White House launched a new cybersecurity safety label, the U.S. Cyber Trust Mark, intended to help consumers make informed decisions on smart device safety.
Today's tech can help make life so much easier — if you know how to use it. Here are a few tips on the quickest and best ways to make your phone, laptop and other devices work for you.
Tech expert Kurt “CyberGuy" Knutsson offers Windows 11 restart fixes: Update drivers, run system scans and check hardware.
Sony and Honda's Afeela 1 EV launches with advanced tech and entertainment for $89,900. Tech expert Kurt “CyberGuy" Knutsson gives his takeaways.
With limited hard drive space, tech expert Kurt “CyberGuy" Knutsson offers these tips for storing large video files and photos.
Tech expert Kurt “CyberGuy" Knutsson says the $236,000 Yangwang U9 electric hypercar boasts 1,287 horsepower and can jump obstacles.

Why Using an Ad Blocker Can be a Bad Idea

Ad Blocking is getting to be a common sport on... Read More

SmartCar Memory Stick for LapTop Transfer Data

With the new technology used to transfer information to from... Read More

5 Minute Guide to Video Editing for Beginners

Getting started with video editing is very simple you only... Read More

Portable Technology: Getting to Know the Treo

Up until the recent past, those who wanted to take... Read More

Is Desktop Search Deserving?

Google, in their march to stay ahead of the pack... Read More

MobiTV and Visual Stimulation Imput for Personal Cognitive Performance

Stimulus thru Caffiene or Visual Input?It appears that the Mobi... Read More

Basic Problem in a PC

I have a p3 500MHz PC with 128MB RAM, 10.2... Read More

MCSE 70-290 Certification Primer

Microsoft Certifications are one of the most widely acclaimed, pursued,... Read More

Anti-Skip Protection on Mp3 Players

There have been some questions on anti-skip protection on mp3... Read More

Does Microsoft Show Hackers How To Attack?

After another security hole recently surfaced in Microsoft's Windows operating... Read More

Favorite Things To Do With Home Technology

Save money. Save 10-15% on utility bills per month. Work... Read More

Uninstall Windows Media Player 10 and Start Enjoying Your Media Again

Windows Media Player 10 has been full of bugs from... Read More

15 Good Programming Habits

1. Before sitting down for coding, you must have formal... Read More

Flash Memory, Part I: MMC and SD

MMC and SDFlash memory is available in so many formats... Read More

DVD The Ultimate Consumer Digital Media

Digital Video Disc or as it is sometimes referred to... Read More

Learn the Lost Art of Touch Typing

Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never... Read More

5 Steps to Removing PC Clutter

It's hard enough as it is these days to get... Read More

Occupational Therapy and PDAs

Occupational Therapy Made EasierMedical downloads for the pda have improved... Read More

Smart Apple iPod Tips and Techniques

Are you thinking of buying an Apple iPod? Or have... Read More

HTML Explained: Part 1

Want to save money while promoting your web-based business? Of... Read More

Image Formats: GIF, JPEG, BMP

When browsing the internet you are likely to come across... Read More

Can Movie Theatres Compete with Home HD TV in the Future?

The battle is heating up for market share, home movie... Read More

Cisco CCNA Certification: Five Things To Do DURING The Exam

There are plenty of articles out there about how to... Read More

Gain Control Over Your Screensavers With These Simple Steps

We all enjoy our favorite screensavers but in the same... Read More

SOBIG.F Virus Promises Ill Be Back

On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F... Read More

taxi o'hare Auburn ..