A Beginners Guide to Avoiding Viruses

"Aaaaaahhhhhh! I've been invaded by a virus!" Getting a virus means getting sick and no one in their right mind wants to be ill. Well, now that computers have become our close friends, it's a shock to learn that foreign bodies too can invade them with malicious intent. No, your computer doesn't get a runny nose or diarrhea. This is a sickness that stops your friend from functioning properly, sick in bed, incapacitated.

Well in Nature viruses occur from a power outside of our control. But, with computers it's different, humans, mean or ignorant humans are creating these viruses. Why? Usually these are disgruntled people who want to wreak some havoc on others or companies that they feel have done wrong to them. In any case we have to be in the know and prepared to deal with these debilitating scourges.

There are many ways to approach the protection of your computer. First of all there's the step of awareness. Be aware of how viruses are transmitted. You can catch them from a disc but in most cases it is through your email system. Check your email carefully. Be very wary of anything that has an attachment. Check whom it's from and look at the title of the mail, is it something you were expecting? Even if it's from someone you know, be careful as their computer could be infected and the virus being transmitted without their knowledge.

Next, read the cover message, you can't catch the disease without actually opening the message. Look at the name of the attachment; remember viruses are written to entice you. Beware of free offers and generally anything from people you don't know, as well as messages that sound irrelevant to your contact's usual style. Delete them straight away. Delete, delete, delete. This will ensure you of a lower risk of infection. You can even send the message back to the sender without opening it to make sure it is valid.

Now for the heavy protection: Virus scanning and virus protection software, and rescue discs are all readily available and easily utilized. Some are free, and others are obtained for a very small charge. Most software manufacturers offer subscriptions for updating services, which automatically download protection to the latest viruses.

There are two main types of virus scanning software: one searches through your entire computer files looking for recognizable viral signatures, the other scans your incoming and outgoing emails. Alerts will show you when a file needs to be erased or repaired. If you do receive a virus that none of the software can repair you can send a copy of it to a company like Symantec who will be happy to develop a cure for it.

The main message here is not to get too worried about your good friend Mrs. PC getting ill or sick. The humans are on top of the case and they seem much better adapted at fixing their technology than they are at beating the viruses that attack our physical bodies. If only we could cure human virus and illness as easily as we solve the problem of computer sickness.

About The Author

Jesse S. Somer is an analyst hoping to show fellow humans how far the computer age has come in terms of its strengths and weaknesses; http://www.m6.net

after renovation cleaning Wilmette ..
In The News:

SessionReaper vulnerability hits Magento and Adobe Commerce stores, compromising 250+ sites in one day. Hackers steal data and hijack shopping sessions.
Master essential parental controls and digital safety tools to protect your kids online. Learn screen time limits, location settings and privacy controls every parent needs.
Cybersecurity expert shares six essential steps to protect against dark web threats, including data removal services, password managers and antivirus software.
NVIDIA GPU space mission could revolutionize cloud services by enabling orbital data centers that make apps, games and AI tools faster and more efficient.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Microsoft warns Windows 10 users face serious security risks as 90% of ransomware attacks target unsupported systems. Learn why upgrading to Windows 11 is crucial.
Nike unveils Project Amplify, revolutionary motorized shoes developed with Dephy that add powered assistance to every step for runners and walkers.
Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.
Astronomers have discovered asteroid 2025 SC79, a skyscraper-sized space rock orbiting the sun in just 128 days. the second-fastest known.
The Fox News AI Newsletter delivers the latest developments form the world of artificial intelligence, including the technology's challenges and opportunities.
A cyberattack on SimonMed Imaging exposed personal information of 1.2 million patients, including medical records, financial details and identity papers.
Spotify's managed accounts for kids under 13 now available in at least seven countries, allowing parents to filter and block explicit content and songs.
Friendly text conversations about BBQs and social events can lead to WEEX gold trading scams that target older adults with fake investment opportunities.
California company Skyeports creates self-healing glass spheres from Moon regolith that generate solar power and support plant growth for sustainable lunar living.

Top 9 Ways To Speed Up Your Surfing & Computing

It seems like fast never quite rates fast enough.No matter... Read More

Cisco CCNA / CCNP Certification: OSPF ASBRs Explained And Illustrated

When I first started studying for my CCNP, some of... Read More

How To Safeguard Your Computer?

The following practice, if done regularly, may help you to... Read More

Windows PDA Medical Software Benefits

PDA Medical BenefitsIf you are concerned about your medical history,... Read More

Help, I Need a New HDTV! (Part 1 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Are You Well Protected?

Winter?the official start of the cold and flu season. Though,... Read More

Deleting and Destroying Data Forever

Peoples' private information needs to stay private, even after it... Read More

Cisco Certification: The Most Important Cisco Study Youll Ever Do

All of us are familiar with the pyramids of Egypt.... Read More

Maintain Your Computer ? Keep Your Business Running

Maintaining your computer is extremely important ? especially if you... Read More

HTML Explained: Part 1

Want to save money while promoting your web-based business? Of... Read More

How To Buy An MP3 Player

Are you looking for an MP3 player but am not... Read More

What Are You Looking For In A Cheap MP3 Player?

Are you stymied by the vast offerings in cheap mp3... Read More

Make Windows XP Run Faster!

A friend told me: "My computer startup seems to be... Read More

Selecting the Perfect Big Screen TV

Selecting a TV isn't as easy as it used to... Read More

Printing Multiple Copies of Photos

I do a holiday letter every year and send them... Read More

A Tale of Two Regeds

Tech support tells me to type 'regedt32' as opposed to... Read More

How To Search Your PC With Google Desktop

In this era of Internet, most people are frequent users... Read More

How To Recognize The Telltale Signs Of Spyware

Spyware is the software that collects information about your online... Read More

Are You Putting Off Productivity?

I recently took a good look at what was keeping... Read More

Cisco Certification: Building Your Own Home Lab, Part I

CCNAs and CCNA candidates hear it all the time: ???Get... Read More

How to Set Up Simple File Sharing WinXP

The first step is: Start > My DocumentsSo you have... Read More

How to Switch to Firefox and Why You should

First things first, what is Firefox? Well, it's a browser.... Read More

Refurbished Computers on the Internet

What is a Refurbished Computer?Refurbished Computers. Remanufactured Computers. Reconditioned Computers.... Read More

How To Speed Up Your Aging PC And Make It Healthier Too

With a little tweaking and with proper tools, you can... Read More

A Beginners Guide to Avoiding Viruses

"Aaaaaahhhhhh! I've been invaded by a virus!" Getting a virus... Read More

interior house cleaning Wilmette ..