All the viruses that attack the computer system do not act in the same way; there are certain unique patterns that one follows in their contagious activity. There are numerous types of viruses that have come into existence that hits the security system of the computers. Behavior of the computer virus is troublesome as they delete or corrupt the data that are available in storage at the hard drive or interrupts the normal functionality of the operating system.
The catching bug gets downloaded from the external sources such as internet connectivity through hidden files together with downloads; email attachments, instant messaging services and via external drives that are used to carry data.
Computer virus protection desires antivirus software to get periodically updated on advanced level antivirus tools and latest virus information that are about to affect the PCs.
Some of the types of computer virus that affects the PCs in common are as follows.
- Resident viruses: They inhabit in the RAM interrupting into the operations of the system such as corrupting the data in the files that are used in the recent activities. Some of other resident viruses include the McKlunky, CMJ, Randex etc.
- Companion Virus: These types of viruses are typically spread into the MS-DOS creating a file with extension of .Com or .Exd, which is called defectively when a programmer runs his program with a similar alphabet of file name with either of these extensions.
- Network Viruses: This virus spreads via the LAN connectivity as the network is used as a medium to spread through shared resources. It spreads along the PCs that are connected along jumping from one system to another to find a new potential prey. Nimda and SQLSlammer are the dangerous network viruses.
- Polymorphic Viruses: This type of virus replicates by creating multiple copies of the file spreading along the computers linked. Every time the replication is done it changes the digital signature, this activity makes the virus easier to spread from one system to another. Only sophisticated and updated antivirus can detect the Polymorphic virus.
- Trojan horse: These types of computer viruses are more harmful that makes its establishment into the system and starts the viral activity. They neither copy nor replicate but strike hard on the security system. The malicious functionality of the Trojan is tougher to get out of the PCs once acquired, as they are acquired from any program on downloads.
There are various kinds of viruses that play the role of computer cracking behind the screen, which is being used as a tool to hack and destroy the data that are available on a security link of an organization.
image source : http://hugepedia.com
To protect your computer that makes money over your business is the key focus for one to afford protection. Ecommerce sounds to be the one we choose for comfortable environment that saves times, money and distance to make your business happen with good contacts over people. Dangers that attack one’s computer system starts when we use the same computer for both personal as well as for online business options. As it is found that more number of Home PC’s gets affected with virus attacks.
A majority of internet users use the online banking facility. Accessing accounts to spot fraudulent transactions is now easy, or so it seems. According to a research most of the bank sites have inbuilt flaws which could potentially put valuable customer data into the wrong hands. Though it is the sole decision of the financial institution to determine the level of firewalls employed to safeguard customer information, there are some basic rules which any online bank user should use to protect personal information and finances. Some of these general rules are mentioned as under: Websites starting with URLs such as “https://” are more secure than website URLs starting with “http://”. Especially when using passwords and PIN numbers one should look out for the extra ’s’ in the URL. If the URL is followed by the name of your bank or financial institution, it is a feature that authenticates the genuineness of the site. URLs followed by a ‘host’ name should be considered unsafe. Security indicators such as padlock and lock icons do not guarantee complete security and scammers now-a-days are able to duplicate such icons. Passwords and user Ids should be a combination of upper and lower case letters, numbers and symbols. Also the length of passwords should be more than adequate (8 or more is sufficient). Using common sense and not replying to any email claiming to be from the bank to provide passwords or information to update the accounts. Last but not the least, as far as possible avoid accessing bank accounts through internet cafe, or terminals at airports or railway stations.
Most Web browser software comes pre-installed on your PC’s operating system. The common Web browsers are Internet Explorer, Apple Safari, and Mozilla Firefox. The fact that there are three popular types make it easier for hackers to focus on vulnerabilities and then exploit them with malicious software attacks.
What information is collected?