Everyone in the United States has heard of the leading antivirus vendors Symantec, Mcafee, Computer Associates, and Trend Micro. These companies have market-leading presence in the United States. Microsoft, as well, has plans become a key player in this market. Microsoft acquired intellectual property and technology from GeCad software in 2003, a company based in Bucharest, Romania. They also acquired Pelican Software, which had a behavior based security as well as Giant Company Software for spyware and Sybari Software, which manages virus, spam, and phishing filtering.
A lot of discussion has centered on whether Microsoft with come to own a dominant position in the antivirus market by simply bundling its technologies with its operating systems at no charge. This is a similar technique applied in other markets such as word processing and Internet browsers.
Read the rest of this entry »
Protecting your computer from a virus is getting harder and harder each day. While it may border on the paranoid, it goes without saying that you can’t leave your guard down for one second. Even corporate giant Microsoft has found its own systems compromised on more than one occasion.
Remember the “good old days”, before the advent of the Internet and downloadable programs? Life was simple then in terms of computer viruses. With the primary way in which a virus could be transmitted being limited to floppy disks, the ability to catch and eradicate the virus was a lot easier. By today’s standards, it used to take quite a while before a virus was able to infect a computer and slow down the system. The antivirus software of that time was typically able to identify and eradicate viruses before they caused too much damage. Additionally, computer users were pretty savvy on how to protect themselves in terms of scanning all floppy disks before copying them to our desktop.
Read the rest of this entry »
A virus is a program – a piece of executable code – that has the possibly of cloning itself. Computer viruses can spread fast and they are hard to eradicate. They can be attached to any type of file and they are spread as files copied and sent from person to person. They can be contacted from a floppy disk or Cd, they can be launched when opening a program or accessing a file, any file, or they can be brought from the internet by downloading a file or accessing a web page and as attachments to e-mails.
Besides replication, some viruses have something else in common: their infecting routine. The behaviors of viruses vary from showing messages or images to destroying files, formatting the hard disk drive and other severe damage. If the virus does not inflict damage it can still cause problems by taking up space and memory, lowering the performances of the computer.
Nine rules for avoiding viruses would be:
1. Use an anti virus program at all times.
2. Install and keep active a firewall.
3. Make sure your system is up-to-date with all the existent updates.
4. Keep your browsers security settings at maximum.
5. Never click yes when your browser asks you if you want to install or open some content coming from an organization you don’t know or don’t trust.
Every day new computer viruses are created to annoy us and to wreck havoc on our computer systems. Below are ten viruses currently cited as being the most prevalent in terms of being seen the most or in their ability to potentially cause damage. New viruses are created daily. This is by no means an all inclusive list. The best thing you can do is to remain vigilant, keep your anti-virus software updated, and stay aware of the current computer virus threats.
Adware, spyware and computer virus share some similarities, one of which is that all three are major nuisances for computer users. Let’s differentiate the three.
Spyware is software that does not intentionally harm your computer. What they do is that they create pathways wherein someone else aside from the computer owner can communicate with the computer. Normally spywares record the various types of web sites you visit which are later used by web advertisers to allow them to send you unwanted emails and pop-ups.
This is why spyware are usually frowned upon and greatly avoided. They are more intrusive than adware. Spyware have their own separate executable programs which allow them to record your keystrokes, scan files on your hard disks and look at other applications that you use including but not limited to chat programs, cookies and Web browser settings.