How to protect your computer from virus
Internetwork
has become the busiest platform since its inception till now. Everyday
billions of users browse their queries, chat on social media, run online
businesses, play online games, download
their favorite movies and GOD knows what else. Name anything, and
artificially intelligent search engines out there will bring you a
thousand answers in response to the query you mentioned.
The
bleak reality, with which most of the users, are unaware of yet, is the
fact, that internet is a platform, controlled by no one. By “no one”,
we literally mean no one. Here at this point, let’s put forward another
reality bomb which says, the moment you get connected to the outside
world through internet, the moment onwards, with every passing moment
your system is vulnerable and exposed to viruses, threats, malicious
content, key loggers and various other phishing injections that remain
undetected even if they enter your system while you are enjoying an
online game with your friend and who knows there is a bad script running
behind the game and it gets downloaded
due to a loophole in the web browser configuration. There you have it,
you switch on your system the next morning and find your system with
corrupted operating system.
Realted post: What is computer virus?
After
much thought been put into, various tech experts took the initiative
and introduced the measures on how to protect your computer, how to
secure your system from malicious threats, and how to raise a shield
against hacks and other encrypted injections that are a potential threat
to today’s systems.
According to statistics published in a 2011
Norton Cyber Crime Report, there were 431 million victims of
cyber-crime across the globe who lost a huge cumulative sum of $388
billion.
The cause of such exponential rise in cyber-crime
is attributed to more towards the loopholes, knowingly left by our
user, rather than the hacker or malicious developer who tends to breach
your system’s security using viruses.
This
article will provide an insight to our user, who keeps on browsing the
internet without caring less about what can be the consequences of
clicking a popup-add, opening a spam email, downloading a negatively reviewed torrent
and most importantly, the developer who claim their schedule to be
tight enough that they don’t even care what plug-in are they installing
and what extra patches it entails? Points discussed below, will clear
out many conceptions and we hope you will get enough know-how about
computer security.
Use Secure Operating System
The
best precautionary measure, one can ever take in order to secure a
computer is to use already secured operating system like Linux and Mac.
Both of these operating systems come in various flavors and you are free
to choose between any of the choices from the list of versions. A piece
of advice here would be, try to go for the second last version of these
operating systems as they are stable in nature and bug-free.
Use Anti-Virus Programs
In
case you are using an un-secured operating system, for instance Windows
or Android, try to monitor your operating system by installing an
anti-virus program available free of cost all over the internet while
the C.Ds and D.V.Ds are not available free of cost, if you have no any
internet connection. A notion here is quite intriguing as it stands by
the claim that anti-viruses are the programs developed by those, who
were themselves hackers once. Despite every claim that comes forward,
anti-viruses are a great precautionary measures and have proved
themselves in case where protection of a computer system is concerned.
Never Click on Spammed Emails
Emails
contribute a lot in virus and malware propagation. Sometimes while
browsing, it is most likely that you come open a page where they ask to
submit your email for further subscription. Never ever submit your email
on unknown platforms unless or until you are one hundred percent sure
that this is actually the content you have searched for. Emails are
collected through such tricks and then, provided to a programmed bot
whose task is to disseminate a malicious executable file to all the email addresses in the log file.
Novice users most probably open such emails and by the moment they
realize it contained nothing important, there system’s security has
already been compromised.
Customize Your Web Browser
The
hardest task one can ever do is to restrict oneself from the charms
that external plug-ins and activeX controls entail. With the extensions
like Java, JavaX and activeX enabled, your web browser is vulnerable to
seventy percent of the threats by allowing those potentially malicious
viruses which propagate faster using Java Based Platforms. With the fact
already known that almost 30 billion devices on this planet runs with
the help of Java, malicious content developers have find these devices
as a soft target for them and that’s the reason why viruses have become
so common. Adding more to it, don’t let your browser open any external
program like Microsoft Word or Excel. Also restrict your browser to call any external protocols by denying such calls from the operating systems.
Parents Role
Our
young generation is more technology oriented than our parents. Now a
days, kids learn their nursery rhymes and a,b,c pronunciation, not from
the melodious and ear warming tone of their mothers, but from YouTube
and Dailymotion instead. Kids have no idea what to click and where to click, they are likely to select and install
any program that comes in front of the screen. Parents are advised to
take control on the activities of their children and keep a strict eye
on what they do over the internet in order to avoid the situation where
you have to cry over spilt milk.
Conclusion
Consider a situation where you are using a secured operating system, with no any internet connection. Now in such a scenario, you are quite safe but you are no more than a freak. Because today’s world is a world of technology and for those who still want to remain conventional, will be eradicated from the changing dynamics of technology. So it’s better toprotect your systems from malware and keep your privacy secured
while enjoying the charms of the day, remain proactive and face the challenges rather than keeping yourself in a dark whole of unawareness.
EmoticonEmoticon