You can protect yourself against viruses with a few simple steps:
If you're truly worried about traditional (as opposed to e-mail) viruses, you should be running a more secure operating system like Linux and, to a lesser extent, Apple's Mac OS X. You never hear about viruses on these operating systems because they represent such a small part of the market they're targeted by far fewer viruses than the Windows operating system. Apple's OS X has seen its share, but viruses are still predominately a Windows problem.
If you're using an unsecured operating system, then installing virus protection software is a nice safeguard. Many anti-virus options are available for free online.
If you simply avoid programs from unknown sources (like the Internet), and instead stick with commercial software purchased on CDs, you eliminate almost all of the risk from traditional viruses.
You should make sure that Macro Virus Protection is enabled in all Microsoft applications, and you should NEVER run macros in a document unless you know what they do. There is seldom a good reason to add macros to a document, so avoiding all macros is a great policy.
You should never double-click on an e-mail attachment that contains an executable. Attachments that come in as Word files (.DOC), spreadsheets (.XLS), images (.GIF), etc., are data files and they can do no damage (noting the macro virus problem in Word and Excel documents mentioned above). However, some viruses can now come in through .JPG graphic file attachments. A file with an extension like EXE, COM or VBS is an executable, and an executable can do any sort of damage it wants. Once you run it, you have given it permission to do anything on your machine. The only defense: Never run executables that arrive via e-mail.
By following these simple steps, you can remain virus-free.
For more information on computer viruses and related topics, see the links below.
- Computer Security Quiz
- 10 Worst Computer Viruses of All Time
- How Hackers Work
- How Trojan Horses Work
- How to Remove a Computer Virus
- How to Scan for and Remove Spyware
- How Web Servers Work
- How Firewalls Work
- How Carnivore Worked
- How Cell-phone Viruses Work
- How do viruses and worms spread in e-mail?
- How to Know if Your Computer is Infected With a Virus
More Great Links
- "Avoiding Social Engineering and Phishing Attacks" U.S. Computer Emergency Readiness Team. (Oct. 4, 2007) www.us-cert.gov/cas/tips/ST04-014.html
- Baratz, Adam, and McLaughlin, Charles. " Malware: what it is and how to prevent it" Ars Technica. Nov. 11, 2004. (Oct. 8, 2007) http://arstechnica.com/articles/paedia/malware.ars
- Boutin, Paul. "Slammed! An inside view of the worm that crashed the Internet in 15 minutes." Wired Magazine. July 2003 (Oct. 3, 2007) http://www.wired.com/wired/archive/11.07/slammer.html
- Johnston, Stuart J. "Bugs & Fixes: Save Your PC From Virus Attacks." PC World. 2/27/2002. (Oct. 8, 2007) http://www.pcworld.com/article/id,81968/article.html
- Kaplan, Dan. "Storm Worm making comeback with new spam run." April 28, 2010. (Oct. 29, 2011) http://www.scmagazineus.com/storm-worm-making-comeback-with-new-spam-run/article/168853/
- Kawamoto, Dawn. "Storm worm rages across the globe." CNET News.com. January 19, 2007 (Oct. 4, 2007) http://www.news.com/Storm-worm-rages-across-the-globe/2100-7349_3
- Leedham, Robert. "Android Gingerbread virus poses fresh smartphone threat." Aug. 22, 2011. (Oct. 30, 2011) http://www.lifeofandroid.com/news_detail/android-gingerbread-virus-poses-fresh-smartphone-threat/
- Lemos, Robert. "Worm double whammy still hitting hard." CNET News.com. Aug 21, 2003 (Oct. 5, 2007) http://www.news.com/Worm-double-whammy-still-hitting-hard/2100-1002_3-5066875.html
- McAfee fact sheet on ILOVEYOU virus. (Oct. 3, 2007) http://vil.nai.com/vil/content/v_98617.htm
- Monstersandcritics.com. "Worst virus in years infects 6.5 million computers." Jan. 16, 2009. (Oct. 30, 2011) http://www.monstersandcritics.com/tech/news/article_1453964.php/Worst_virus_in_years_infects_6_5_million_computers
- "Mydoom virus floods computers worldwide." Times Online. Jan. 27, 2004 (Oct. 3, 2007) http://www.timesonline.co.uk/article/0,,1-979473,00.html
- Permeh, Ryan and Maiffret, Marc. "ANALYSIS: .ida "Code Red" Worm." eEye Digital Security. July 17, 2001 (Oct. 3, 2007) http://research.eeye.com/html/advisories/published/AL20010717.html
- Rhodes, Keith A., Chief Technologist, U.S. Government Accounting Office. "Information Security: Code Red, Code Red II, and SirCam Attacks Highlight Need for Proactive Measures" Aug. 29, 2001 (Oct. 5, 2007) http://www.gao.gov/new.items/d011073t.pdf
- Schneier, Bruce. "Gathering 'Storm' Superworm Poses Grave Threat to PC Nets." Wired.com. Oct. 4, 2007. (Oct. 4, 2007) http://www.wired.com/politics/security/commentary/securitymatters/2007/10/securitymatters_1004
- Turner, Dean, Executive Editor, et. al.; "Symantec Internet Security Threat Report: Trends for January-June 07" Sept. 2007. (Oct. 8, 2007) http://eval.symantec.com/mktginfo/enterprise/white_papers/entwhitepaper_internet_security_threat_report_xii_09_2007.en-us.pdf
- US-CERT advisory on the Melissa virus. Mar. 27, 1999. (Oct. 3, 2007) http://www.cert.org/advisories/CA-1999-04.html
- "Virus Top Twenty for September 2007" Kaspersky Lab. Oct. 1, 2007. (Oct. 8, 2007) http://www.viruslist.com/en/analysis?pubid=204791964