Monday, August 31, 2009

Viruses, Worms, Trojans Preventative Solutions

  • Use common sense - don’t visit, or download programs from, people/websites you don’t know or trust.
  • Don’t open “spam” or unknown emails or attachments – delete them instead.
  • Check with your friend over the phone if you receive an email from them with
    an attachment you weren’t expecting – verify they did intend to send you the
    email/attachment, to make sure it wasn’t a worm sending it instead (many
    viruses/worms/trojans are sent from people unaware they’ve been infected).
  • Obtain the latest patches for Windows, Internet Explorer and Outlook Express
    to plug the many security holes and vulnerable exploits found in these programs.
  • Un-hide file extensions. This addresses the problem where Windows by default
    likes to hide the extensions of filenames; ie "susie.jpg" shows up as just "susie".
    The danger is that "susie.jpg.exe", which is an executable program, would be
    shown as "susie.jpg" which many would mistake for just a picture. This is
    potentially very dangerous and confusing.

In Windows 95 / 98:
- Open Explorer
- Under View menu, select Options
- Check "show all files"
- UNcheck "hide MSDOS file extensions that are registered"
- Click OK to finish
In Windows ME / 2000 / XP:
- select Start Settings Control Panels Folder Options
- select the View tab
- check "show hidden files and folders"
- UNcheck "hide file extensions for known file types"
- Click OK to finish

…or follow this illustrated guide:

IMPORTANT EXCEPTION: Even after you unhide the extensions using the
above steps, you still cannot see certain hidden extensions for files ending with
.shs, .pif, and .lnk (blame Microsoft for its infinite lack of wisdom).
Unfortunately these files are executable, and are rapidly becoming the most
popular choices for many trojan horses, worms and viruses, such as
"Movie.avi.pif" which will look like "Movie.avi", and
"LIFE_STAGES.TXT.SHS" which will look like "LIFE_STAGES.TXT". Instead
of being a movie and text file, respectively, they are both dangerous programs.
Again, unless you know where the file you are getting comes from or who sent it,
do not download/accept, or open it.

No comments:

Post a Comment

Hi thank you for comment in Assignment Lanka " Book Mark on me' To future references.


Assignment Lanka Tag Cloud
Computer Networks The History of Local Area Networks, LAN, The Topologies of a Networks, LANs describe different types of transmission Medias, Local Area Networks Access Methods, Carrier Sense Multiple Access with Collision Detect, Development of LAN Technologies. LAN -Token Ring, LAN Ethernet Digital, LAN - Ethernet Sun microsystems, LAN - Ethernet Mixed Environment, LAN - Token Ring was introduced by IBM LAN - IBM implementation of Token Ring, Token Ring Novell, LAN Token Ring - in a mixed environment, LAN - Fiber Distributed Data Interface, LAN - ATM, LAN Components, LAN Switching Methods, Virtual Local Area Network, Port based VLAN, Mac based VLAN, Protocol based VLAN, User Base VLAN, PC networks Components, PC networks Shared resources, PC Network operating systems, PC networks Novell Netware, PC networks Windows NT, PC networks IBM LAN Server Computer Programming Languages HTML Language, The Generations of Programming Languages, Different types of High Level Languages, Different types of High Level Languages Disadvantages
Computer Networks - IBM LAN Server, Windows NT Networks, Novell Netware, Network operating systems, Networks Shared, Networks Components, User Base, Protocol based, Mac based, Port based, VLAN, LAN Switching, LAN Components, ATM, Fiber Data, Token Ring, Token Ring Novell, IBM implementation, Ethernet, Sun microsystems, Ethernet Digital, Token passing, LAN Technologies, CSMA/CD, Access Methods, Transmission, Networks, The History of Local Area Networks, LAN