To obtain computer virus and security-related support, follow these steps:
1. Before you contact a support engineer, make sure that you run updated antivirus software and updated spyware removal software on the infected computer.
For more information about how to obtain a free computer safety scan, visit the following Microsoft Web site:
http://onecare.live.com/site/en-us/default.htm?s_cid=sah (http://onecare.live.com/site/en-us/default.htm?s_cid=sah)
For more information about antispyware software, visit the following Microsoft Web site:
http://www.microsoft.com/protect/computer/spyware/as.mspx (http://www.microsoft.com/protect/computer/spyware/as.mspx)
How to protect your computer against viruses
To protect your computer against viruses, follow these steps:
1. On the computer, turn on the firewall.
2. Keep the computer operating system up-to-date.
3. Use updated antivirus software on the computer.
4. Use updated antispyware software on the computer.
1. On the computer, turn on the firewall.
2. Keep the computer operating system up-to-date.
3. Use updated antivirus software on the computer.
4. Use updated antispyware software on the computer.
How to remove a computer virus
Even for an expert, removing a computer virus can be a difficult task without the help of computer virus removal tools. Some computer viruses and other unwanted software, such as spyware, even reinstall themselves after the viruses have been detected and removed. Fortunately, by updating the computer and by using antivirus tools, you can help permanently remove unwanted software.
To remove a computer virus, follow these steps:
1. Install the latest updates from Microsoft Update on the computer.
To remove a computer virus, follow these steps:
1. Install the latest updates from Microsoft Update on the computer.
2. Update the antivirus software on the computer. Then, perform a thorough scan of the computer by using the antivirus software.
3. Download, install, and then run the Microsoft Malicious Software Removal Tool to remove existing viruses on the computer. To download the Malicious Software Removal Tool, visit the following Microsoft Web site:
http://www.microsoft.com/security/malwareremove/default.mspx
For more information about how to remove a computer virus, visit the following Microsoft Web site:
http://www.microsoft.com/protect/computer/viruses/remove.mspx (http://www.microsoft.com/protect/computer/viruses/remove.mspx)
Symptoms that may be the result of ordinary Windows functions
A computer virus infection may cause the following problems:
1. Windows does not start even though you have not made any system changes or even though you have not installed or removed any programs.
2.There is frequent modem activity. If you have an external modem, you may notice the lights blinking frequently when the modem is not being used. You may be unknowingly supplying pirated software.
3. Windows does not start because certain important system files are missing. Additionally, you receive an error message that lists the missing files.
4. The computer sometimes starts as expected. However, at other times, the computer stops responding before the desktop icons and the taskbar appear.
5. The computer runs very slowly. Additionally, the computer takes longer than expected to start.
6. You receive out-of-memory error messages even though the computer has sufficient RAM.
New programs are installed incorrectly.
7. Windows spontaneously restarts unexpectedly.
8. Programs that used to run stop responding frequently. Even if you remove and reinstall the programs, the issue continues to occur.
9. A disk utility such as Scandisk reports multiple serious disk errors.
10. A partition disappears.
11. The computer always stops responding when you try to use Microsoft Office products.
You cannot start Windows Task Manager.
12. Antivirus software indicates that a computer virus is present.
1. Windows does not start even though you have not made any system changes or even though you have not installed or removed any programs.
2.There is frequent modem activity. If you have an external modem, you may notice the lights blinking frequently when the modem is not being used. You may be unknowingly supplying pirated software.
3. Windows does not start because certain important system files are missing. Additionally, you receive an error message that lists the missing files.
4. The computer sometimes starts as expected. However, at other times, the computer stops responding before the desktop icons and the taskbar appear.
5. The computer runs very slowly. Additionally, the computer takes longer than expected to start.
6. You receive out-of-memory error messages even though the computer has sufficient RAM.
New programs are installed incorrectly.
7. Windows spontaneously restarts unexpectedly.
8. Programs that used to run stop responding frequently. Even if you remove and reinstall the programs, the issue continues to occur.
9. A disk utility such as Scandisk reports multiple serious disk errors.
10. A partition disappears.
11. The computer always stops responding when you try to use Microsoft Office products.
You cannot start Windows Task Manager.
12. Antivirus software indicates that a computer virus is present.
Symptoms of worms and trojan horse viruses in e-mail messages
When a computer virus infects e-mail messages or infects other files on a computer, you may notice the following symptoms:
1. The infected file may make copies of itself. This behavior may use up all the free space on the hard disk.
2. A copy of the infected file may be sent to all the addresses in an e-mail address list.
3. The computer virus may reformat the hard disk. This behavior will delete files and programs.
The computer virus may install hidden programs, such as pirated software. This pirated software may then be distributed and sold from the computer.
4. The computer virus may reduce security. This could enable intruders to remotely access the computer or the network.
5. You receive an e-mail message that has a strange attachment. When you open the attachment, dialog boxes appear, or a sudden degradation in system performance occurs.
6. Someone tells you that they have recently received e-mail messages from you that contained attached files that you did not send. The files that are attached to the e-mail messages have extensions such as .exe, .bat, .scr, and .vbs extensions.
1. The infected file may make copies of itself. This behavior may use up all the free space on the hard disk.
2. A copy of the infected file may be sent to all the addresses in an e-mail address list.
3. The computer virus may reformat the hard disk. This behavior will delete files and programs.
The computer virus may install hidden programs, such as pirated software. This pirated software may then be distributed and sold from the computer.
4. The computer virus may reduce security. This could enable intruders to remotely access the computer or the network.
5. You receive an e-mail message that has a strange attachment. When you open the attachment, dialog boxes appear, or a sudden degradation in system performance occurs.
6. Someone tells you that they have recently received e-mail messages from you that contained attached files that you did not send. The files that are attached to the e-mail messages have extensions such as .exe, .bat, .scr, and .vbs extensions.
Symptoms of a computer virus
If you suspect or confirm that your computer is infected with a computer virus, obtain the current antivirus software. The following are some primary indicators that a computer may be infected:
1. The computer runs slower than usual.
2. The computer stops responding, or it locks up frequently.
3. The computer crashes, and then it restarts every few minutes.
4. The computer restarts on its own. Additionally, the computer does not run as usual.
5. Applications on the computer do not work correctly.
6. Disks or disk drives are inaccessible.
7. You cannot print items correctly.
8. You see unusual error messages.
9. You see distorted menus and dialog boxes.
10. There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension.
11. An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted
12. An antivirus program cannot be installed on the computer, or the antivirus program will not run.
13. New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.
14. Strange sounds or music plays from the speakers unexpectedly.
15. A program disappears from the computer even though you did not intentionally remove the program.
1. The computer runs slower than usual.
2. The computer stops responding, or it locks up frequently.
3. The computer crashes, and then it restarts every few minutes.
4. The computer restarts on its own. Additionally, the computer does not run as usual.
5. Applications on the computer do not work correctly.
6. Disks or disk drives are inaccessible.
7. You cannot print items correctly.
8. You see unusual error messages.
9. You see distorted menus and dialog boxes.
10. There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension.
11. An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted
12. An antivirus program cannot be installed on the computer, or the antivirus program will not run.
13. New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.
14. Strange sounds or music plays from the speakers unexpectedly.
15. A program disappears from the computer even though you did not intentionally remove the program.
What is a computer virus?
A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk.
Computer viruses are most easily spread by attachments in e-mail messages or by instant messaging messages. Therefore, you must never open an e-mail attachment unless you know who sent the message or unless you are expecting the e-mail attachment. Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread by using downloads on the Internet. Computer viruses can be hidden in pirated software or in other files or programs that you may download.
Computer viruses are most easily spread by attachments in e-mail messages or by instant messaging messages. Therefore, you must never open an e-mail attachment unless you know who sent the message or unless you are expecting the e-mail attachment. Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread by using downloads on the Internet. Computer viruses can be hidden in pirated software or in other files or programs that you may download.
Advantages of internet
1.Email:
Email is now an essential communication tools in business. It is also excellent for keeping in touch with family and friends. The advantages to email is that it is free ( no charge per use) when compared to telephone, fax and postal services.
2.Information:
There is a huge amount of information available on the internet for just about every subject known to man, ranging from government law and services, trade fairs and conferences, market information, new ideas and technical support.
3.Services:
Many services are now provided on the internet such as online banking, job seeking and applications, and hotel reservations. Often these services are not available off-line or cost more.
4.Buy or sell products:
The internet is a very effective way to buy and sell products all over the world.
5.Communities:
Communities of all types have sprung up on the internet. Its a great way to meet up with people of similar interest and discuss common issues.
Email is now an essential communication tools in business. It is also excellent for keeping in touch with family and friends. The advantages to email is that it is free ( no charge per use) when compared to telephone, fax and postal services.
2.Information:
There is a huge amount of information available on the internet for just about every subject known to man, ranging from government law and services, trade fairs and conferences, market information, new ideas and technical support.
3.Services:
Many services are now provided on the internet such as online banking, job seeking and applications, and hotel reservations. Often these services are not available off-line or cost more.
4.Buy or sell products:
The internet is a very effective way to buy and sell products all over the world.
5.Communities:
Communities of all types have sprung up on the internet. Its a great way to meet up with people of similar interest and discuss common issues.
The Beginning of Internet Explorer
In 1995, Microsoft was busily working on a very important project, code-named “Chicago.” An extension of that project – code-named “O’Hare” after Chicago’s O’Hare Airport – was being developed in tandem. Microsoft’s intent was to combine the technologies of both projects into a single consumer product. Toward the end of these projects, Microsoft decided to take the O’Hare technologies, and distribute them as part of a separate add-on pack to the Chicago product. Chicago, now known as Windows 95, proved to be one of the most successful operating systems to date. O’Hare, now known as Internet Explorer 1.0, first shipped as an Internet Jumpstart Kit in Microsoft Plus! For Windows 95.
Although Internet Explorer 1.0 integrated nicely with Windows 95, few customers used it, preferring instead to use the highly popular browser from Netscape Development Corporation, or other web browsers such as Mosaic, Lynx and Opera. Microsoft remained undeterred. Microsoft’s market research indicated that their customers wanted to use Windows 95 as a universal network client; one that could connect to Windows NT, Novell NetWare, Banyan Vines, and the Internet.
Microsoft made great strides over the next year with version 2.0. This was Microsoft’s first cross-platform browser, available to both Macintosh and 32-bit Windows users. Version 2 introduced support for a wide variety of emerging Internet technologies, such as Secure Sockets Layer (SSL), HTTP cookies, RealAudio, Virtual Reality Modeling Language (“VRML”), and support for Internet newsgroups (NNTP). We’ll discuss these things more in depth in forthcoming chapters.
Although Internet Explorer 1.0 integrated nicely with Windows 95, few customers used it, preferring instead to use the highly popular browser from Netscape Development Corporation, or other web browsers such as Mosaic, Lynx and Opera. Microsoft remained undeterred. Microsoft’s market research indicated that their customers wanted to use Windows 95 as a universal network client; one that could connect to Windows NT, Novell NetWare, Banyan Vines, and the Internet.
Microsoft made great strides over the next year with version 2.0. This was Microsoft’s first cross-platform browser, available to both Macintosh and 32-bit Windows users. Version 2 introduced support for a wide variety of emerging Internet technologies, such as Secure Sockets Layer (SSL), HTTP cookies, RealAudio, Virtual Reality Modeling Language (“VRML”), and support for Internet newsgroups (NNTP). We’ll discuss these things more in depth in forthcoming chapters.
The History of Internet Explorer
Internet Explorer is Microsoft’s world wide web browser, and the name for a set of Internet-based technologies that provide browsing, email, collaboration and multimedia features to millions of people around the world. It’s a four-year old product that has received glowing reviews from end users and the media, harsh criticism from Microsoft’s competitors and the anti-Microsoft crowd, and it is one of the cornerstones of an ongoing anti-trust trial that the Department of Justice has brought against Microsoft. It remains a testament to Microsoft’s ability to turn it’s product strategy on a dime, it is used by millions upon millions of users navigate the World Wide Web, and it has emerged the victor in the long-standing browser wars with Microsoft’s competitor, Netscape Corporation.
To properly understand the security aspects surrounding Internet Explorer, I believe one should begin with a historical perspective. This is important for two reasons. First, given the many different released versions of Internet Explorer, you need to determine where you are in the Internet Explorer product timeline. Only then will you be able to determine what security issues you’re facing and what you can do about them. Second, and more importantly, Internet Explorer is here to stay. Microsoft has forever interwoven the Internet Explorer suite of products and set of technologies into its Windows, Office and BackOffice family product lines. There are over 200 million Windows users, and I don’t think Windows is going to disappear any time soon
To properly understand the security aspects surrounding Internet Explorer, I believe one should begin with a historical perspective. This is important for two reasons. First, given the many different released versions of Internet Explorer, you need to determine where you are in the Internet Explorer product timeline. Only then will you be able to determine what security issues you’re facing and what you can do about them. Second, and more importantly, Internet Explorer is here to stay. Microsoft has forever interwoven the Internet Explorer suite of products and set of technologies into its Windows, Office and BackOffice family product lines. There are over 200 million Windows users, and I don’t think Windows is going to disappear any time soon
Subscribe to:
Posts (Atom)