0% found this document useful (0 votes)
137 views8 pages

What Is A Computer Virus

A computer virus is a malicious software program that spreads from one computer to another and interferes with computer operation. Viruses are often spread through email attachments or downloads and can corrupt or delete files. A worm is a type of virus that spreads automatically without user interaction through email or network vulnerabilities. Rogue security software falsely claims a computer is infected to trick users into downloading unwanted programs. Malware is an umbrella term for various types of malicious programs like viruses, worms, spyware and rogue software. It is important to install antivirus software, keep systems updated and avoid suspicious email attachments or downloads to prevent infection.

Uploaded by

Nav_Chohan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
137 views8 pages

What Is A Computer Virus

A computer virus is a malicious software program that spreads from one computer to another and interferes with computer operation. Viruses are often spread through email attachments or downloads and can corrupt or delete files. A worm is a type of virus that spreads automatically without user interaction through email or network vulnerabilities. Rogue security software falsely claims a computer is infected to trick users into downloading unwanted programs. Malware is an umbrella term for various types of malicious programs like viruses, worms, spyware and rogue software. It is important to install antivirus software, keep systems updated and avoid suspicious email attachments or downloads to prevent infection.

Uploaded by

Nav_Chohan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 8

What is a computer virus?

A computer virus is a small software program that spreads from one computer to another and interferes with computer operation. A computer virus might corrupt or delete data on a computer, use an email program to spread the virus to other computers, or even delete everything on the hard disk. Computer viruses are frequently spread by attachments in email messages or by instant messaging messages. Therefore, you must never open an email attachment unless you know who sent the message or you are expecting the email attachment. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread through downloads on the nternet. They can be hidden in pirated software or in other files or programs that you might download. Symptoms of a computer virus !or information about the symptoms of a computer virus, go to the "icrosoft #C $ecurity website. What is a worm? A worm is computer code that spreads without user interaction. "ost worms begin as email attachments that infect a computer when they%re opened. The worm scans the infected computer for files, such as address books or temporary webpages, that contain email addresses. The worm uses the addresses to send infected email messages, and frequently mimics &or spoofs' the (!rom( addresses in later email messages so that those infected messages seem to be from someone you know. )orms then spread automatically through email messages, networks, or operating system vulnerabilities, frequently overwhelming those systems before the cause is known. )orms aren%t always destructive to computers, but they usually cause computer and network performance and stability problems. What is a trojan horse? A tro*an horse is a malicious software program that hides inside other programs. t enters a computer hidden inside a legitimate program, such as a screen saver. Then it puts code into the operating system that enables a hacker to access the infected computer. Tro*an horses do not usually spread by themselves. They are spread by viruses, worms, or downloaded software. What is spyware? $pyware can install on your computer without your knowledge. These programs can change your computer+s configuration or collect advertising data and personal information. $pyware can track nternet search habits and can also redirect your web browser to a different website than you intend to go to. What is rogue security software? A rogue security software program tries to make you think that your computer is infected by a virus and usually prompts you to download or buy a product that removes the virus. The names of these products frequently contain words like Antivirus, $hield, $ecurity, #rotection, or !ixer. This makes them sound legitimate. They frequently run right after you download them, or the next time that your computer starts. ,ogue security software can prevent applications, such as nternet -xplorer, from opening. ,ogue security software might also display legitimate and important )indows files as infections. Typical error messages or pop.up messages might contain the following phrases/

)arning0 1our computer is infected0 This computer is infected by spyware and adware. Note f you receive a message in a popup dialog box that resembles this warning, press ALT + F4 on your keyboard to close the dialog box. 2o not click anything inside the dialog box. f a warning, such as the one here, keeps appearing when you try to close the dialog box, it+s a good indication that the message is malicious. Are you sure you want to navigate from this page3 1our computer is infected0 They can cause data lost and file corruption and need to be treated as soon as possible. #ress CA4C-5 to prevent it. ,eturn to $ystem $ecurity and download it to secure your #C. #ress 67 to Continue or Cancel to stay on the current page. f you see this kind of message, then don%t download or buy the software. What is malware? "alware is a term that is used for malicious software that is designed to do damage or unwanted actions to a computer system. -xamples of malware include the following/ Viruses )orms Tro*an horses $pyware ,ogue security software ow to remove malware such as a virus! spyware! or rogue security software ,emoving a computer virus or spyware can be difficult without the help of malicious software removal tools. $ome computer viruses and other unwanted software reinstall themselves after the viruses and spyware are detected and removed. !ortunately, by updating the computer and by using malicious software removal tools, you can help permanently remove unwanted software. !or more information about how to remove a computer virus and spyware, see the following article in the "icrosoft 7nowledge 8ase/ 9:;<::9 . "icrosoft resources and guidance for removal of malware and viruses Note f you cannot access the nternet on your computer, use another computer to help you follow the steps in the =>ow to reset your nternet -xplorer proxy settings? section on the computer that may be infected. To remove a computer virus and other malicious software, follow these steps in order. "nstall the latest up#ates from $icrosoft %p#ate Note A computer virus may prevent you from accessing the "icrosoft @pdate website to install the latest updates. )e recommend that you set the Automatic @pdates service to run automatically so that a computer is not missing any important updates. !or more information, see the following article in the "icrosoft 7nowledge 8ase/ AB:C9C . >ow to configure and use Automatic @pdates in )indows Win#ows &ista an# Win#ows ' <. Click Start, and then type Win#ows %p#ate in the search box. 9. n the results area, click Win#ows %p#ate.

A. Click (hec) for %p#ates. D. !ollow the instructions to download and install the latest )indows @pdates. Win#ows *+

<. Click Start, and then click ,un. 9. Type sys#m-cpl, and then press -nter. A. Click the Automatic %p#ates tab, and then click the Automatic .recommen#e#/ option. D. Click 01.

%se the free $icrosoft Safety Scanner "icrosoft offers a free online tool that scans and helps remove potential threats from your computer. To perform the scan, go to the "icrosoft $afety $canner website. %se the Win#ows $alicious Software ,emoval Tool !or more information about the "icrosoft "alicious $oftware ,emoval Tool, see the following article in the "icrosoft 7nowledge 8ase/ EFBEAB . The "icrosoft )indows "alicious $oftware ,emoval Tool helps remove specific, prevalent malicious software from computers that are running )indows ;, )indows Vista, )indows $erver 9BBA, )indows $erver 9BBE, or )indows G# $anually remove the rogue security software f the rogue security software can+t be detected or removed by using "icrosoft $afety $canner or the )indows "alicious $oftware ,emoval Tool, try the following steps/ Win#ows *+! Win#ows &ista! or Win#ows '

<. 4ote the name of the rogue security software. !or this example, we%ll call it *+ Security Agent 2343. 9. ,estart your computer. A. )hen you see the computer%s manufacturer%s logo, repeatedly press the F5 key. D. )hen you are prompted, use the arrow keys to highlight Safe $o#e with Networ)ing, and then press -nter. C. Click the Start button and check whether the rogue security software appears on the Start menu. f it%s not listed there, click All +rograms and scroll to find the rogue security software%s name. :. ,ight.click the name of the rogue security software program, and then click +roperties. ;. Click the Shortcut tab. E. n the +roperties dialog box, check the path of the rogue security software program that is listed in Target. !or example, (67+rogram Files7*+ Security Agent 2343. Note The folder name frequently is a random number. F. Click 0pen File Location.

<B. n the +rogram Files window, click +rogram Files in the address bar. <<. $croll until you find the rogue security software program folder. !or example, *+ Security Agent 2343. <9. ,ight.click the folder, and then click 8elete. <A. ,estart your computer. <D. Ho to the "icrosoft $afety $canner website. <C. Click the 8ownloa# Now button, and then click ,un. <:. !ollow the instructions to scan your computer and help remove the rogue security software. f you suspect that your computer is infected with rogue security software that was not detected by using "icrosoft security solutions, you can submit samples by using the "icrosoft "alware #rotection Center submission form . !or more information about rogue security software, go to the )atch out for fake virus alerts website. "nstall an# run $icrosoft Security 9ssentials or Win#ows 8efen#er Win#ows *+! Win#ows &ista! or Win#ows '

"icrosoft offers a free malicious removal program called "icrosoft $ecurity -ssentials that helps protect your computer from becoming infected. To install "icrosoft $ecurity -ssentials, follow these steps/ <. Ho to the "icrosoft $ecurity -ssentials website. 9. Click Free 8ownloa#. A. Click ,un, and then follow the instructions to install "icrosoft $ecurity -ssentials. D. After installation, restart your computer. C. Click Start, click All +rograms, and then click $icrosoft Security 9ssentials. :. 6n the ome tab, select the Full scan option, and then click Scan now. "nstall Win#ows 8efen#er 0ffline )indows 2efender 6ffline is a malware tool that helps remove difficult to eliminate viruses that start before )indows starts. To use )indows 2efender 6ffline, follow these steps/ <. 6n an uninfected computer, go to the )hat is )indows 2efender 6ffline website. 9. Click 8ownloa# the :2 ;it version or 8ownloa# the <4 ;it version, depending on which operating system that you are running. f you%re unsure of which operating system that you are running, go to the s my #C running the A9.bit or :D.bit version of )indows website. A. )hen you are prompted, click Save As, and then save the file to a 2V2, C2, or @$8 flash drive. D. 6n the infected computer, insert the 2V2, C2, or @$8 flash drive, and then restart the computer. C. )hen you are prompted, press a key to select an option to use to start your computer, such as !<9, !C, or !E, depending on the kind of computer that you are using.

:. @se the arrow key to scroll to the drive where you installed )indows 2efender 6ffline file. )indows 2efender 6ffline starts and immediately scans for malware. !or more information about how to remove a computer virus, go to the >ow do remove a computer virus website.

ow to protect your computer against malware There are actions that you can take to help protect your computer against malware. Turn on the firewall

Win#ows *+

Fi= it for me To turn on the firewall automatically, click the Fi= this pro;lem link. Then click ,un in the File 8ownloa# dialog box, and follow the steps in this wiIard. !ix this problem Microsoft Fix it Microsoft Fix it 50102

Note This wiIard may be in -nglish onlyJ however, the automatic fix also works for other language versions of )indows. Note f you are not on the computer that has the problem, you can save the automatic fix to a flash drive or to a C2, and then you can run it on the computer that has the problem.

Let me fi= it myself To enable )indows !irewall, follow these steps/ <. Click Start, click ,un, type Firewall-cpl, and then click 01. 9. 6n the >eneral tab, click 0n .recommen#e#/. A. Click 01. Note f the >eneral tab or the 0n .recommen#e#/ option is unavailable, the system may have a policy against running the firewall. Contact the system administrator for more information about how to enable the firewall. n addition, the system may already be running a third.party firewall &Kone Alarm or 4orton nternet $ecurity, for example'. Contact the system administrator for help in determining whether a firewall is already running on the system. !or more information about how to turn on your firewall in )indows G#, see the following article in the "icrosoft 7nowledge 8ase/ 9EA:;A . >ow can turn on or turn off the firewall in )indows G# $ervice #ack 9 or later versions3

Win#ows &ista an# Win#ows '

<. Click the Start button, and then click (ontrol +anel. 9. n the Search box, type firewall, and then click Win#ows Firewall. A. n the left pane, click Turn Win#ows Firewall on or off &you may be prompted to enter your administrator password'. D. @nder each network location, click 0n .recommen#e#/ &)indows Vista' or Turn on Win#ows Firewall &)indows ;', and then click 01. !or more information about how to turn on your firewall in )indows Vista, go to the Turn )indows Vista !irewall on or off website. !or more information about how to turn on your firewall in )indows ;, go to the Turn )indows ; !irewall on or off website.

1eep your computer up to #ate !or more information about how to set Automatic @pdates in )indows, see the following article in the "icrosoft 7nowledge 8ase/ AB:C9C . >ow to configure and use Automatic @pdates in )indows "nstall $icrosoft Security 9ssentials an# )eep it up to #ate !or more information about how to install and use "icrosoft $ecurity -ssentials, go to the "icrosoft $ecurity -ssentials website. 8on?t ;e tric)e# into #ownloa#ing malware >ere are some tips that can help protect you from downloading software that you don%t want/ 6nly download programs from websites that you trust. f you%re not sure whether to trust a program that you want to download, enter the name of the program into your favorite search engine to see whether anyone else has reported that it contains spyware. ,ead all security warnings, license agreements, and privacy statements that are associated with any software that you download. 4ever click (Agree( or (67( to close a window that you suspect might be spyware. nstead, click the red (x( in the corner of the window or press Alt + F4 on your keyboard to close a window. 8e wary of popular (free( music and movie file.sharing programs, and make sure that you understand all the software packaged with those programs. @se a standard user account instead of an administrator account. !or more information, go to the )hy use a standard account instead of an administrator account website. !or more information about how to protect a computer against viruses, go to the >ow to boost your malware defense and protect your #C website. ow to reset your "nternet 9=plorer pro=y settings "alicious software might change nternet -xplorer proxy settings, and these changes can prevent you from accessing )indows @pdate or any "icrosoft $ecurity sites. To have us change your nternet -xplorer proxy settings for you, click the Fi= it button or link. Click ,un in the File 8ownloa# dialog box, and follow the steps in the !ix it wiIard/

!ix this problem Microsoft Fix it Microsoft Fix it 50566

Notes

This wiIard may be in -nglish only. >owever, the automatic fix also works for other language versions of )indows. f you are not using the computer that has the problem, save the !ix it solution to a flash drive or a C2 and then run it on the computer that has the problem.

To change your nternet -xplorer proxy settings yourself, follow these steps/ Win#ows *+! Win#ows &ista! an# Win#ows ' <. Click the Start button, and then click ,un. 9. n the ,un box, copy and paste the following/ reg a## @ 1(%7Software7$icrosoft7Win#ows7(urrent&ersion7"nternet Settings@ Av +ro=y9na;le At ,9>B8W0,8 A# 3 Af A. Click 01. D. Click the Start button, and then click ,un. C. n the ,un box, copy and paste the following/ reg #elete @ 1(%7Software7$icrosoft7Win#ows7(urrent&ersion7"nternet Settings@ Av +ro=yServer Af :. Click 01. !or more information about how to reset your nternet -xplorer proxy settings, visit the following "icrosoft 7nowledge 8ase article/ 99EFFD9 . >ow to reset your nternet -xplorer proxy settings ow to o;tain computer virus an# securityCrelate# support For %nite# States )ant to chat with a live person3 6ur Answer Tech trained professionals are ready to help/ Answer 2esk For %nite# States an# (ana#a >elp protect your computer from viruses and malware/ Virus $olution and $ecurity Center Het help with installing updates/ $upport for "icrosoft @pdate $ecurity solutions for T #rofessionals/ Tech4et $ecurity Troubleshooting and $upport $upport by country/ nternational $upport f you are using a #C running )indows E, click here

for more information about how to help protect your #C from viruses, or click here for more information about how to find and remove viruses. For locations outsi#e North America !or computer virus and security.related support for locations outside 4orth America, go to the "icrosoft $upport website.

You might also like