вторник, 29 май 2012 г.

YOUR COMPUTER- OPTIMISED AND SAFE FROM MALWARE


Advice is judged by results, not by intentions.”
Cicero

Replace the fear by knowledge”
Cesar Millan


Computers and the Internet are already an inseparable part of our professional and private life. Moreover, our prosperity depends on their proper operation to a great extent. Therefore the fear of everything threatening the reliable work of computers is understandable. To replace the fear by knowledge is the intention of this brief article. It discusses, in a concise form and in general, what puts computers at risk, and what measures should be taken for their protection. The question of the optimisation of computers as a procedure towards their optimal performance is considered, too.

Today the threats arise from both the connectivity of computers to networks and people's careless behaviour and ignorance regarding the techniques used for attacks with malware, short for malicious software. According to our reliable assistant- the Wikipedia “Malware includes computer viruses, worms, trojan horses, spyware, adware, most rootkits, and other malicious programs”.1 While all these forms of malware differ in the type of damage they cause (from slowing computer down to theft of bank account data), they have something in common- the routes of infection. All of these malicious programs get on a computer through deception of the user or through software vulnerabilities. A computer virus is usually embedded inside a file of almost all possible formats and is sent as an attachment to your email under the disguise of useful information or security tool. Being unwary and curious, you download the file with the virus payload, and the virus attaches itself to a file (not necessarily an “exe” file in Windows machines; it can be a “doc”, “xls” or other file) or boot sectors on your computer and begins its malicious work. In addition to installing antivirus programs, you should adopt some security practices. The first one is: be sure to open only attachments you trust, and be wary of data received from untrusted sources. In fact, viruses are third-party programs allowed to be run on your computer thanks to the privileges/permissions you have as an user. Because of the way permissions work in Linux systems, it is more difficult for a virus to wreak havoc in such computers. Hence, it would be advantageous for keeping your computer safe from viruses to use Linux, some of its distributions being as user-friendly as the operating systems of Microsoft are, for example Ubuntu Linux. Like viruses spyware exploits user's carelessness and/or software vulnerabilities, mostly Internet Explorer and Windows security holes. Spyware, initially meant for espionage purposes, has taken on its present sense as malicious software for stealing personal information including user logins and bank or credit account information, changing computer settings, installing additional software or redirecting Web browsers , misleading users to advertisement websites. Spyware is installed on your computer surreptitiously usually by masquerading as security software. Spyware can be bundled with another useful and desirable software you would gladly download. It is executed automatically when the operating system boots without your knowledge. Spyware is hidden and accomplishes its malicious work without you even suspecting its harmful presence and behaviour. Besides installing anti-spyware programs (usually combined with antivirus software to form anti-malware software), there are some security approaches you should assume to keep your computer safe from spyware. Use a web browser other than Internet Explorer, such as Opera, Google Chrome, or Mozilla Firefox. Download programs only from reputable sources. Be aware of the common spyware programs and threatening websites, such as CoolWebSearch or Movieland and Coolwebsearch.com or Popcorn.net, respectively . Be informed on the 'news' in the computer security field by visiting Wikipedia and websites like StopBadware and Shadowserver Foundation , which give actual information on security threats and attacker's techniques, eg tricking users by social engineering. Inspect your computer periodically by disconnecting it from the internet and by means of credible anti-spyware/antivirus software. Be sure to use reliable anti-malware software, which should be updated every day for new 'signatures', components known as malicious code, and new security techniques. There are reliable anti-malware programs like Microsoft Security Essentials or Malwarebytes Anti-Malware you can use to keep your computer safe. Have your computer be scanned periodically online if you run anti-malware applications. This online scanning is necessary because the first thing that malicious software does is to eliminate any existing anti-malware software. Therefore the only way to know of an attack is by using an online scanning resource that is not installed on the infected computer. You can use the free online services of Panda Software's AcriveScan or Kaspersky's Free Virus Scan. Both require that the scan is preformed using Internet Explorer. So you can take advantage of IE for scanning purposes. Following these advices should lead to the intended results- keeping your computer safe. Safety in the sense of protection from malicious software is one of the aspect of this article. The other aspect is keeping computers optimised.

The optimisation or achieving optimum computer performance requires bloatware removal as a first step. Bloatware is the inclusion in a software program of unnecessary features that are not used by end users, for example marketing or e-commerce features. Therefore this type of bloatware software uses more computer resources than necessary, while offering little or no benefit to its users. The result of the extremely large amount of features is summarized by Niklaus Wirth in his statement that “software speed is decreasing more quickly than hardware speed is increasing2. To get rid of the bloatware, you can use Ccleaner. This is reliable software which will clean your computer from the unnecessary “rubbish”. The second step you should take towards the optimum performance of your computer consists in a series of maintenance procedures, such as cleaning up your startup programs, cleaning up services that aren't needed, running a General Maintenance Utility Program, disabling some features you don't need, etc, for which perhaps you have to be assisted by a computer specialist.3 The computer professional may recommend you to implement some more complicated security controls like Firewall for example.4

In replacing the fear by the above knowledge, the given advices will be judged by the achieved result which is certainly keeping your computer optimised and safe.

May 29th, 2012
Marlena Yurukova, M.S.
2 Software Blot (http://en.wikipedia.org/wiki/Software_bloat)

Няма коментари:

Публикуване на коментар