It is quite possible you are inundated on a daily basis with spam mail and unwanted pop-ups which advertise the latest in spy-ware and antivirus protection. As un-amusing and counterintuitive as it may be, competition and the effective differences between competing antivirus application developers is so tight, that even the manufactures of antivirus programs are willing to exploit your computers weaknesses to advertise their solutions.
The sheer size and efficiency of the internet as well its billion-plus users makes new computer viruses more dangerous and virulent than ever. Viruses can literally spread around the globe in only minutes, effecting thousands of unprotected and unprepared users and businesses virtually instantly and simultaneously. The need for antivirus protection is of paramount concern for virtually all PC users.
First Things First: What IS a Computer Virus?
To be considered a true computer Virus, a program needs the ability to replicate itself and trigger its activity at specified events. A computer virus is just one of three types of programs known as “maliceware”. “Maliceware” are applications designed to damage, delete or steal your information, hijack your computer and even damage or destroy your computers hardware. The three types of “maliceware” you need to concern yourself with are Viruses, Trojans and Worms. Most antivirus programs are designed to detect and defend your PC from all three threats.
What Does an Antivirus Program Do?
Antivirus programs take two common approaches to recognize threats to your computer.
1. Signature Detection: Via Signature Detection an antivirus application scans your computer, drives and storage devices for files that contain a code it recognizes as a virus variant.
2. Activity: An antivirus application will monitor the activity on your computer for suspicious behaviors i.e. modification of system files or folders and unauthorized connections to the internet to name two.
Signature detection generally requires the manufacturer of an antivirus application to obtain a copy of a specific virus and then reverse-engineer it to obtain markers relevant to its programming. These markers are then loaded into your antivirus software via updates. Signature detection is a sound methodology for detecting and protecting against computer viruses, however it can be rendered useless when faced with a virus for which is has no definition.
Antivirus applications that scan for potential computer virus activity can be more useful at detecting the latest threats than those reliant on signature detection. It is important to note that because many applications perform the same activities as a virus – writing and changing system files for example – a user can quickly become inundated with numerous and unnecessary warnings by antivirus applications that utilize this method for detection.
Most of today’s “solid” antivirus programs utilize a combination of both signature detection and virus activity to protect your computer against threats.
How to Choose the Antivirus Program that is Right for You.
If you try surfing the web for insight into what is the best antivirus program or manufacturer, you will quickly find yourself neck deep in a sea of advertisements which profess themselves to be legitimate and impartial evaluators of the available programs. The truth is, of the major manufacturers, no one solution can provide for all of your potential needs. They all have instances where they are not as effective as the competition at detecting or eliminating a specific infection or threat. There are many good Antivirus applications and manufacturers all vying for your business, be it for personal or business use, and choosing the correct application or manufacturer for your computer security can generally come down to a few simple questions.
How at Risk are You?
Asking yourself this question is perhaps the first and most important step toward choosing what degree of protection you need, and how much money you are willing to spend, on Antivirus protection. Risk generally equates to your computers exposure to outside applications, files or connections. If you were to operate a computer that would never come into contact with any program or file not manufactured by a secure source, then you have virtually no need for an Antivirus application. Simply put, if you never plan to connect your computer to the internet, download files with it or upload “at risk” files from outside data sources, you should have no need for Antivirus software.
If you are a casual user who perhaps connects to the internet on occasion through a temporary or dial up connection and only download or upload files and programs from reasonably secure sources, your need for an antivirus program is clear, however, your risk may be minimal. In this situation the types and range of protective applications can be kept to a minimum; a basic antivirus program designed to regularly scan your hard drive for infections should offer you the protection that you need. There are many good antivirus programs that will fit this need available as shareware - a free download - throughout the internet.
Now, if you are like what I would consider to be the majority of today’s computer users, you are a high risk user and need a wide variety of the most up to date antivirus programs available. If you have a broadband internet connection which keeps your computer connected to the internet 24/7. If you regularly upload and download files and applications from random and un-trusted sources, you need to invest in very thorough security for your computer. High risk users should invest in an antivirus program that offers real time scanning of all incoming and outgoing connections or files, a firewall to prevent unauthorized access to your PC via an open broadband connection, a pop-up blocker that prevents your computers web browser from being hijacked and adware scanners that detect pop-up, spy-ware, tracking and redirection software.
Are you Purchasing for Business or Home?
Antivirus software manufactured for business and home can be two very different applications both in cost and effectiveness. Home versions generally cost less and come with fewer options than business based antivirus programs. Generally the home user does not need the added functionality built into business versions and as such, I would not recommend that a home user invest in an antivirus solution designed for business.
Good antivirus software designed for business is focused on security, both from external and internal threats, as well as ease of maintenance. Most corporate versions of antivirus applications allow for a central point of control over entire networks. Protection can be divided between internet or application servers and individual PCs. New software updates are generally “pushed” from a central application server through the entire network, allowing for simplicity and assure-ity of a network’s protection. Most times, corporate versions of antivirus applications do not allow individual users within a network to make changes to their protection settings; this is of key importance when considering overall network security and stability.
As a business purchasing a corporate class antivirus suite, it is important that your protection extends to each individual user that will access your network. Exchange/mail and internet server protection is a must, as well as protection for mission-critical file and application servers. It is a good rule of thumb for IT managers within corporate environments to assume that all their users will do everything within their power to infect corporate equipment with viruses and threats. Though this most certainly is not true, assuming that users know how to protect themselves or their corporate computer environment from infection is in most cases professional suicide for the IT manger in charge.
Antivirus software for business is generally loaded with more options than software built for home, and as such is often times much more expensive on a whole. Usually business antivirus programs come as a server based application. Clients, or additional licenses, are purchased for each computer or user that connects to the antivirus server.
With Regard to the Antivirus Program Itself:
Determining the true quality and effectiveness of an antivirus program can sometimes come down to how often the manufacturer releases updates to the program. New viruses are introduced to the web on most certainly a daily, if not hourly basis. The best antivirus manufacturers release updates on a daily basis and often offer updates to their programs on a real-time, as needed basis. The ability for an antivirus software manufacturer to release constant, and relevant, updates to their programs should be of great concern to the user. Not having the latest updates can almost be as dangerous as having no protection at all.
Other Important Factors to Consider:
1. The programs compatibility with your current set up and operating system? – If you are still using Windows 98 and you are purchasing an antivirus software manufactured in 2006, chances are it is not compatible with your computer.
2. How much in the way of system resources does the program use? – Just like all applications and operating systems, antivirus applications will use your computers processing power, memory and storage space to function. Keeping this use to a minimum will help to keep your computer operating at peak performance.
3. What kind of protection does the software offer? – Does the program offer protection against multiple threats such as Worms and Trojans? Will the program scan incoming and outgoing text messages and e-mails?
4. Cost – How much will the protection cost you over the life of your usage? – Most antivirus programs require that you subscribe to their service and then purchase updates on a yearly basis. The costs of these updates can vary widely between manufacturers and should be considered when making your final decision.
Answering these questions truthfully though an honest assessment of your PC usage will help to guarantee that you invest the proper amount of money and time into ensuring your PC and data are safe and secure.
Copyright 2006 http://www.hcditrading.com Brad Calli
Thursday, June 4, 2009
What To Look For In An Antivirus Trial (by Morgan Hamilton)
In the past few decades the term antivirus probably signified a new preventive measure that will keep people from being infected with a particular illness. In recent years, the phrase antivirus will only catch the attention of computer geeks. But if you enhance the phrase by mentioning antivirus trial, there’s a good chance that you will catch the attention of the whole planet as well.
Computer viruses are propagating faster than their organic counterparts. These malevolent programs, which started out as innocent bits of codes written by some programmers with a sense of humor, have evolved into terrible tools that can damage even the most advance IT infrastructures. As a result, new antivirus programs are being written and introduced into the market all the time. But these antivirus programs are a little help in stopping all the known and as yet mutated versions of computer viruses.
This is where antivirus trial packages enter the computer market. When a prominent antivirus program manufacturer plans on releasing a new antivirus program into the market, the usual practice is to offer an antivirus trial for customers. This trial not only allows consumers to evaluate the program, but allows the more advanced costumers to test the program against several kinds of known and unknown viruses that plague cyberspace. In a few cases, they may even be able suggest certain changes that can improve the antivirus program.
An antivirus trial also enables existing antivirus packages manufacturers to lose a portion of their market. The conventional manufacturers like Norton or McAfee already control a big part of the market place. But their trials have an inherent flaw because they are only customized to cater to the demands of the broadest base of the market.
Some of the highly specialized industries require custom built antivirus programs that can address their specific needs. An antivirus trial is often geared to give these exclusive costumers a taste of the capabilities of the new antivirus program before building the entire package. Think of this sort of antivirus trial as random samples or evaluation versions that enable costumers to isolate and demand developments in the particular fields that affect their businesses.
Morgan Hamilton offers expert advice and great tips regarding all aspects concerning Antivirus Trial. Visit our site for more helpful information about Antivirus Trial and other similar topics.
Computer viruses are propagating faster than their organic counterparts. These malevolent programs, which started out as innocent bits of codes written by some programmers with a sense of humor, have evolved into terrible tools that can damage even the most advance IT infrastructures. As a result, new antivirus programs are being written and introduced into the market all the time. But these antivirus programs are a little help in stopping all the known and as yet mutated versions of computer viruses.
This is where antivirus trial packages enter the computer market. When a prominent antivirus program manufacturer plans on releasing a new antivirus program into the market, the usual practice is to offer an antivirus trial for customers. This trial not only allows consumers to evaluate the program, but allows the more advanced costumers to test the program against several kinds of known and unknown viruses that plague cyberspace. In a few cases, they may even be able suggest certain changes that can improve the antivirus program.
An antivirus trial also enables existing antivirus packages manufacturers to lose a portion of their market. The conventional manufacturers like Norton or McAfee already control a big part of the market place. But their trials have an inherent flaw because they are only customized to cater to the demands of the broadest base of the market.
Some of the highly specialized industries require custom built antivirus programs that can address their specific needs. An antivirus trial is often geared to give these exclusive costumers a taste of the capabilities of the new antivirus program before building the entire package. Think of this sort of antivirus trial as random samples or evaluation versions that enable costumers to isolate and demand developments in the particular fields that affect their businesses.
Morgan Hamilton offers expert advice and great tips regarding all aspects concerning Antivirus Trial. Visit our site for more helpful information about Antivirus Trial and other similar topics.
Let's Talk About Antivirus Software! (by Mike Ber)
Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discovered the need to have a computer at home. At the same time the number of Internet surfers increased. This is a good thing because people are realizing the advantages offered by the world of technology. As soon as they discover this, they start using computers and the Internet more and more, but at the same time not considering the threats that are coming in from all sides. They should know that if you don’t protect yourself, nobody will. These threats are now coming from everywhere and they are growing in number and complexity. First threats of this kind were the viruses. At first, viruses were not that harmful. They were designed to perform a simple task, like flashing a single message onto the user's computer screen. Also the spread rate was slow, because not many people were connected to the Internet. But now the majority of viruses are programs intentionally written to obstruct with, or harm other programs or computer systems. And they are spreading very fast.
Many companies and people have had a lot of troubles because of these viruses. And so the need for antivirus software was born. At first one very simple antivirus appeared and this was enough. Now, as the threat is growing antivirus software are becoming a lot more complex. Some of them have also included a firewall so to better protect the users. In order to increase the competition, other antivirus software producers have also come up with a wonderful idea: to offer free scan online. This was a big help for people that are frequently using a computer mostly for their personal use, meaning it is not attached to a network and uses the Internet only from time to time. Now, they don’t have to spend a lot of money to buy antivirus software that will be used very rarely.
Most of these antivirus programs have to be bought in order for you to use them at their full capacity. Also you have the option to test a so called “free trial version”. These trial versions include all or most of the software’s features, and are available to be checked out by the user for a short period of time, usually 30 days. After these 30 days, the program can no longer be used. Other antivirus software producers use another method; they offer a free trial version that you can keep forever. But it is not fully operational, meaning some of the options of the program cannot be used as they are not activated. After you have tried a program and you consider it is fit for your need, then you’ll have to buy it to protect your computer at its full capacity.
Lately, viruses are mostly spread through e-mails because this is the most common use of the Internet. Also, e-mail viruses are easier to develop. E-mail viruses make use of the ability of having macros or scripts implanted in word documents, spreadsheets, HTML pages, and are programmed to run when the document is opened. But how does an e-mail virus works? When an e-mail with an infected document or program is received, the user unknowingly opens a document/program, which in turn executes a code to open the e-mail directory and to send a copy of itself as an e-mail attachment to a certain number of addresses. Some of the recipients of the e-mail open its attachment and the process repeats itself.
This is where the antivirus program comes in. This program is set to check all incoming and outgoing messages and their attachments. If an e-mail is detected to have a document or program infected with a virus the program offers several possibilities to deal with the threat: delete the e-mail, put it in quarantine or try to disinfect it. Most of the times, these choices are left to the user’s decision. It is up to the user to set the program in such manner to best fit his needs. But not all viruses are coming by e-mail. A few of them use security errors in the operating system or your Internet browser to be launched automatically. But if you keep your antivirus and all the other programs updated, there will be a small chance of being infected via this route.
Nowadays, most viruses are spread in the form of e-mail attachments. This is because some of the worst recent viruses relay on recipients that throw away common sense and launch a deadly e-mail attachment. Commonly the attachments are with extensions that include .bat, .com, .exe, .pif, .scr, and .vbs. Sometimes to avoid the filters of antivirus software, virus creators enclose their malicious code in a .zip or .rar archive file. The file might even have a password to full antivirus programs that scan inside archives. And obviously, the password is included in the message as an image for the convenience of the naive user. As a simple but reliable rule, you should never open an attachment that you didn’t expect to receive, even if it came from someone you know. Also, make sure your e-mail software is configured so it will not automatically open attachments.
Another common way of spreading viruses is file sharing. Many viruses spread themselves throughout open network shares. You can protect your computer not sharing files or directories over the network. But if you don’t have a choice and you have to share your files, you are still able to reduce the risk of being infected by installing antivirus software and keeping it updated. Other ways to become infected with viruses are downloading files or software from the Internet, instant messaging or even web pages.
If the file you are downloading or the computer you are downloading it from is infected with a virus, there is a big chance that your computer will also become infected with the virus. As for the instant messaging, the major risk comes from accepting files from other users on the network. This risk can be minimized by configuring your antivirus software to scan all incoming files and also configure your other programs not to automatically accept files, and not to automatically execute the files you accept. Certain viruses are known to infect web servers. If you visit a website from an infected server, your computer could be infected with the same virus, but this is a very rare method of infection.
There are many different threats that are targeting the computers. Although they are very different, all of them are popularly called viruses. A virus by definition is a self-replicating file, not considering whether it is malicious or not. Another type of the so called viruses are worms; they circulate mainly through e-mail but also spread through a network. A worm is aware he is located in a network and uses it for replicating itself. Trojan horses (or trojans) are mostly used to insert some remote tools into a system in order to give the attacker free access to that system, without the user’s knowledge. Most Trojan horses cannot replicate automatically.
With the increased number of Internet users, the existing threats are also raising as now there are many more computers to attack and more people that don’t know to stay away from these threats. But the antivirus software producers are making it easier for us. There is a lot of antivirus software which cover a lot of threats. All we have to do is install one.
Mike Ber is the owner of the Canadian Domain Name Portal called http://www.Every.ca He is also a contributing author to Canadian Computer Magazine and http://www.Developer.ca website.
Many companies and people have had a lot of troubles because of these viruses. And so the need for antivirus software was born. At first one very simple antivirus appeared and this was enough. Now, as the threat is growing antivirus software are becoming a lot more complex. Some of them have also included a firewall so to better protect the users. In order to increase the competition, other antivirus software producers have also come up with a wonderful idea: to offer free scan online. This was a big help for people that are frequently using a computer mostly for their personal use, meaning it is not attached to a network and uses the Internet only from time to time. Now, they don’t have to spend a lot of money to buy antivirus software that will be used very rarely.
Most of these antivirus programs have to be bought in order for you to use them at their full capacity. Also you have the option to test a so called “free trial version”. These trial versions include all or most of the software’s features, and are available to be checked out by the user for a short period of time, usually 30 days. After these 30 days, the program can no longer be used. Other antivirus software producers use another method; they offer a free trial version that you can keep forever. But it is not fully operational, meaning some of the options of the program cannot be used as they are not activated. After you have tried a program and you consider it is fit for your need, then you’ll have to buy it to protect your computer at its full capacity.
Lately, viruses are mostly spread through e-mails because this is the most common use of the Internet. Also, e-mail viruses are easier to develop. E-mail viruses make use of the ability of having macros or scripts implanted in word documents, spreadsheets, HTML pages, and are programmed to run when the document is opened. But how does an e-mail virus works? When an e-mail with an infected document or program is received, the user unknowingly opens a document/program, which in turn executes a code to open the e-mail directory and to send a copy of itself as an e-mail attachment to a certain number of addresses. Some of the recipients of the e-mail open its attachment and the process repeats itself.
This is where the antivirus program comes in. This program is set to check all incoming and outgoing messages and their attachments. If an e-mail is detected to have a document or program infected with a virus the program offers several possibilities to deal with the threat: delete the e-mail, put it in quarantine or try to disinfect it. Most of the times, these choices are left to the user’s decision. It is up to the user to set the program in such manner to best fit his needs. But not all viruses are coming by e-mail. A few of them use security errors in the operating system or your Internet browser to be launched automatically. But if you keep your antivirus and all the other programs updated, there will be a small chance of being infected via this route.
Nowadays, most viruses are spread in the form of e-mail attachments. This is because some of the worst recent viruses relay on recipients that throw away common sense and launch a deadly e-mail attachment. Commonly the attachments are with extensions that include .bat, .com, .exe, .pif, .scr, and .vbs. Sometimes to avoid the filters of antivirus software, virus creators enclose their malicious code in a .zip or .rar archive file. The file might even have a password to full antivirus programs that scan inside archives. And obviously, the password is included in the message as an image for the convenience of the naive user. As a simple but reliable rule, you should never open an attachment that you didn’t expect to receive, even if it came from someone you know. Also, make sure your e-mail software is configured so it will not automatically open attachments.
Another common way of spreading viruses is file sharing. Many viruses spread themselves throughout open network shares. You can protect your computer not sharing files or directories over the network. But if you don’t have a choice and you have to share your files, you are still able to reduce the risk of being infected by installing antivirus software and keeping it updated. Other ways to become infected with viruses are downloading files or software from the Internet, instant messaging or even web pages.
If the file you are downloading or the computer you are downloading it from is infected with a virus, there is a big chance that your computer will also become infected with the virus. As for the instant messaging, the major risk comes from accepting files from other users on the network. This risk can be minimized by configuring your antivirus software to scan all incoming files and also configure your other programs not to automatically accept files, and not to automatically execute the files you accept. Certain viruses are known to infect web servers. If you visit a website from an infected server, your computer could be infected with the same virus, but this is a very rare method of infection.
There are many different threats that are targeting the computers. Although they are very different, all of them are popularly called viruses. A virus by definition is a self-replicating file, not considering whether it is malicious or not. Another type of the so called viruses are worms; they circulate mainly through e-mail but also spread through a network. A worm is aware he is located in a network and uses it for replicating itself. Trojan horses (or trojans) are mostly used to insert some remote tools into a system in order to give the attacker free access to that system, without the user’s knowledge. Most Trojan horses cannot replicate automatically.
With the increased number of Internet users, the existing threats are also raising as now there are many more computers to attack and more people that don’t know to stay away from these threats. But the antivirus software producers are making it easier for us. There is a lot of antivirus software which cover a lot of threats. All we have to do is install one.
Mike Ber is the owner of the Canadian Domain Name Portal called http://www.Every.ca He is also a contributing author to Canadian Computer Magazine and http://www.Developer.ca website.
Subscribe to:
Posts (Atom)