Thursday 31 January 2013

Precautions from virus attacks


  1. A number of general precautions are herewith provided to minimize the possibility of virus infection. 
  2. Back up important data frequently and keep them in a safe place other than the computer.
  3. Patch the operating system as quickly as possible to block the potential vulnerabilities that malware can exploit and sneak in.
  4. Obtain the most recent virus definition to keep the antivirus application up-to-date.
  5. Be suspicious of e-mail attachments from unknown sources and scan them first; be cautious when opening e-mail attachments even from known sources, because e-mail attachments are currently a major source of infection and sophisticated viruses can automatically send e-mail messages from other’s address books.
  6. Scan all new software before installing and opening, particularly the media that belong to other people. Sometimes even the trial and retail software has viruses.
  7. Be extremely vigilant with external sources, such as CDs, Pen drives and Web links.
  8. Always keep application’s auto-protect running. Set the application default to auto-protection upon the launch of system.
  9. Now-a-days the USB ports are the major reasons for spreading viruses. So, always try to explore any device than directly opening it Scan the pen drives before opening it.

Prevention from Viruses in OS:

Additionally, many recent significant outbreaks of virus stem from Operating System (OS) vulnerabilities. Vulnerabilities can exist in large and complex software systems as well as human carelessness and sabotage.
Virus writers have demonstrated a growing tendency to exploit system vulnerabilities to propagate their malicious code. Operating systems consist of various and complex yet vulnerable software components that play a crucial role in the achievement of overall system security, since many protection mechanisms and facilities, such as authentication and access control, are provided by the operating system.
Vulnerabilities and methods for closing them vary greatly from one operating system to another. Therefore, it is of vital importance to screen these following items in the following two famous usable OS.

Microsoft Windows:

  • Internet Information Services (IIS)
  • Microsoft SQL Server (MSSQL)
  • Windows Authentication
  • Internet Explorer (IE)
  • Windows Remote Access Services
  • Microsoft Data Access Components (MDAC)
  • Windows Scripting Host (WSH)
  • Microsoft Office Suite (Word and Excel)
  • Microsoft Outlook and Outlook Express
  • Windows Peer to Peer File Sharing (P2P)
  • Simple Network Management Protocol (SNMP)
  • Abstract Syntax Notation One (ASN.1) Library

Unix/Linux:

  • Open Secure Sockets Layer (SSL)
  • Apache Web Server
  • BIND Domain Name System (DNS) Server
  • Remote Procedure Calls (RPC) Services
  • Sendmail
  • General UNIX Authentication Accounts with No Passwords or Weak Passwords
  • Clear Text Services
  • Simple Network Management Protocol (SNMP)
  • Secure Shell (SSH)
  • Misconfiguration of Enterprise Services NIS/NFS
These activities will not put an end to the viruses. But, it can reduce the damages caused by the viruses. The sudden hacks in the forms of viruses can also be mostly eliminated. Hope, his discussion on Viruses and Anti viruses may deliver a good knowledge about the protection from viruses.

0 comments:

Post a Comment