You probably didn't casually invite, or extend a formal attendance request to, these undesirables known as viruses.
Regardless of your opinions, such cyber-nomads may call on you, complete and active, with their destructive payloads.
So what is a virus?
A virus is a program that can self replicate or reproduce itself.
These programmable pirates have a special talent for attaching themselves to executable programmes. When such programmes are executed (often by you, but not always), so is the virus.
They don't necessarily have an ".exe" file extension and are relative masters of disguise. Extensions can be doubled-up to create an optical illusion or optically misleading appearance.
A boot sector virus is probably the worst in so far as it will upset the normal loading of your operating system and therefore, disable your computer. Pointers to your 0.S., can be overwritten, effectively, rendering it to be non-existant. That's never a good thing but not the end of the world, however it seems.
Following, is an example of how devilishly deceptive these vindictive vermon are, in their presentation
A friend of mine rang me last week in a distressed state, with news that her I.S.P. was threatening to shut down her e-mail account because her computer contained viruses affecting her outgoing mail This message seemed to come from her provider but in fact was created by a worm (type of virus). The e-mail was complete with the providers U.R.L., instructions to open its attachment (which it claimed that it contained a free virus cleaner) and even a password to access the attachment. This password could "swing" some cautious people to believe that the attachment was legitimate. Indeed there was only one mistake and it was that the e-mail in question was addressed to "Dear account holder" and not her specific e-mail address.
What is often helpful in determining legitimatacy, is to simply check the properties of the particular mail or e-letter. Where the "from" field can be set to display any name(as spammers demonstrate), more info. via the properties option, may help you to decide.
Attachments are potentially dangerous. You should train yourself to look for such things, and not exclusively this. If you have a suspicion, ignore them. If it seems an awful lot more important than account closure warnings (family matters), then simply ring the addressee in question. Surely most other matters can wait until office opening hours in cases where 24-hour telephone support is not an option. Incidentally, the described worm is a BAGLE variant and is currently in circulation and though it can be cleaned, can also be disruptive.
Smallish text files can be copied and pasted into your e-mail client, eliminating an unnecessary attachment. Doing this will increase the chances of your friends recieving your mail as account providers can have automated software that block mail outside certain perameters, and often legitimate ones are blocked. The limitation when pasted directly into your client is file size.
Incidentally, free and other accounts, in a bid to obliterate spam, can make sucessful mail delivery a nightmare. An option is to put your info./file/picture on some free webspace and simply e-mail the link to it.
Another virus infects your macros( a program,within a program that is similar in delivery to predictive text), and is known as a macro virus and affects the usability of associated files, which are usually files produced using text editors or word processing programs.
Saving such files in R.T.F. or rich text format where you have an otpion, is helpful. Turning your macros "off" could be considered, but their benefits are lost and the virus has won, even before entry.
These are harmless enough and there is no need to freak out. A free cleaning option is mentioned below.
If your great grandmother, untypically sends you software as an attachment, and typically sends you a woolen sweater, then alarm bells should sound.
Anyone who depends on their P.C. as a tool and not a toy, needless to say, should discourage forwarded jokes.These jokes can be time-consuming to read, can be colossal in number, are often habitually forwarded, and not really worth the threat. Believe me when I say that I'm opposite to a "killjoy" and mean this, for semi-serious users who rely on their respective and respected machines.
Consciously or unconsciously, forwarding is "viral", and a perfect vechicle to that end. While it is a very useful and functional tool, perhaps its' use could be limited to its' initial purpose. Human interaction can contribute to the propagation of "troublesome transients". There are other ways to communicate with your friends.
Of course, if you can afford it, you should get an anti-virus program. Corporations, companies and anyone without financial restraint have such programs updated continuously as no-one can predict when (in real time) that some virus creator will decide to unleash his newest version. Previous virus definitions are of little use in protecting against future viruses. Such definitions describe the nature (how and where infection occurs) and an engine is used to scan or locate and clean the infected files. Given the reproductive properties of viruses, the amount of such infected files can be enormous and sometimes they are files with particular extensions.
Regular domestic P.C. users should probably update their definitions weekly and there are anti -virus software manufacturers that will scan your machine for free (use your search engine) but it should be remembered that the virus could already be in your machine at this stage. The program that you pay for can block them at all entry points and is the nearest thing to protection.
Definitive protection requires you to connect to nothing, insert or install nothing, network with no one, and perhaps swabbing your machine with an industrial disinfectant. However, I would consider such measures to be excessive and no way to live your productive life.
Wishing you the best of luck for the future, and may your connection with these "malicious modem and medium migrants" be in the singular, as most of us learn more diligently(not faster), through experience.
Subscribe to:
Post Comments (Atom)
Amung
Label
- ABG Bule
- Accer
- Acer
- Aduhai Seksi
- Agak Gendut
- Agama
- Ahmad dani
- Akun
- Analisa
- android
- Aneh
- Antivirus
- Apec
- Aplikasi
- Apple
- Arab
- artis
- Artis hot
- Asus
- AutoSurf Pro
- Axio
- Bahenol
- Bali
- Banner
- Baterai
- Berita
- Berita Cewek
- Berlian
- Birahi ABG Liar
- Bisnis Online
- Blackberry
- BLACKBERRY BOLD
- BLACKBERRY Javelin
- BLACKBERRY ONYX
- BLACKBERRY ONYX WHITE
- BLACKBERRY Pearl 3G 9105
- BLACKBERRY STORM 2 9550
- Blackberry Torch 9800
- Blogger
- Bocah SD dan Gadis smu
- Bonus
- Brondong
- Brondong SMA
- Browser
- bu Mila
- Camera Canon
- Camera Handycam
- Camera NIKON
- cantik
- Cerita hantu
- Cerita panas
- Cerita selingkuh
- cewek
- Cewek Arab
- Cewek Kost
- Chat
- Cinta
- Cinta Terlarang
- Deposit
- Dewasa
- Diperkosa Anakku
- Dokter cantik
- Domain
- Dosenku
- Doubler Pro 2011
- download
- Dramatis
- dua lelaki
- Dugem
- EA Robot
- ekonomi
- Forex
- Fujitsu
- Gadis
- Gadis Gairah
- Gadis Belia
- Gadis hot
- Gairah
- Gambar
- Game
- Games LibertyReserve
- Ganti istri
- GC Golden Exchange
- GC HYIP Manager v2013
- Gigolo bali
- Google.com
- Haji
- Hamil
- Handphone
- Handphone NOKIA N900
- Handphone NOKIA X6
- Handphone SONY Ericsson Vivas
- Hantu
- Hipnotis
- Hosting
- Hotel
- HTML
- Hujan
- Hyip Indonesian Script
- HYIP Lister
- Hyip manager Pro
- HYIP Script with out database
- Hyip Template
- Ibu ayu
- Ibu Guru Yang seksi
- Ibu Kostku
- Ibu Rini
- Ibu Rumah Tangga
- Indikator
- Indonesia
- indosat
- internet
- Internet koneksi
- Investasi
- islam
- istri Bos
- Jam
- Janda Narsis
- Java
- Jilbab
- JNE
- Jokowi
- Jual istri
- kaisar
- Kakak Ipar
- Kamus
- Keajaiban
- Kecanduan Pria
- Konser
- Lagu
- Laptop
- Lenovo
- Libertyreserve.com
- Links Important
- Lubang buaya
- Makanan
- mama teman
- Manusia
- Masjid
- Matrix Script Hyip
- Mbak ana
- Merawat Penis
- mertua
- Mesum Luna Maya
- MetaTrader4
- Mie Instan Haram
- Misteri
- Mobil
- Modem
- Montok
- Montok Ah
- Nafsuku
- Nawala
- NAZI
- Netbook ACER Aspire One D255 - Win7
- Netbook Aspire One D255
- Netbook Asus Eee PC 1005PX
- Netbook Asus Eee PC 1015P Black
- Netbook ASUS Eee PC 1015P WIN 7
- Netbook ASUS Eee PC T101MT
- Netbook AXIOO PICO DHN618 XP Home
- Netbook AXIOO PICO PJM615
- Netbook ELEVO Hornet A10116-280-3G
- Netbook FORSA POSHBOOK G
- Netbook NOKIA BOOKLET 3G-RX75
- Netbook TOSHIBA NB305-A101 Blue
- Netbook TOSHIBA NB305-A108
- Neversay ASHYIP
- Ngentot istri
- NOKIA 5800 Xpress Music
- NOKIA E72
- NOKIA N900
- Notebook
- Notebook ACER Aspire 4745G-5462G64Mn Win7
- Notebook ACER Aspire 4820TG-5464G64Mnss Timeline X
- Notebook ACER Aspire 5738PG-874G50M Touch
- Notebook ACER Aspire AS5943G-744G64Mn Win7
- Notebook ACER Aspire Timeline 3820TG-5464G64Mn
- Notebook ACER TravelMate 6293-872G32Mn with 3G
- Notebook ACER TravelMate 8371-944G50n
- Notebook APPLE MacBook Air MC233ZP/A
- Notebook APPLE MacBook Air MC234ZP/A
- Notebook APPLE MacBook Pro MB985ZP/A
- Notebook APPLE MacBook Pro MC118ZP/A
- Notebook BYON ALVERSTONE M7451 G/M T4200
- Notebook BYON ALVERSTONE M8141 S/S T4200
- Notebook BYON Castilo S8530 N/M P8400
- Notebook BYON QUEVA W5211 G/SR T8300
- Notebook BYON QUEVA W5231 G/SR P8600
- Notebook FUJITSU LifeBook LH520
- Notebook FUJITSU LifeBook LH530
- Notebook FUJITSU LifeBook LH700 - Pink / White
- Notebook FUJITSU LifeBook SH560e
- Notebook GIGABYTE BOOKTOP M1022
- Notebook Gigabyte Touch Note T1028X
- Notebook HP COMPAQ Presario CQ42-254TU -
- Notebook HP Pavilion dv3-2314TX Black
- Notebook HP Presario CQ42-102TU
- Notebook HP ProBook 4320s BLACK
- Notebook HP ProBook 4420s
- Notebook HP ProBook 5310m Notebook PC
- Notebook Notebook HP Compaq Presario CQ42-160TX - Black
- Notebook Notebook HP Presario CQ42-207TU
- Notebook Noteboook TOSHIBA Satellite L645-1044XR - RED Win7
- Notebook SAMSUNG R480
- Notebook SONY Vaio CW21 WHITE
- Notebook SONY Vaio EB21EG
- Notebook SONY Vaio VPC-F115-FG
- Notebook SONY Vaio VPCEA15FG
- Notebook SONY Vaio VPCS116FG
- Notebook TOSHIBA Satellite A665-10033D
- Notebook TOSHIBA Satellite C640-1010U
- Notebook Toshiba Satellite E205-S1904
- Notebook TOSHIBA Satellite L645-1043UB - Brown
- Notebook TOSHIBA Satellite M645-1010X
- Notebook TOSHIBA Satellite U505-CoreI3 Red
- Oral Sex
- Orgasme
- Pacar Kakak
- Padat Berisi
- Panti Pijat
- Party sex
- Pasutri Swinger
- Paypal
- PC
- PDA
- PDA be Touch E101
- PDA neo Touch S200
- PDA Tempo X960
- PDA ACER Liquid E
- Pembantu
- Pendaftaran
- Pendidikan
- Pengiriman
- Penipuan
- Perawan
- Perkosaan
- Pernikahan
- Peronda Malam
- Perusahaan
- Pesta sex
- Pijat plus
- Prajurit
- Printer CANON PIXMA IX7000 - A3 Printer
- Printer HP Officejet 7000 Wide Format Printer A3
- Printer Printer Canon Pixma iP3680
- Projector SHARP XR32XL LCD
- Projector ACER Projector X1130P
- Projector BenQ MP512ST LCD
- Projector BenQ MP522ST
- Projector BenQ MP525
- Projector BenQ MP624
- Projector SONY VPL-DX11
- Projector SONY VPL-DX15
- Projector SONY VPL-EX130
- Projector SONY VPL-MX20
- Proxy
- Proyektor
- PTC Script
- PTP Script
- Putriku
- qur'an
- Qurban
- Ramalan
- Randomizer LR
- Rani
- Ratih Namaku...
- Rebate
- Revenue Sharing Script
- sejarah
- Sekolah
- sekolahan
- Seks Bertiga
- seks Guru
- Seks Vani
- SEO
- Seorang Guru
- Sepupuku
- Sex
- sex dengan mama
- SMS Gratis
- Sony
- Sopir Pribadi
- Spyware
- Strategi Trading
- Stress
- Suamiku
- Sulap
- Suster Keramas
- Swinger
- Syahrini Bugil
- Symbian
- Tablet PC
- tante
- tante 35 tahun
- Tante Bella
- tante Cantik
- Tante dan om
- Tante Eva
- Tante Ida
- tante ken
- Tante Linda yang sexy
- Tante Maya
- Tante Mira
- Tante Ninik Yang Hot
- Tante Nita
- Tante Ratna
- Tante Vera
- Tanteku
- Teknologi
- Telkom
- Telkomsel
- Teman
- Teroris
- Tetanggaku
- TIKI Online
- Tobat
- Togel Online
- Toshiba
- Trading
- Travel
- uang
- Ulang Tahun
- Vacation
- Video Conferencing
- Video Streaming
- Virus
- VOIP
- Waktu
- wanita
- warnet
- Web Design
- Web Development
- Web Hosting
- website
- Website Traffic
- Wedding
- Widget
- Windows
- Wine
- Wirausaha
- wisata
- Withdrawal
- Women
- Writing Tips
- Yeni
- Youtube.com
0 comments:
Post a Comment