Question:

How can I protect myself from viruses and Trojan horse programs?

Computer Security and Trojan Horse Programs

Email security precautions are one of your most important lines of defense. If an executable file shows up unexpectedly attached to an E-mail, you should delete it as a standard computer security measure unless you can positively verify what it is, who it came from, and why it was sent to you.

Computer Viruses

The outbreak of the Melissa virus was a vivid demonstration of the need to be extremely careful about email security when you receive E-mail with attached files or documents. Other than web surfing, careless email security is the easiest way for you to compromise your computer security. Just because an E-mail appears to come from someone you trust, this does NOT mean the file is safe or that the supposed sender had anything to do with it.

Computer Viruses

Any unknown file is a potential threat to your information security or data security. Treat any file attachments that might contain executable code as carefully as you would any other new files: save the attachment to disk and then check it with up-to-date internet security software before opening the file.

Computer Security and Trojan Horse Programs

Trojan horse programs can be spread inside practically anything people find desirable, such as a free game, movie, song, etc. Firewalls and internet filters include Trojan horse blockers. Victims typically download the Trojan horse from a WWW or FTP site or got it via peer-to-peer file exchange or just carelessly opening some email attachment. Trojans usually do their damage silently. The first sign of trouble is often when others tell you that you are attacking them or trying to infect them.

Internet Safety Frequently Asked Questions

What is an internet filter?

Can I filter internet content about drugs and alcohol?

Can I filter content about hate and criminal behavior?

What are some of the filtering criteria offered by internet filtering?

Can internet filtering block good or informational websites?

What can an internet report show me?

What are features I should look for in a spam filter?

Why should I use a porn blocker?

Why is a porn blocker so important?

How did computer hacking start?

What can you tell me about hackers?

What are computer viruses and how do they work?

What is a Trojan Horse program and how does it work?

How can I protect myself from viruses and Trojan horse programs?

How can I protect my computer's data?

What should I do if I think my computer is infected by a virus?

How can a firewall protect my computer?

How do I stop unauthorized access to my computer?

How have computer viruses evolved?

How do I make sure my password is secure?

What are computer viruses and how do they work?

How can I protect myself from viruses and Trojan horse programs?

What organizations exist to help combat computer crime?

How can a firewall protect my computer?

How can I protect myself from viruses and Trojan horse programs?

How can a firewall protect my computer?

How did computer hacking start?

What organizations exist to help combat computer crime?

How can I protect myself from viruses and Trojan horse programs?

How have computer viruses evolved?

What can you tell me about hackers?

How do I get rid of pop-ups?

How can I keep spam out of my mailbox?

What anti-spam laws exist?

What is spyware and how do I stop it?

How do I get rid of pop-ups?

How can a firewall protect my computer?





Not finding the advice and tips you need on this Internet Safety Tip Site? Request a Tip Now!


Guru Spotlight
Susan Sayour