Question:

How can I protect myself from viruses and Trojan horse programs?

Computer Virus Hoaxes

Hoax warnings are typically scare alerts started by malicious people - and passed on by innocent users who think they are helping internet security by spreading the warning. Do not forward hoax messages. There are cases where email security systems have collapsed after dozens of users forwarded a false alert to everybody in the company. Corporate users can get rid of the hoax problem by simply setting a strict company computer securityguideline: End users must not forward virus alarms. Ever. It's not the job of an end user anyway. If such message is received, end users could forward it to the IT department but not to anyone else. Home users should become familiar with one of several legitimate web sites that catalog and track virus hoaxes.

Viruses and Online Chat

Good computer security means being extremely careful about accepting programs or other files during on-line chat sessions: this seems to be one of the more common means that people wind up with virus or Trojan horse information security problems. And if any other family members (especially younger ones) use the computer, make sure they know not to accept any files while using chat.

Chain Emails and Computer Viruses

Viruses, Trojans, exploits and other malicious software are only part of the computer security perils of online life. Chain e-mail and Pyramid posts on Usenet are a scam, and most often, they are a crime. Any scheme that involves real mail at any point can be illegal. If you forward one, you will be blasted with hundreds of angry messages in reply. But if you see one, remember that you can't really be sure who sent it.

Trojan Horse Virus

Anti-virus internet security software isn't very good at detecting Trojan horse programs, so for the sake of your information security be extremely careful about opening binary files and Word/Excel documents from unknown or 'dubious' sources. This includes posts in binary newsgroups, downloads from web/ftp sites that aren't well-known or don't have a good reputation, and executable files unexpectedly received as attachments to E-mail or during an on-line chat session.

Internet Safety Frequently Asked Questions

What is an internet filter?

Can I filter internet content about drugs and alcohol?

Can I filter content about hate and criminal behavior?

What are some of the filtering criteria offered by internet filtering?

Can internet filtering block good or informational websites?

What can an internet report show me?

What are features I should look for in a spam filter?

Why should I use a porn blocker?

Why is a porn blocker so important?

How did computer hacking start?

What can you tell me about hackers?

What are computer viruses and how do they work?

What is a Trojan Horse program and how does it work?

How can I protect myself from viruses and Trojan horse programs?

How can I protect my computer's data?

What should I do if I think my computer is infected by a virus?

How can a firewall protect my computer?

How do I stop unauthorized access to my computer?

How have computer viruses evolved?

How do I make sure my password is secure?

What are computer viruses and how do they work?

How can I protect myself from viruses and Trojan horse programs?

What organizations exist to help combat computer crime?

How can a firewall protect my computer?

How can I protect myself from viruses and Trojan horse programs?

How can a firewall protect my computer?

How did computer hacking start?

What organizations exist to help combat computer crime?

How can I protect myself from viruses and Trojan horse programs?

How have computer viruses evolved?

What can you tell me about hackers?

How do I get rid of pop-ups?

How can I keep spam out of my mailbox?

What anti-spam laws exist?

What is spyware and how do I stop it?

How do I get rid of pop-ups?

How can a firewall protect my computer?





Not finding the advice and tips you need on this Internet Safety Tip Site? Request a Tip Now!


Guru Spotlight
George Sayour