Tag Archives: files

The 5 Most Common Types of Viruses

Computer viruses are those malicious programs that once they infect your computer, they will start causing mass destruction to your PC. Similar to biological viruses, they can multiply in various ways and develop from one type to another. Since there are hundreds of viruses out there, here are the five basic types of viruses that people are most likely to encounter, in order to make the identifying process easier.

• Trojan Virus
• Worms
• Macro Virus
• Boot Sector Virus
• File Infector Virus

Trojan Virus – This virus appears to be nothing more than an interesting computer program or file of a user who’s interested in collecting audio files. Once this virus enters your computer, it doesn’t reproduce, but instead makes your computer vulnerable to malicious intruders by allowing them to access and read your files. A Trojan horse must be sent by someone or carried by a program or software of some sort. The malicious functionality of a Trojan horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.

Worm – A Worm is a virus program that copies and multiplies itself by using computer networks and security flaws. Worms are more complex than Trojan viruses, I should say, and usually attacks multi-user systems. It can spread over corporate networks via the circulation of emails. Once multiplied, the copied worms scan the network for further escape and will then cause errors on the network.

Macro Virus – This type of virus usually comes as part of a document or spreadsheet, more often found in an email. Many of the current macro viruses are written in this language and attached to Word documents. This capability is powerful, but allows viruses to be written and executed much more easily than by using other methods.

Boot Sector Virus – A virus which attaches itself to the first part of the hard disk that is read by the computer upon start up, which are normally spread by floppy disks. In time, they can spread to other readable disks. Booting problems and start up problems, problems with retrieving data, computer performance instability and the inability to locate hard drives are all issues that may arise due to a boot sector virus infection.

File Infector Virus – As the name indicates, this type of virus was designed to avoid detection by antivirus software by changing itself internally. Upon running a program that has been corrupted by a file infector, the virus copies the malicious code and applies it to other executable applications on the computer. Files that are the most vulnerable to this type of infection have the extensions of EXE. and .COM, though any file is capable of execution can be infected.

How to fight some of these viruses is still completely a puzzle for anti-virus makers. However, knowing a little about your enemies could be an advantage to get vital information on how to defend your computer from those threats. Read on Virus Removal Help – How to Remove Viruses Easily From Your PC? in order to become more familiar with the steps on how to remove the common types of viruses from your computer.

The 5 Most Common Types of Viruses

Computer viruses are those malicious programs that once they infect your computer, they will start causing mass destruction to your PC. Similar to biological viruses, they can multiply in various ways and develop from one type to another. Since there are hundreds of viruses out there, here are the five basic types of viruses that people are most likely to encounter, in order to make the identifying process easier.

• Trojan Virus
• Worms
• Macro Virus
• Boot Sector Virus
• File Infector Virus

Trojan Virus – This virus appears to be nothing more than an interesting computer program or file of a user who’s interested in collecting audio files. Once this virus enters your computer, it doesn’t reproduce, but instead makes your computer vulnerable to malicious intruders by allowing them to access and read your files. A Trojan horse must be sent by someone or carried by a program or software of some sort. The malicious functionality of a Trojan horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.

Worm – A Worm is a virus program that copies and multiplies itself by using computer networks and security flaws. Worms are more complex than Trojan viruses, I should say, and usually attacks multi-user systems. It can spread over corporate networks via the circulation of emails. Once multiplied, the copied worms scan the network for further escape and will then cause errors on the network.

Macro Virus – This type of virus usually comes as part of a document or spreadsheet, more often found in an email. Many of the current macro viruses are written in this language and attached to Word documents. This capability is powerful, but allows viruses to be written and executed much more easily than by using other methods.

Boot Sector Virus – A virus which attaches itself to the first part of the hard disk that is read by the computer upon start up, which are normally spread by floppy disks. In time, they can spread to other readable disks. Booting problems and start up problems, problems with retrieving data, computer performance instability and the inability to locate hard drives are all issues that may arise due to a boot sector virus infection.

File Infector Virus – As the name indicates, this type of virus was designed to avoid detection by antivirus software by changing itself internally. Upon running a program that has been corrupted by a file infector, the virus copies the malicious code and applies it to other executable applications on the computer. Files that are the most vulnerable to this type of infection have the extensions of EXE. and .COM, though any file is capable of execution can be infected.

How to fight some of these viruses is still completely a puzzle for anti-virus makers. However, knowing a little about your enemies could be an advantage to get vital information on how to defend your computer from those threats. Read on Virus Removal Help – How to Remove Viruses Easily From Your PC? in order to become more familiar with the steps on how to remove the common types of viruses from your computer.

How to password protect memory sticks?

If you intend to store confidential files on a memory stick, security should be an important issue for you. Incidents concerning lost memory sticks often occur. A survey in UK reveals that 4,500 memory sticks had been forgotten in people’s pockets as they take their clothes to be washed at the local dry cleaners in 2009. What we should worry about is not the memory sticks, but the vital files contained on them. It could be a disaster to have the important information fall into someone’s hands, like the health records of more than 80,000 patients contained in the lost unencrypted memory stick in Canada according to CBC news.

For this, you can enhance memory stick security with USB encryption software which allows you to password protect memory sticks to keep your data remain safe even if you misplace or lost them. Some USB encryption software allows you to create a password protected secure area to store your important files and the size of the secure area is decided by you. Anyone who wants to access the data on secure are must have the right password. This can fully ensure the security of your vital data even memory stick is lost or stolen. And it will make no trouble for you because you can easily access to password protected data in any computer even without the encryption software installed.

Since you know USB encryption software can help you, next you just need to get one to start improving security of your memory sticks. A basic Google search is supposed to come back many results on the software options available to you. Select one that suits your needs best. Personally, I’m using Wondershare USB Drive Encryption. It is professionally designed to password protect memory stick and other USB storage media and adopts 256-AES, the highest level protection to keep your data safe. With it, you can also write protect the files on secure area and delete the access to secure area to hide it to get maximum protection for vital file on memory sticks.

Download and install Wondershare USB Drive Encryption and begin to password protect memory sticks following the below step-by-step guidance.

Step 1 & 65306;Plug your memory stick in computer and backup your files on memory stick.
Wondershare USB Drive Encryption will format memory stick automatically during creating a password protected secure area for vital files, so I highly advise you to backup your files on memory stick.

Step 2& 65306;Choose your target memory stick, set size of the secure area according to your needs, and then click Install to go to next step.

Step 3& 65306;Set username and password for your memory stick.
The password should be easy for you to remember because you’ll get it back when you forget it. And it means that you’ll lose your protected data on memory stick.

And now you get a password protected memory stick. You’ll never worry about data loss after dragging and dropping your data into the secure area on the password protected memory stick.