Tag Archives: protect
Antivirus Malware and Software (Page 1 of 2)
Warning: most antivirus programs will not protect you against all forms of malignant software (often called “malware”) on their own. Find out how to protect yourself.
Sure, your antivirus software will protect you against viruses. It will probably even do a good job against worms. But what Trojans, exploits, backdoors, spyware and the dozen other nasty software parasites?
Malware and Antivirus Software: a History
The war on computer viruses has led to an arms race between the designers of antivirus software and the designers of viruses (you didn’t think viruses just created themselves did you?). Some years ago, virus designers responded to ever more successful antivirus software by creating the descendents of viruses, worms, which did not infect files but rather installed themselves directly on the hard drive, making them harder to detect.
The arms race has since led to a total of at least eleven distinct types of what is now called malware, a neologism meaning bad (as in malignant rather than shoddy) software. According to Wikipedia, these eleven types of malware are:
1. Virus 2. Worm 3. Wabbit 4. Trojan 5. Backdoor 6. Spyware 7. Exploit 8. Rootkit 9. Key Logger 10. Dialer 11. URL injection
There’s a twelfth kind of malware: adware, which Wikipedia considers simply to be a subset of spyware.
Why Antivirus Software Isn’t Enough for Malware
As you can see, makers of antivirus software have their work cut out for them if they’re going to keep every instance of malware off your system. As a result, antivirus software makers have often had to pick their battles. Adware, whose makers often claim they are doing nothing illegal or even questionable, often gets treated more lightly.
Even when antivirus software makers do come out with a product that fights all twelve or so kinds of malware, responding to each new instance of malware to come on the market isn’t easy. First the malware has to be identified, which means someone’s computer, and probably tens of thousands of computers, will be infected first. Then, the malware has to be dissected. Then a removal program and a filter must both be written. Then the removal program and filter must be tested to make sure they work, and that they don’t interfere with any other functions of the antivirus software or the computer itself. When a fix for the virus is out, it then has to be loaded into an antivirus software update and transmitted to every single computer worldwide that has the antivirus software installed.
The speed with which antivirus software makers are able to deliver updates for newly discovered malware would impress even Santa Claus. Yet there’s still a crucial window of one to a few days between when the new malware has reached a critical mass of thousands of computers, and when the update is released. If your antivirus software is not set to check for updates automatically every hour or so, that window opens even wider.
Antivirus Malware and Software (Page 1 of 2)
Warning: most antivirus programs will not protect you against all forms of malignant software (often called “malware”) on their own. Find out how to protect yourself.
Sure, your antivirus software will protect you against viruses. It will probably even do a good job against worms. But what Trojans, exploits, backdoors, spyware and the dozen other nasty software parasites?
Malware and Antivirus Software: a History
The war on computer viruses has led to an arms race between the designers of antivirus software and the designers of viruses (you didn’t think viruses just created themselves did you?). Some years ago, virus designers responded to ever more successful antivirus software by creating the descendents of viruses, worms, which did not infect files but rather installed themselves directly on the hard drive, making them harder to detect.
The arms race has since led to a total of at least eleven distinct types of what is now called malware, a neologism meaning bad (as in malignant rather than shoddy) software. According to Wikipedia, these eleven types of malware are:
1. Virus 2. Worm 3. Wabbit 4. Trojan 5. Backdoor 6. Spyware 7. Exploit 8. Rootkit 9. Key Logger 10. Dialer 11. URL injection
There’s a twelfth kind of malware: adware, which Wikipedia considers simply to be a subset of spyware.
Why Antivirus Software Isn’t Enough for Malware
As you can see, makers of antivirus software have their work cut out for them if they’re going to keep every instance of malware off your system. As a result, antivirus software makers have often had to pick their battles. Adware, whose makers often claim they are doing nothing illegal or even questionable, often gets treated more lightly.
Even when antivirus software makers do come out with a product that fights all twelve or so kinds of malware, responding to each new instance of malware to come on the market isn’t easy. First the malware has to be identified, which means someone’s computer, and probably tens of thousands of computers, will be infected first. Then, the malware has to be dissected. Then a removal program and a filter must both be written. Then the removal program and filter must be tested to make sure they work, and that they don’t interfere with any other functions of the antivirus software or the computer itself. When a fix for the virus is out, it then has to be loaded into an antivirus software update and transmitted to every single computer worldwide that has the antivirus software installed.
The speed with which antivirus software makers are able to deliver updates for newly discovered malware would impress even Santa Claus. Yet there’s still a crucial window of one to a few days between when the new malware has reached a critical mass of thousands of computers, and when the update is released. If your antivirus software is not set to check for updates automatically every hour or so, that window opens even wider.
How to password protect memory sticks?
If you intend to store confidential files on a memory stick, security should be an important issue for you. Incidents concerning lost memory sticks often occur. A survey in UK reveals that 4,500 memory sticks had been forgotten in people’s pockets as they take their clothes to be washed at the local dry cleaners in 2009. What we should worry about is not the memory sticks, but the vital files contained on them. It could be a disaster to have the important information fall into someones hands, like the health records of more than 80,000 patients contained in the lost unencrypted memory stick in Canada according to CBC news.
For this, you can enhance memory stick security with USB encryption software which allows you to password protect memory sticks to keep your data remain safe even if you misplace or lost them. Some USB encryption software allows you to create a password protected secure area to store your important files and the size of the secure area is decided by you. Anyone who wants to access the data on secure are must have the right password. This can fully ensure the security of your vital data even memory stick is lost or stolen. And it will make no trouble for you because you can easily access to password protected data in any computer even without the encryption software installed.
Since you know USB encryption software can help you, next you just need to get one to start improving security of your memory sticks. A basic Google search is supposed to come back many results on the software options available to you. Select one that suits your needs best. Personally, I’m using Wondershare USB Drive Encryption. It is professionally designed to password protect memory stick and other USB storage media and adopts 256-AES, the highest level protection to keep your data safe. With it, you can also write protect the files on secure area and delete the access to secure area to hide it to get maximum protection for vital file on memory sticks.
Download and install Wondershare USB Drive Encryption and begin to password protect memory sticks following the below step-by-step guidance.
Step 1 & 65306;Plug your memory stick in computer and backup your files on memory stick.
Wondershare USB Drive Encryption will format memory stick automatically during creating a password protected secure area for vital files, so I highly advise you to backup your files on memory stick.
Step 2& 65306;Choose your target memory stick, set size of the secure area according to your needs, and then click Install to go to next step.
Step 3& 65306;Set username and password for your memory stick.
The password should be easy for you to remember because youll get it back when you forget it. And it means that youll lose your protected data on memory stick.
And now you get a password protected memory stick. Youll never worry about data loss after dragging and dropping your data into the secure area on the password protected memory stick.