Posts

7 Types of Viruses You Need to Know

Pink White Black Purple Blue Textile Web ScriptsVirus alert, virus alert! There is a basis for being alarmed as a virus could steal your file, delete them, and make use of your email to spread itself to other people’s computer.

Viruses are a type of malicious software and are able to spread through email attachments. Never open an email attachment unless you know who sent it. They could disguise themselves as a friendly greeting card, funny and cute images, audio and video files, but viruses rely on human interaction. Always be careful in downloading anything on the internet. It may seem harmless at first, but it might be unsafe for your computer.

Here are the list of viruses you need to know about and where they usually attack:

  • Boot Sector Virus is an example of the most dangerous. They could affect the master boot record, encrypt or destroy the code. The hard part is that, it is difficult to remove it and a full system format is required. An example of this is Parity Boot.
  • Resident Viruses is a permanent virus that stays in the RAM memory and could cause interruption of the operations that the system has executed. This leads to corrupting files and programs. Examples are CMJ, Mr Klunky, Randex, and Meve.
  • Non-resident Viruses is a kind of virus that does not stay or complete itself from the computer’s memory. Aside from that, it is also a finder module. It can infect files once the module is executed.
  • Multipartite Viruses will spread in multiple ways and distributed via the infected media. It remains in the memory and then slowly moves to the boot sector of the hard drive. They can simultaneously infect both the executable files and the boot sector and then spread quickly. These attacks will make the multipartite viruses very hard to remove. Cleaning the program files will be useless if the virus stays in the boot sector. Once you open your computer, the virus reproduces.
  • Overwrite Viruses is not dangerous to your system, but it can delete the files which it infects. To get rid of this virus, delete the file and its contents. This virus can infect the entire pieces of software and standalone files. It spread itself through email. Notable examples: Trj.Reboot, Trivial.88.D.
  • Direct Action Virus is a file infector and it works by connecting itself to a specific kind of file which is usually .COM or .EXE files. When the file is executed the virus will look for other files in the directory and starts spreading itself. An antivirus program can remove the virus so make sure your antivirus program’s virus definitions are always up to date.
  • Stealth Viruses can trick antivirus software by stopping the request of the operating system. They can hide itself making it hard for some antivirus program to detect them.

These are just a few of the viruses out there waiting to get to your system. The only way to protect ourselves from these viruses is to know about them, where they attack, and know how to get rid of them. You can apply these safety tips. Lastly, find a great antivirus program and always scan your computer for potential threats.

Nine Helpful Links that Will Save Your Life (Part 3)

internet, security, archive

Internet Safety and Security

Do you want to send large files without installing any software?  Is this particular website safe for you to visit? Are you doubtful of this file you just received? Check out the websites I listed below. There is NO need to fill in long registration forms for most of the websites indicated. It will undeniably help you in making your life easier and most importantly, it will save you time.

 

    • Box Oh! – If you are fond of online shopping like me, this website will simplify shipment tracking for you. Whether your package is shipped via USPS, UPS, DHL, or FedEx, it is all identifiable using this easy to use website.
    • Flight Stats – You got your packages covered with Box Oh! How about flights? There is no need to worry. Just provide the airline company together with the flight number and Flight Stats will track the flight for you.
    • Plus Transfer – With Plus Transfer, you can now send massive files easily. The file limit is 5GB of data. You do not need to install anything and you do not have to register as well. Now, that is definitely a plus!

 

      • Jotti’s Malware Scan – An online virus scanner that allows you to scan questionable files. This is going to be your best friend if you get a lot of email attachments. Scan them all first with Jotti’s Malware Scan. They use 18 scanners such as BitDefender, Trend Micro, ESET, Kasperky, and many more. Note that there is a 50MB limit per file, but you can upload 5 files at the same time.
      • Norton’s  Safe Web – Norton is an antivirus software program by Symantec and the company created a website to check if a particular website is safe and secure for users to browse. Just simply paste the link or the Uniform Resource Locator (URL). After, Norton will give you a report on its trustworthiness including its ecommerce safety information in case you will buy an item on that site.
      • Gmail – What is so special with this Gmail link? It will let you sign up to Gmail without your existing Gmail email address. It means you can give out any email address (Yahoo, AOL, etc.) and Gmail will send a verification email if it is really your account.

     

    • Archive.is – This website allows you to capture a webpage. It means that even if the original website gets deleted, goes offline, or for whatever reason, you stored a copy of the page. A unique link will be provided of that particular page and the contents of the page are unchangeable, of course. This is useful when you are monitoring a price change, an item listing, or even a derogatory social media post.
    • Archive.Org – You should not confused this with Archive.is. This is your internet time machine. You can visit old versions of a website. You can use Archive.is to contribute to Archive.org. There are over 294 billion web pages saved here including popular websites like CNN, IMDB, Amazon, Yahoo, and more.
    • Who Is Hosting This? – Discover who is hosting a particular website. Know details about the host, servers, and IP address. They also have an in-depth analysis on the different hosting websites. You can also compare various hosting sites, and even get hosting coupons.

Let’s recap! Part one is about online diagrams, layer-based image editors, and private notes and chat rooms. Part two is about random numbers, timers, and timezone, and eBooks. Lastly, the third part is about internet security, file transfers, and web archives.