Safety Tips in Preventing Malwares

computer cure

Prevent malwares.

With all the different malwares out there, it is easy to get paranoid that your computer is already infected with viruses, that this website is unsafe, or that your email contains a malicious attachments. Refer to this list in order to minimize your risk of getting infected by malwares. Practice safe computing and inform everyone you know to do the same.

  • Be suspicious of email attachments. If you are not expecting an email, most probably, the emails you got are just spam. Do not aimlessly open every email you received. Mostly importantly, do not download email attachments from unknown sources.
  • Verify email messages. Some email messages appear to be from people you know, or to be from services that you currently use. Always check the sender’s email address. For example, if you are using PayPal when transacting online, all emails should be sent via If you received emails from services providers like, or, then, these people are just pretending to be someone from PayPal. Do not engage with these emails especially if it contains attachments.
  • Do not set devices to “auto run”. Whether you are inserting an external storage device, or opening an email attachment, do not set it to auto run. Manually open your storage devices, DVDs, email attachments. Anything that can store a file of any size can be a carrier of a malware.
  • Scan all media devices that is from someone else. Like what I said above, these devices can possibly carry a malicious software. Remember, these softwares are typically small in size. They can definitely fit in any media device that you can think of.
  • Scan all new software before you install it. When you buy a new software, they are usually stored in a DVD, or you can digitally download them. Either way, you should scan any software you wish to install in your computer.
  • Back up your files frequently. Keep important files safe. Preferably, you should have an external media device that is only for important files in case your computer gets infected. Do not just rely on the storage device in your computer. Always have a back up that is in a different location than your computer. You can also store these files online. When files are online, it is also vulnerable to intrusion. Offline back up is better.
  • If you own a Windows PC, it is advisable to install all Microsoft security updates. Update your Windows Defender (Windows 8 and above), and Microsoft Security Essentials (Windows 7). These will provide you real-time protection especially if you are connecting a foreign device to your computer.
  • Make sure that your malware scanners have the most recent virus and spyware definitions. If it is updated, it can detect the latest malwares that will try to invade your computer.

Remember that no security solution offers 100% protection. You have to be cautious when opening a file. Scan ALL the files – not just the program files – in your computer. You can use an online malware scanner and upload every file you receive. Jotti’s Malware Scanner uses 18 different scanners. You can also scan a website using Norton’s Safe Web. If you want to review of the different categories of malwares, you can view it here.

Is It a Virus, a Worm, or a Trojan Horse?

Computer errorWhen our computer goes crazy, we casually say, “My computer is infected by a virus.” Is the correct term for a system infection a virus? Should it be a worm instead? The truth is that a virus, a worm, and a trojan horse are all under the category of what we call a malware. They are all considered malicious software, or otherwise known as malware. A malware is a series of code that is meant to harm, burglarize, and deliver an unauthorized course of action. There are several threats that are considered a malware. The top three malwares are: trojan horses, viruses, and worms.


  • Trojan Horse. If you are familiar with the Ancient Greek story of the city of Troy, you know that they got invaded because of a Trojan Horse. They thought it was a beautiful gift, but in truth, the horse is just a disguise for the soldiers. Like in that classic tale, a trojan horse appears like a useful and beneficial computer program. You will be enticed to install it and once you do, the trojan horse has now access to your computer.
    To avoid it, beware of legitimate-looking computer programs. It may seem useful, but you might endanger your safety and security. Trojan horses proliferate through user interaction. If you are careful with opening email attachment, and installing software, you are secure. Safety tip: Download only from verified sources like the program’s official website, and do not install every fascinating program you see.
  • Virus. A virus is a computer program that is made to modify the way a computer works, without your permission or your knowledge. Almost all viruses are attached to an executable file (anything with a .exe file extension.), and it will make itself part of that file. A virus can execute itself, and it can replicate itself. It can also spread easily as it can travel from one computer to another. Unlike a trojan horse that relies on user interaction, a virus can place its own code in the path of execution of another program. It inserts itself into other files, and it usually does an unapproved action like deleting data, damaging existing programs, or reformatting the hard disk. Other viruses are not designed to do any damage, but simply to annoy displaying a text, video, and an audio message.
  • Worm. A worm is similar to a virus that it can duplicate itself and deal damage to certain files. In contrast to viruses, which call for the propagation of an infected host file, a worm a stand-alone malicious software, and it does not require a host program or human help to disperse. In order to spread, a worm enters a computer through a weakness in the system and takes advantage of file-transport features on a computer, allowing it to travel by itself.

Now, you know the main differences of the top three malwares. You can now use the terms properly. By definition, they may be different, but all these malwares are harmful. Learn to protect your computer by reading these safety tips. Always think before you click!

© 2017. All rights reserved. Phoenix Website Design • Sitemap • (602) 388-8622
20 E Thomas Rd #2200, Phoenix, AZ 85012
Phoenix Web Design


Apache Junction, Avondale, Buckeye, Carefree, Chandler, Chandler Heights, El Mirage, Fountain Hills, Gilbert, Glendale, Goodyear, Litchfield Park, Mesa, New River, Paradise Valley, Peoria, Phoenix, Queen Creek, Scottsdale, Sun City, Sun City Grand, Sun City West, Surprise, Tempe, Tolleson, Wickenburg