Meaning the term virus is considered closely associated with the following code that is placed in a program that causes pengkopian inserted himself to one or more other programs. Program menginfeksi other programs to modify the programs. Modify the program including inserting copies of the virus program can then menginfeksi other programs. Besides only propagasi, one of this malicious programs usually perform the function that is not desired.
Like biological viruses, computer virus found on the instruction code that can make perfect copies, such as himself. When the infected computer related (contact) with software that has not been infected, the virus copies to enter the new program. Infection can spread from one computer to another through the use of this disk, or send the program through the network. In the network environment, the ability to access applications and services computer facility is perfect spread of the virus.
A virus can be routine-a routine that diisikan by virus programmers. Routine routine-this could include the destruction or just display a message
Handling virus
To prevent the occurrence of virus attack, antivirus software is usually installed in the operating system such as the Mine did, AVG, PC-Cillin, Norton Symantec, and others. But the use of anti-virus is not the only way to avoid virus attacks. We need to know that the virus constantly growing both in terms of attack and the damage caused. All bekerjanya characteristics of the virus outside of computer users. Therefore, some of the things that computer users should be made in an effort to prevent virus attacks, among others.
Next steps to be implemented so that the system can work normally again.
Like biological viruses, computer virus found on the instruction code that can make perfect copies, such as himself. When the infected computer related (contact) with software that has not been infected, the virus copies to enter the new program. Infection can spread from one computer to another through the use of this disk, or send the program through the network. In the network environment, the ability to access applications and services computer facility is perfect spread of the virus.
A virus can be routine-a routine that diisikan by virus programmers. Routine routine-this could include the destruction or just display a message
Handling virus
To prevent the occurrence of virus attack, antivirus software is usually installed in the operating system such as the Mine did, AVG, PC-Cillin, Norton Symantec, and others. But the use of anti-virus is not the only way to avoid virus attacks. We need to know that the virus constantly growing both in terms of attack and the damage caused. All bekerjanya characteristics of the virus outside of computer users. Therefore, some of the things that computer users should be made in an effort to prevent virus attacks, among others.
- To update the antivirus through the Internet or from a package file that is distributed. Usually antivirus update with ability to provide programs and update the database because finding a new virus. If the antivirus is not updated, the antivirus is able to prevent the attack of virus-virus generation old, virus-virus sehinngga new generation will be easy to do the distribution. Update process is better done as often as possible, but if it does not enable the update is done in most long range within 2 weeks.
- Be careful in the transformation of the file either through floppy disk, hard disk, flash disk, network or the other. Before Peng-an-copy files, scanning should be done to the files concerned to ensure that the file will not copy in-bervirus.
- If the computer connected to the network should be as individual protective firewall. When this virus-the virus usually attacks the network through the TCP / IP or peer-to-peer. In addition the firewall can also provide the password on the folders that are shared. Restriction policy implementation of centralized network systems will create a more secure.
- Use e-mail client like Microsoft Outlook, Mozilla Thunderbird, Eudora, and others need to pay attention to each incoming email into the inbox. The spread of the virus via email, including methods that often occur. Inclusion on an email attachment to provide opportunities for effective penetration of the virus in the operating system.
- Surfing the internet memeliki risk is high enough to attack the virus. Many websites that install hidden applications so that when the website is accessible to the application will perform pentarasi virus in the operating system to the unwitting user. Use of web browser software system that has security as a popup blocker is recommended.
- Microsoft Windows provide a software-software that works to improve the weakness of the system. To update the operating system security system can reduce the risk of virus dissemination.
Next steps to be implemented so that the system can work normally again.
- When the system is infected, do the backup data.
- Scan a hard drive infected with a computer virus-free.
- If damage occurs after scanning the system, so the system can not work, do the re-installation.
- Scan the data in the backup computer with a virus-free.
- Install antivirus program or the latest update.
- Update antivirus database program.
- Update the system security operating system.
Tidak ada komentar:
Posting Komentar