virus

The 5 best free antispyware tools

Today, security is one of the most important points to consider when using a computer, and any software that we can use in this battle is welcome.

In this sense, the antispyware software are as important as an antivirus, as they serve as a barrier to control pests circulating on the internet. If you do not have much experience with internet yet, or not get used to analyze the pages you visit, it is good to have an anti-spyware installed on your PC.

Antispyware best tools

The antispyware apps basically are used to combat spyware, adware, keyloggers among other spyware. Here are a list of the best free antispyware:

SUPERAntiSpyware

Antispyware best tools

Although this program is one of the most recent, has already earned a reputation based on its excellent safety qualities, achieving by this way 55 million users. The program scans the system deeply, it is fast, and runs in real time. If we are looking to use Antispyware, we should not hesitate to give it a try.

Download Super Antispyware Now!

Windows Defender

Antispyware best tools

Protection provided by Microsoft to protect your computer against spyware and other malicious software that can be installed on your system. It maintains the security of your system through a deep analysis of the installed files, periodic search throughout the system, continuous protection, automatic updates, etc. It has a utility installation and uninstallation.

Note that in the latest versions of Windows, Defender comes installed by default.

Spybot Search & Destroy

Antispyware best tools

Spybot is a very practical tool that removes all kinds of spyware. Removes various types of spyware from your system, as spybots, keyloggers, and adware. It is considered superior to Ad-Aware, one of its direct competitors, since it detects a greater number of spywares, it is updated much more frequently, besides having several tools, including the option to immunize your system by blocking some spywares before they are installed.

Download Spybot & Destroy Now!

Ad-Aware Free

Antispyware best tools

Ad-Aware, now has its new version, more powerful and efficient in protecting your computer! This tool works on the detection and removal of spyware and the like.

Perform a full scan of your system in search of some specific virtual spywares, especially those files illegally inserted into shareware programs to monitor and chart a commercial user profile. Where do you think they come many of those annoying commercial e-mails?

Download Ad-Aware Now!

HiJackThis

Antispyware best tools

HiJackThis is an auxiliary tool for removing any spyware on your computer. It is constantly updated to remove the new spywares that may come to appear. The program makes a system scan, showing a complete list of active processes, applications running next to Internet Explorer, helpers and hooks.

Download HiJackThis Now!

What is a firewall? How it works?

As we know, every computer connected to the Internet, or any other computer network, be they home networks or business networks, is likely to be the victim of an attack by a hacker.

The methodology generally used by the hacker is rake the network, sending data packets randomly in search of a online computer, and then look for a “hole” in the system security, which used to access the data that there is found.

What is a firewall

This threat is even greater if the computer is permanently connected to the Internet. The reasons are several:

  • The target PC can be connected without being constantly monitored
  • The target PC is generally connected using broadband
  • The target PC does not change (or very little) the IP address

Therefore, it is necessary that business networks and internet users that have a cable or DSL connection, protect the system from intrusions by installing a protection device. At this point comes in action the Firewall.

What is a firewall

What is a firewall?

A firewall basically is a system that protects a computer or computer network from intrusions coming from a third network, specifically from Internet.

The firewall is a system that allows filtering data packets that walk the network. It is a “narrow bridge” that filters at least traffic between internal and external network.

A firewall can be a program (software) or computer (hardware) that acts as an intermediary between the local network (or local computer) and one or more external networks.

Operating a Firewall system

A firewall system contains a set of predefined rules that allow:

  • Authorize a connection (allow)
  • Lock a connection (deny)
  • Redirect a connection request without informing the issuer (drop)

What is a firewall

All these rules can install a filtration method that depends from the security policy adopted by the organization. Two types of security policies that allow commonly distinguished:

  • Allow communications only explicitly authorized: “Everything that is not explicitly authorized is prohibited”.
  • Prevent any communication was explicitly prohibited.

The first method is the safest, but it requires a precise definition of the communication needs of the entire network.

What is a firewall

If you liked this page, you can share…

The most famous viruses in history

From the massification of computers, whose biggest boom began almost three decades ago with the arrival of a PC to every home and even the invasion of internet cafes, computer viruses have had free rein to access devices, and in many cases have come to completely destroy large server systems.

Undoubtedly, the threat of the virus spread in a spectacular way from the great mass of computers as well as Internet, because through this means many people use free access to introduce malware on computers, at the innocence of users who surf the web or download content from websites and p2p clients.

Virus history

It is noteworthy that a computer virus is nothing but a malicious software that has been designed to be able to run automatically and auto replicate. While it is considered that since the sixties there is the presence of malware, the fact is that the term “computer virus” was coined in 1983 by Fred Cohen.

In the history of computing, over the years there have been an immense amount of virus, it would be impossible to try to list them all, but some of this malware stood out from the rest, having a significant impact and reputation, based usually on its destructive power.

In this special report we will review computer viruses most famous in history, which often have wreaked havoc not only on home PCs but also on servers that suffered the loss of their information, causing disorders worldwide.

Core War: The pioneer of malware

Actually, Core War was not a computer virus, but rather a game which spread through one of the first software with malicious features, that affecting the computer memory and could self replicate.

This game was developed by a group of programmers from the company Bell Computer, who in the 60s created a simple application that competed with other programs running on a computer in order to gain absolute control of memory of the team.

Virus history

Thus, Core War became the first program able to achieve self-replicate, thus causing problems in the execution of other applications. That is why, usually considered one of the forerunners of the computer virus in history of computing.

Creeper: The first virus of history

Although surely Core War ushered in the era of computer viruses, the fact is that the famous Creeper was the first virus that included the typical characteristics of a genuine malware.

Creeper was created by Bob Thomas in 1971, and was specially written to attack the Tenex operating system. When Creeper reached a computer, usually through the nodes of the ARPANET, the malware it was self-executing and began to show the following message: “I’m the creeper, catch me if you can!”

Virus history

Reaper: The first antivirus

After several ravages achieved by Creeper, which left several computers in temporary disuse as a way to end this malware, came another virus called Reaper, which is spread through the network for infected machines Creeper to remove.

Thus, the history of computing and computer witnessed the birth of the first antivirus, because despite being designed with characteristics of malware, Reaper ultimately fulfilled a function of antidote to the spread of Creeper.

Viruses in the 80’s

Continuing the story of computer viruses, as mentioned, in the eighties came the real furor over these malicious software that spreading PC to PC, creating different problems in the functioning of the devices that were infected.

It was in 1985 when they began to appear the first Trojan horses or Trojans, that were camouflaged under an image enhancement program graphics called EGABTR, and in another famous game called NUKE-LA.

Over the months, the virus began to spread in the computer universe with increasing speed, also these increasingly complex.

In this sense, the called Brain virus was the first virus that had the power to cause major infections at the time, which began circulating in 1986, and by 1987 he had managed to spread throughout the world.

Brain: The first mass virus

In 1986 began circulating the Brain virus, considered as the first mass computer virus from the history. This virus had been written for MS-DOS with the purpose of attack the system and was fully compatible with IBM PC.

It was created by a group of hometown friends in the city of Lahore, Pakistan, who were responsible for selling distribute copies of the diskettes inserted in pirated commercial software, including the popular Lotus, SuperCalc and WordStar were.

Thus, Brain quickly came to the United States, where more than 20,000 computers were infected within months. The arrival of Brain served to creating more sophisticated malware, not only for their propagation methods but also for its attack methodology.

Virus history

When Brain reaches to a computer, the malware was self-executing and began to infect the boot sector for the disk in the computer BIOS. To avoid being identified, he was hid intercepting and modifying all orders that ran the operating system for virus detection, responding with values indicated that the PC was not infected. Many users do not understand why your computer is not working normally, since apparently they had not been infected.

Such was the popularity achieved this malware, that the Brain programming code was altered countless times by different programmers, thus giving rise to the birth of countless versions of this virus.

The phenomenon became really dangerous when the virus attacked the email systems of IBM Company, after which the Center for Research Thomas J. Watson, in Yorktown Heights, NY, began working in the field of virus.

More viruses and Trojan horses

In the eighties coexisted a lot of virus producing greater or minor damage to computers that managed to infect. Among the most famous cases, we can mention the Jerusalem virus, created by the terrorist sector in Palestine in 1988.

In 1987 the first massive infection of Macintosh computer, infected through the virus called MacMag, also known as Peace occurs. Another famous malware was known as Friday the 13th, followed by malware such as Stone and Dark Avenger.

Virus history

By the late eighties, they had already been detected in the world an amount of virus exceeding 100, which was considered an epidemic, requiring appropriate measures to prevent the advance of these malicious code programs.

Therein lies precisely the fact that today viruses have become one of the main reasons for the loss of information on computers and portable devices.

Melissa: The office suite virus

Continuing the retrospective in the history of computer viruses most famous in history, in March 1999 made its debut the called Melissa virus, who eventually infected more than 100,000 computers in just three days, achieving a new record in as for spreading malware.

Basically, Melissa was a malware virus belonging to the macro type, which are characterized by concealing the malicious source code within the macro in a document.

Thus, Melissa managed to spread through text documents created in Microsoft Word or spreadsheets of Microsoft Excel.

Created by David L. Smith, for its transmission the virus was hidden inside a document that should be read with applications were part of the Microsoft Office suite, which promised to hold a countless passwords to enter a long list of payment pages erotic websites.

Virus history

Each time a user opened the document containing Melissa, the virus could infect the document template default office suite, and from there all files created with the suite contained the macro with the virus code.

It could be said that the absolute success of Melissa it lies in its extreme simplicity, capable of replication and infection method, you should also curiosity of users.

I Love You: Love worm in email

When the nineties left us, precisely in the month of May 2000, it occurred massive computer infection that affected more than 50 million PCs worldwide, causing losses of about 5.500 billion dollars.

The virus that caused such damage was called I Love You, and was created by a Filipino hacker who called himself “Spyder”, who had designed a simple worm written in VBScript language.

I Love You was spread via email. In different parts of the world, users received an email, the sender was known to the receiver of the message, which bore the subject line “ILOVEYOU”.

The email included an attachment with VBScript format entitled “LOVE-LETTER-FOR-YOU.TXT.vbs”, and of course a message in which he was asked the recipient to read the accompanying letter of love.

Virus history

When the user running the script, the virus began to carry out its task, spreading through the forwarded message to all contacts belonging to the user’s address book messages, using the email address.

The method of spread of this virus was through a Trojan designed to destroy all files with extension doc, vbs, vbe, js, jse, css, wsh, sct, hta, jpg and jpeg that were stored on infected computers, replacing these documents by a copy of the script.

I Love You became an epidemic, even in just one week achieve infect the Pentagon, the CIA and the British parliament.

Nimda: The alleged al Qaeda attack

Continuing with the development of the history of the most famous virus in the computer world, we cannot fail to mention the famous Nimda, which actually was the “Admin” word written backwards, and that spread in September 2001 creating a real paranoia worldwide.

A few minutes of initial distribution through Internet, Nimda became in one of the virus more spread of the story, as it managed to infect more than half a million computers in a span of just 12 hours.

Virus history

Nimda: Detection Report

His virulent attack and how they spread caused panic in a large portion of the population, as had spread the rumor that it was a worm distributed by terrorists belonging to al Qaeda group. Nimba used different methods of infection, hence the rapid and voracious spread from computer to computer.

The first technique was through sending a file entitled readme.exe that spread through infected emails and mail clients using the user’s address book.

In addition it produced a buffer overflow, in order to infect web servers working with the Microsoft IIS platform using shared network resources from the infected computer.

Within the web servers, Nimba was responsible for modifying files with html, htm and asp extension, which added them to a malicious JavaScript code that downloaded and executed the worm on computers of customers.

Also it takes advantage of damage caused by other viruses, such as Code Red II and Sadmind that created vulnerability in the access of PCs, leading to the entry of Nimba.

Between the period of 2003 and 2004 they spread massively three similar types of viruses called Blaster, Sasser and Sober, who managed to increase profits computer technical services of those years.

Blaster virus

Blaster, also known as Lovsan, appeared in 2003 causing that hundreds of thousands of users will face the disadvantage that their computers are automatically turned off after a few seconds of being switched on.

For propagation, Blaster used the vulnerability presented by the service DCOM RPC from Windows OS, but after a few days of arriving, the computer worm was offset by a new malware called Welchia, which actually acted as antivirus eliminating Blaster infested computers.

Virus history

Sober virus

Meanwhile, Sober appeared a few months later, being a really much more dangerous threat than its predecessor, and also several variants of this malware, which came to harm until well into 2005.

Some versions of this virus was responsible for disabling the firewall and antivirus that used the user, and then gather e-mail addresses, to which were sent spam messages, in addition to using infected computers in networks bots.

Sasser virus

The third case was called Sasser, who arrived in 2004, and like Blaster, was takes advantage of a Windows operating system vulnerability to carry out their damage and spread.

Specifically, Sasser used LSASS, acronym Subsystem Local Security Authority of Windows, causing a buffer overflow in the executable LSASS. With this, the malware achieve that the operating system automatically stopped after some time to start working.

The spread of Sasser caused immense damage and incalculable losses, as reached not only personal computers, but also infected hospitals, banks, news agencies, companies air and ground travel, universities, and others systems, achieving for a few days that some factories temporarily closed, canceled trips and even patients moved to other health facilities.

Conficker

Another virus that gained great popularity in recent years was the so-called Conficker, which was detected in late 2008 and today still continues to sow their malicious code to a large number of computers in the world, as they have created countless malware versions based in this virus.

Conficker spreads through the generation of a buffer overflow in a Microsoft Wndows Server operating system service, disabling important services such as Windows Automatic Update, Windows Security Center, Windows Defender and Windows Error Reporting.

After achieving these objectives, the virus contacts a server, which provides instructions to replicate, collect personal information or download other malwares. Conficker is able to bind to key processes in running Windows, such as explorer.exe, svchost.exe and services.exe.

Virus history

Conficker and almost all its versions, also works by infecting removable devices, such as USB flash drives, memory cards and others, as well as those teams working with shared resources without safety devices.

This virus in its first version was very difficult to eradicate, because once your computer was infected with the worm, simultaneously all automatic Windows updates and security applications known as antivirus that were installed on the PC were disabled affected.

In addition, it prevented users access to the official websites of antivirus distribution and eliminated the restore points system, making it impossible to install the necessary solutions to eliminate the virus.

Conclusión

The damage that viruses occur in the computer equipment does not end at this point, and will surely continue in the future, increasingly sophisticated and harmful developments will generate greater problems, so the leading software development companies antivirus work constantly to find the answers to the drawbacks of current threats.

In this line, we can cite the vulnerability that suffers one of the most used operating systems in the world: Windows 7, which according to computer security company Sophos is affected by 8 out of 10 virus of the most popular today.

Virus history

Also consider that Windows 10 is the new target of hackers around the world, so it is advisable to always use a reliable antivirus, regularly updated, and that gives us the assurance that our team is well protected.

If you liked this page, you can share…

How to know if your computer has a virus?

If we do the questions below in the article, and the responses to them all are a resounding YES, then it is time to take the tools and get to work, because surely we will have to eliminate some viruses.

How to know if your computer has a virus?

Your computer is too slow?

A simple and common symptom of a virus in our system it is that the computer becomes much slower than usual. However, there may be other reasons for low performance, including a hard drive that needs to be fragmented, a computer that needs more memory (RAM), or the existence of spyware or adware.

Unexpected messages appear or apps start automatically?

Some types of viruses can cause damage to Windows or in others apps. The results of this damage might include messages shown unexpectedly, apps that start automatically, or the sudden closure of windows we have open.

The modem or hard disk are working more than necessary?

An e-mail virus works by sending many copies by e-mail. An indicator that something bad happens is that the activity light on the broadband modem is constantly lit or flashing intensely all the time.

Another indicator is that the hard drive of the computer constantly working, we can confirm through the sound it produces, or the LED indicator in the cabinet. These symptoms do not always represent the presence of a virus, but may indicate a virus infection combined with other problems.

How to know if your computer has a virus?

To verify no virus, examine the computer with an antivirus program. New viruses appear daily, therefore it is important to keep constantly updated antivirus.

Signs that are positively infected with a virus

Your computer is not the same? Performance presents different problems and appear strange messages? These, surely, are the signs of one of the many infections of the endless threats present when surfing the Internet.

In addition to a antivirus software, you need to have knowledge about the symptoms that cause malware on the computer to identify problems and react faster and avoid greater evils.

There are certain behaviors that are normally associated to virus infected computers, these are:

  1. The computer “talks”

There are many types of pop-ups, which indicate falsely that we are infected with viruses or we are too vulnerable, so we need to download some software, which generally includes more virus.

If we receive this type of pop-up messages, it’s likely that we are infected with “Rogueware” malware or other crap.

  1. Slowness

An computer slow performance can be caused by many things, including infection by viruses. The threats such as viruses, worms, and trojans among others, perform tasks consuming many resources, causing the system to run slower than usual.

How to know if your computer has a virus?

  1. The applications do not start

When one or more applications do not respond, or stop working, it is obvious that something is not working correctly. There are certain malwares that directly attack specific applications or programs, and preventing them from running correctly.

  1. Internet is slow or not connecting

The loss of Internet connectivity is another common symptom of virus infection, but can also be a server problem, the modem or router. When the connection slows down, chances are that a malware are connecting a URL, or opening separate connection sessions, reducing band width available, Internet thus becomes impossible to navigate.

  1. Browser pages or windows opens without we have asked

This is another very common sign of infection. Many threats are designed to redirect certain websites against the user’s wishes. These pages can be imitations of legal pages to try to deceive.

  1. Personal files disappear

This type of situation is really worrying and horrific. There are still some threats designed to delete or encrypt information, or move documents from one place to another.

  1. The antivirus software disappears and the firewall is disabled

This is another typical characteristic of many threats, and involves disable installed security systems such as antivirus, firewall, etc. If a software is uninstalled, it may be due to a specific fault, but if it comes to the security systems of the computer, are unmistakable signs of virus infection.

How to know if your computer has a virus?

  1. Changing language

If the language of certain applications and programs change, or the screen moves, or desktop shortcuts disappear, it is possible that the system is infected.

  1. The Library (which stores programs, documents or games) disappears

If this happens, it is more than an indication that the computer is infected, but can also be caused by incomplete or incorrect installation of some programs.

  1. The computer went crazy

If the computer starts acting on their own, send e-mails, opens sessions or run applications without our permission, it is a sign that is infected with some malware.

What is antivirus?

The antivirus software is a program that helps protect your computer against most viruses, worms, trojans and other unwanted invaders that can infect your computer.

Among the major damage that can cause these programs are: loss of microprocessor performance, file deletion, data corruption, exposed confidential information to unauthorized persons and even uninstalling operating system, among other serious problems

What is a Virus

Normally, the antivirus software monitors virus activity in real time and performs periodic checks, or also according to the user’s request, seeking to detect and then terminate or remove computer viruses.

Current antivirus have specific vaccines to tens of thousands of known virtual pests, and offer the ability to detect any abnormality before it becomes a problem. To do this, you use the aforementioned “Monitor”, which allows detect and remove viruses, worms and trojans before they infect your system.

These programs identify the virus thanks to their “signatures”, code patterns that are identifiable by antivirus software. They can also identify viruses due to unexpected behavior or unauthorized access to the system or your documents.

What is a Virus

It is very important to remember the antivirus should be updated regularly, since every day new viruses are discovered, and the products can quickly become obsolete. Some antivirus software can be configured to update automatically. In this case, we recommend that this option is enabled.

Antivirus. Advantages and types

The antivirus software is one of the basic points of a personal security system, alongside firewalls and spyware detectors. As with other categories of software, it is possible to find good free antivirus, and good paid antivirus. Typically, this products monitors virus activity in real time and performs a regular check, or according to user needs.

Besides having one of those programs, you may want to use an online antivirus, which it is not necessary to install on the PC. It is useful in the case of already having suffered an infection, because some viruses and malicious programs prevent the proper functioning of the antivirus and continue to act after a complete check of the system.

What is a Virus

The online antivirus can also be useful when you need to use unknown or suspect systems, such as computers in Internet cafes. Another advantage of online antivirus is that they are always up to date, because they are hosted on the servers of the companies that maintain them.

Most effective antivirus

Over the years, many antivirus programs have appeared on the market, some effective, others less so. In this sense, one of the most popular antivirus software is AVG Antivirus, with nearly 100 million users worldwide, and the famous NOD32, another classic.

AVG Antivirus

What is a Virus

It is also necessary to highlight the qualities of Avast! Antivirus, perhaps one of the most effective on the market.

AVG Antivirus Free Download

Avast! Antivirus

What is a Virus

This is just a small list, and it is the user who must ultimately evaluate the effectiveness of its antivirus software with his own experience.

Avast! Antivirus Free Download