Vous êtes sur la page 1sur 9

Ideology of Keeping PC Safe

PC Security Insight by PCKeeper

http://pckeeper.zeobit.com

Ideology of Keeping PC Safe - Security Insight by PCKeeper

Table of Contents
TABLE OF CONTENTS....................................................................................................................... 2 INTRODUCTION................................................................................................................................... 3 THE MOST COMMON PC THREATS............................................................................................... 4 THE VIRUS............................................................................................................................................... 4 TROJANS.................................................................................................................................................. 4 WORMS.................................................................................................................................................... 4 THE ROOTKITS......................................................................................................................................... 4 PHARMING AND PHISHING......................................................................................................................... 5 GOOD SECURITY HABITS................................................................................................................. 6 EMAILS AND EMAIL ATTACHMENTS............................................................................................................ 6 SAFE SURFING.......................................................................................................................................... 6 USE ANTI-MALWARE PROTECTION............................................................................................................. 6 FIREWALLS............................................................................................................................................... 7 ROOTKIT KILLERS.................................................................................................................................... 7 THE IMPORTANCE OF BACKUPS.................................................................................................. 8 CONCLUSION............................................................................................................................................. 8 ABOUT PCKEEPER............................................................................................................................. 9

http://pckeeper.zeobit.com

Ideology of Keeping PC Safe - Security Insight by PCKeeper

Introduction
The terms Computer security or PC security are quite vague terms as such. What they actually give you is only a glimpse of what is otherwise an incredibly diverse field. PC security includes the issues of network as well as Internet security. For majority of the threats, Internet is the safe haven, while in some other cases, a security flaw of some kind in some high-end server hardware may account for their survival. What is important to note here is that in both cases, an average PC user is not in control. In that sense, we can say that protection of a personal computer that you own has a kind of fortress mentality. You would need to do all that is possible to secure your fortress from the dangers existing beyond the fortress walls. You may notice this very mentality being expressed in many terms used by different companies selling PC security software; some examples are blocker, firewall and shield. This whitepaper would take you through different issues that are part of PC security; and by the end of this guide, you would be able to understand what exactly is PC security and what is it that you can do to secure your PC.

http://pckeeper.zeobit.com

Ideology of Keeping PC Safe - Security Insight by PCKeeper

The Most Common PC Threats


The Virus
A Virus, more than often, is spread by a user error; what that means is that it is some kind of action on the user part that triggers a virus into action. For example, when a user opens an infected email attachment, the virus immediately springs into action. Depending on the severity, they can cause mildly annoying effects to some real damage.

Trojans
The difference between a Trojan and Virus is that while a virus aims at running a malicious code on your system, a Trojan purpose is to let a third party access some of your pcs function. They create a backdoor on your system giving 3 rd parties access to your system. Thus Trojans are those culprits that can possibly allow your personal information to be compromised. Trojan can infect your system through roughly any method a virus can use.

Worms
As far as design is concerned, a worm is a lot similar to a virus. However, the di erence lies in the fact that unlike the viruses, worms are capable of travelling without any need of human ac; on. It is the informa;on or le transport features on your system that a worm uses to travel unaided. The greatest danger that a worm poses is its ability to replicate itself. For example, a worm sends its copy to all the contacts in your email, and then it replicates itself and sends a copy of itself to all contacts in each of the receivers address book and this chain reac; on con;nues down the line.

The Rootkits
Rootkits are one of the nastiest bits of malware. They can obtain privileged access to your system, and the worst part is that they can safely hide themselves from common antivirus scans. The Rootkits aspire to achieve same goals as does a regular Trojan or virus. It can end up corrupting or deleting your files, or it may pass on your private information to third parties, thus compromising your private data. While these tasks can be accomplished by a Trojan or Virus also, the rootkits can effectively disguise themselves unlike the other
http://pckeeper.zeobit.com

Ideology of Keeping PC Safe - Security Insight by PCKeeper malware.

Pharming and Phishing


Pharming and Phishing are techniques illustrating the criminal, illicit and immoral element of PC security threats. Even though being so significant threats, they dont attack your system in any technical way. Rather, they use your computer to deceive you and steal your private and confidential information. Both pharming and phishing are closely related. Pharming is that technique through which a person is redirected to a bogus website and phishing is act of stealing your private information while posing as a reliable entity. Both techniques, in general, go hand-andhand: while a pharming technique redirects someone to a bogus website, phishing technique would phish the private information of the individual. Now that you have become aware about the most common security threats, you may be indeed wondering what can be done to keep these threats at bay. There are several things that you can do and we would start with Good Security Habits.

http://pckeeper.zeobit.com

Ideology of Keeping PC Safe - Security Insight by PCKeeper

Good Security Habits


Emails and Email Attachments
Agreed, that Internet users are much more aware of the potential dangers of unsolicited emails and email attachments than they earlier used to be; and in addition, automatic antivirus protection as well as spam filters have checked malware, to a large extent, from spreading effectively, but the problem is that the designers of the malware have also become smarter. They have come up with automated techniques of reproduction that cover a malware email as something seeming trustworthy. For example, infecting your siblings mail box and sending you a genuine looking email from his or her id. The rule of thumb is, if you were not expecting an email, confirm from the sender before opening. When it comes to email, phishing and pharming are undoubtedly the most devious threats. You have to be really really careful with emails supposedly from your employer or bank asking you to update your details etc by entering your username and password. All banks and other such institutions send reminders again and again that they will never send an email asking you to enter your username and password. So, practice extreme caution.

Safe Surfing
A lot of people are now aware of dangers of downloading files from net. Being scrupulous about downloading files is certainly helpful, but is not enough to ensure the safety of your PC. Even by visiting a malicious website, you endanger your PC of getting infected. Sometimes the malware infect some legitimate web servers too and a website starts spreading malware with the owner completely unaware of whats going on. Your best defense would be to make sure that your browser as well as the associated plugins are all up to date.

Use Anti-Malware Protection


This is one tip that goes without saying. Of the threats we discussed above, the first three (Virus, Trojans and Worms) are the ones an anti-malware program is designed to intercept
http://pckeeper.zeobit.com

Ideology of Keeping PC Safe - Security Insight by PCKeeper & protect. There are practically innumerable anti-malware products available in the

market; however, they have one common purpose of detecting and removing malware from a system. They also work to limit the damage these malicious software can cause by quarantining those files that have been infected. They also have real time protection feature to catch a malicious program in the act. Since newer and newer malwares keep hitting the online world, it is also very important that you have live update feature incorporated into your anti-malware software.

Firewalls
A firewall functions to monitor the data that is sent to and from your PC. Firewalls are an extremely important part of your Internet security and if there was no firewall, malware would be able to freely transmit data from your computer to third parties. Thus, it is strongly recommended to have a firewall installed and running on your system.

Rootkit Killers
We learnt that an anti-malware program can take care of Trojans, viruses and worms, but they are not able to detect or remove the Rootkits. That is where you would need to invest in dedicated Rootkit killers. Even if the rootkit has ended up into critical system files, these rootkit killers can take care of them.

http://pckeeper.zeobit.com

Ideology of Keeping PC Safe - Security Insight by PCKeeper

The Importance of Backups


With all the security in place, it is still very necessary to be prepared for worst and keep a backup of all your critical information. With a backup, you would be able to save yourself from some terrible stress in case something worst happens. You would know that at least your data is safe in some separate physical or digital location.

Conclusion
Whatever we talked about in last four odd pages can be summarised in 2 main points: 1. It is extremely crucial that you pay attention towards your PC security. Just using common sense will not ensure security of your PC. Developers of malwares are smarter than you think. 2. Even with all the security measures at place, it cannot be still guaranteed that now your PC is safe and nothing in the world can harm it. Therefore, in addition to all security measures that you take, it is equally important to regularly backup your important data. It would have been an ideal and perfect world if there were no threats of any kind around. However, the practical reality is that criminals, whether cyber or non-cyber, do exist so it is important that we take all measures to ensure the security and safety of our PCs.

http://pckeeper.zeobit.com

Ideology of Keeping PC Safe - Security Insight by PCKeeper

About PCKeeper
PC Keeper is a comprehensive and robust software program for your PC. The software includes everything that you would ever need to protect and optimize your PC. PCKeeper allows you to manage routine tasks in an easy and efficient manner and at the same time keep your PC clean, secured, reliable and fast. With PCKeeper you wouldnt have to worry anymore about protection and privacy of your data. The software effectively shields your computer against a lot of external influences that are a threat to the security of your PC and data. Here are some of the features that are included in PCKeeper:

Anti-Virus Software Reactive and Proactive Test from VB100 has included PCKeeper Anti-Virus amongst the top 10 Anti-Virus programs in the world. File Recovery With this utility you can scan and preview the files that were deleted and recover them in case it was done accidentally. Data Hider Hides sensitive files and folders from public view. Uninstaller Allows you to remove unwanted programs completely from your system. Disk Explorer Allows you to quickly locate some particular files. Anti-theft protection It allows you to track your computer, in case of a theft, and even takes a picture of the person using it, if there is webcam. File Shredder Completely removes a file from your system and leaves no trace of the file on your system. Duplicate Finder Helps to locate duplicate files on your system. Startup Manager Helps to keep the boot time short by managing your start up files, handlers and applications. Registry cleaner Clean your registry of any errors or obsolete entries.

With PCKeeper, you can have some of the most important system utilities, required to perform different tasks on your computer, in one place.
To find out more, visit http://pckeeper.zeobit.com

http://pckeeper.zeobit.com

Vous aimerez peut-être aussi