The internet has become an integral part of our lives and many of us are constantly using it every day. Being connected to this huge world of resources has created an increased risk of being exposed to virus and malware threats, which can lead to data loss and identity theft. Every web user should be well versed in how to prevent a computer virus infection and what to look for. Think of this tool as a manual for all motorists who find themselves traveling the highways of the web. Learning how to avoid getting infected with a computer virus and spreading it to others will not only make the web safer for you, but for any other logged in user as well.
Steps
Part 1 of 4: Browse the Web Safely
Step 1. Avoid selecting any type of link or object
There are hundreds of banner ads and popups on the web that have been specially designed to grab your attention and convince you to select them with the mouse. Because of the way most modern internet browsers work, there are very few ways to get infected with something on the web, unless you select the object containing the virus. This means that you shouldn't select banner ads that advertise something that is too good to be true.
Make sure your internet browser is configured to always ask for confirmation before automatically running files downloaded from the web. By always having to sift through what can and cannot be done, the chances of being hit by a virus are greatly reduced
Step 2. Beware of deceptive popups
Some of the most dangerous pop-ups on the web are created to resemble the genuine pop-ups of antivirus software. The purpose of these fake popups is to trick the user into believing that their antivirus software has detected an infection. When you select the fake popup, the related adware gets installed on your system.
- Instead of interacting with the warning message that appeared, close the pop-up window and start the antivirus program. Most likely the software will not report any problems and will not present any kind of warning. If you're still not sure, scan your entire system using antivirus software.
- Do not try to close the popup window using the "X" in the upper right corner. This action usually leads to many other pop-ups. Instead, use the Task manager or Task manager. Alternatively, you can install adblock plus to block the display of any advertisement on a web page.
- Other pop-ups can warn you of an infection that only their advertised software can eliminate. Be aware that no antivirus company advertises its products in this way. So never select the ads from these popups.
- Check to make sure the internet browser you are using is configured to block pop-up windows.
Step 3. Clear your browser cache
Pop-up windows cache information in the internet browser, which leads to repetitive display of these malicious elements. To prevent this situation, regularly clear the contents of the browser cache.
Step 4. Consider switching browsers
If you are using an internet browser such as Internet Explorer or other outdated programs, such as Netscape or Safari for Windows, you may be putting the security of your data at risk. Internet browsers such as Firefox, Chrome, and Opera are much safer than older browsers, and most importantly, they are much more customizable. Firefox, for example, has a large availability of add-ons related to privacy and security management that help you to be constantly protected while browsing the web.
If you don't want to switch browsers, make sure it's always up to date to help prevent unauthorized attacks
Step 5. Don't go where you think it's wrong to go
Since viruses are illegal, they thrive in abundance on illegal websites. So avoid accessing those sites that allow you to download copyrighted content or other illegal online communities. File sharing is a quick way to get hold of infected files. You will find that your computer will be much less prone to getting viruses if you avoid taking actions you shouldn't take.
In addition to the viruses contained in the files you download from the web, many of these sites are filled with pop-ups and advertisements. Each of these elements could be the vehicle for a virus or spyware
Part 2 of 4: Managing Downloaded Files
Step 1. Be selective with the files you download
There are programs available that can handle almost any task you can imagine, but in any situation ask yourself if you really need the program you would like to download. Do a little research based on your business, you may find that you already have a program that can do it. Downloading an additional program for each activity you want to do only increases the chances of downloading a malicious program.
Step 2. Download only from safe and trustworthy sources
If you are downloading a program or software, it is always advisable to do so from the developer's site, rather than using any other download service. Many of these sites that allow software downloads require you to install their own download manager that may infect your computer's internet browser with viruses or adware.
Downloading files illegally is always a lottery that can lead you to contract a virus or malware. If you can, download your files only from "reliable" and safe sources, in this way you will significantly reduce the risk of running into a virus
Step 3. Look at the file extension
Malicious files often have a double extension to try to deceive the user, such as ".txt.vb" or ".jpg.exe". Windows hides the known file extension by default to make it easier for you to view files and programs on your computer. These files take advantage of this setting that hides their second extension, that is, the one that reveals the danger of these elements. If you don't normally see the extensions of files stored on your computer, while you see it displayed for the file you just downloaded, it means that you have probably downloaded a malicious file that hides its true nature under a false name.
For Windows to display the file extensions, go to the Windows Explorer or File Explorer window, select the View tab or menu and choose the Options item. Select the Display tab of the appeared window, then deselect the check button "Hide extensions for known file types"
Step 4. Scan the downloaded files
If you have an antivirus program installed on your computer, make it a habit to scan all files you download from unknown sources. Most antivirus programs allow you to scan a specific file. To do this, select it with the right mouse button to access the context menu, then choose the option for scanning with antivirus software.
- Always scan ZIP files, as they often contain multiple files within a single compressed archive.
- Email management clients often automatically scan emails for viruses, however you should always scan any attached files using the antivirus software at your disposal.
Step 5. Don't open anything you don't fully trust
A virus or worm cannot be a threat until you run the program that contains it. This means that simply downloading these items does not expose you to any kind of real danger. If after downloading a file, you decide that you are unsure of its harmlessness, avoid opening or deleting it until you can confirm its integrity.
Step 6. Read the licensed usage agreements
Do you know those legal documents that you always accept without reading every time you install a program? Well, some shady companies take advantage of the fact that most people don't read these documents to hide within them clauses that allow the installation of spyware and other malicious software. Always take the time to read these documents, especially those related to programs created by unknown companies.
Part 3 of 4: Managing Emails
Step 1. Do not download attachments from an unknown source
E-mail attachments are the first vehicle used for the spread of viruses and other malware. You should never open an attachment or link contained in an email from a sender unknown to you. If you are unsure of the sender of an email, look for confirmation that the attached file is legitimate before proceeding to download.
Step 2. Don't download attachments from a known source if you didn't expect to receive them
Many times users contract a virus that sends emails without their knowledge. This means that you may receive an infected email from a trusted source. If the text of the email is strange or the attachment appears incorrect, do not open it. Check with the sender if they really intended to send you the file you received.
Step 3. Turn off image preview
Many e-mail clients, to speed up the consultation, automatically load the images contained in an e-mail, but this process can make you vulnerable since the images can contain malicious code inside them. Again you should download the images contained in emails that come from a safe and reliable source.
Note: Some e-mail services have begun to change the way they handle images in e-mails so that they are uploaded securely. For example, Gmail, by default, no longer disables the display of images. Check the procedures that your email provider uses to find out how to make the most of the service offered
Step 4. Beware of oddly written emails received from companies that are inherent in your life
This technique is known as phishing and involves creating emails that copy the style of the company they refer to by including links very similar to the original URLs, but which instead point to completely bogus sites (cases related to Poste Italians and various online banks). The purpose of these sites is to store users' personal login information, since they think they are on the real site.
No legitimate company would ask you to provide your login password or any other personal information through a simple email
Part 4 of 4: Protect Yourself
Step 1. Install an antivirus program
This type of software can actively protect your computer from possible viruses by monitoring the operation of active programs and scheduling a full system scan. There are free antiviruses that provide basic virus protection, such as AVG, Bitdefender, and Avast. While other paid programs provide complete protection through firewalls and anti-phishing systems. Popular paid programs include Norton, Kaspersky, and paid versions of free antivirus software.
- You should have only one antivirus installed on your computer, to avoid possible conflicts.
- Make sure you update your antivirus program at least once a week.
- Run a full computer scan at least once a week, or more frequently if you are a user who makes extensive use of internet resources.
- An antivirus program is not a foolproof system and is not designed to replace good navigation rules and common sense.
Step 2. Install an anti-spyware program
In addition to viruses, your computer is exposed to the threat of spyware and adware. These programs are difficult to remove and are often designed to modify your web browsing. They also make the computer more vulnerable to future attacks. Most antivirus software does not scan for these types of threats or, worse, cannot remove spyware and adware.
- Here is a list of the most popular programs: Malwarebytes, Spybot S&D, HitmanPro, and Adw Cleaner.
- In this case, you can install multiple anti-spyware programs at the same time. More software means more chances of detecting and blocking spyware.
Step 3. Enable a firewall
Firewalls are software programs created to protect a computer's communication ports that allow it to send and receive data over the network. Windows comes with a fully functional native firewall, whose protection is usually more than enough for normal users. There are several companies that offer more powerful and customizable software according to the customer's needs. Most of these companies are the same ones that also provide paid antivirus software.
- Firewalls are also available in physical form as hardware components of a network.
- You can only have one firewall active at a time. If you install a software firewall or a hardware firewall, you need to disable the Windows firewall.
Step 4. Update Windows
Many viruses and other malicious software exploit security flaws discovered in the Windows code. These exploits are resolved quickly by Microsoft by releasing updates for all legitimate copies of Windows. If you don't keep your Windows installation up to date, your system may be more exposed to threats. To make sure you're getting maximum protection, make sure your Windows system is configured to automatically install all available updates.
If you are using Windows XP immediately switch to a new version of Windows. Microsoft's support for Windows XP ceased on April 8, 2014. This means that any security issues, bugs or exploits discovered in the future will not be fixed and fixed, leaving a Windows XP system exposed to the resulting threats. For more information on how to upgrade to Windows 7, select this link. Instead, select this link for more information on upgrading to Windows 8
Step 5. Be careful when using USB drives
USB storage drives are widely used for spreading viruses, often without the knowledge of the device owner. In this case you could infect your computer simply by plugging it into the USB drive, or infect your USB drive by simply connecting it to an already infected public computer. Try to use other methods of sharing files, such as online storage services (like Google Drive) or sending files by email.
Step 6. Be wary of remote access
In today's world, increasingly connected to the web, remote access to a computer or the remote sharing of resources is becoming a very popular activity. While it is a great choice for increasing productivity, it exposes your personal computer to greater risk, as it will need to be available for direct access through other machines over the internet. Ask yourself seriously if you need to use a remote connection and if so, always make sure you keep all the software that is used to protect your personal data up to date.
Step 7. Always backup your data
If something irreparable should happen, the last thing you want is to lose all your personal data. Regularly backing up the data on your computer greatly reduces the possible damage done by a virus, allowing you to restore a normal situation more easily and more quickly. There are several ways to back up your data, both locally and remotely.
Advice
- Always keep an up-to-date backup copy of your personal files. It will help you if a virus that can delete your files or prevent you from accessing it infects your computer.
- Remember: if something looks suspicious to you, it probably is.
- Delete your browser's temporary internet files every day.
- If you want to fix simple system errors, such as a blue Windows screen, turn off your computer and restart it after waiting 10 seconds.
- Never answer a survey that seems to you to have something suspicious and above all never, ever give your money, even if the motivation seems better than usual.