Malware
Malware falls under the category of malicious code. This type of malicious code includes worms, viruses and Trojan horses. Malware of destructive type utilize the communication tools to spread the malicious code.
These worms are sent through the email and instant messages. Trojan horses use the websites and virus infected file transfer as their best victim where they are dropped over. Malware also uses the vulnerabilities which are found existing in a system.
Vulnerabilities are defects in the system software and this is the easiest means for the malware entry. Mostly the vulnerabilities are found by the software providers and fixed through the software updates and patches.
Malware Through Networks
Files sharing has become common and also essential in in the internet for most of the applications.Main loop hole for the malware spreading is through common peer entity to peer entity file sharing applications which are placed in the shared directories.
Some malware threats use the shared networks to communicate to and fro with the infected system.
Malware Detection
Malware detect softwares are available. Malware infections are not visible to the users as they will hide actively or simply making their presence as absence on the system. Norton Internet Security 2010 is well known Malware Protection.
How to Remove Malware
Malware removal is an important task in maintaining a network security as malware protection cost much of the budget. Malware blockers and malware removal softwares are available as free of cost and as premium software.
If malware is detected then file scanning must be done. Scan the files before they are transferred to the system of interest with an Internet security solution.
Transfer the files only if they are from well known and authorized source.
Norton Internet Security is one such system that can be used to do malware block.
Prevent Malware Attack
* Without opening delete all the unwanted messages
* Before opening scan the attachments in the email with secured virus scanner
* Open the attachments that are arrived from email or IM, only if they are from trusted sources
* Dont click the website links if you are not sure where that will lead to or from whom you got the link
* Do file transfer with good Internet Security Solution
* Regularly update with patch files
Welcome!
Me Eric, a software professional likes to share the tehnology learnt to the googlers
Labels
- anti-spyware programmes (1)
- anti-virus (1)
- Apple Security patches for Mac OS X (1)
- avaya (1)
- BlackBerry Applications (1)
- blackberry email (1)
- body scanner in airports (1)
- change drive letter and paths (1)
- computer tips and tricks (1)
- Cyber crime (1)
- cyber-criminals (1)
- Dash 3G (1)
- Domain Name extension (1)
- Drive Manager (1)
- email (1)
- emsil spam (1)
- facebook (1)
- Facebook users (1)
- Facebook's virus protection (1)
- Flights (1)
- Gmail (1)
- google nexus one (2)
- google nexus one phone complaints (1)
- google nexus phone (1)
- google phone (1)
- hacking (1)
- hard drive (1)
- htc mobile (1)
- IBM Lotus (1)
- Identity Management (1)
- Industry (1)
- Internet (5)
- Internet security (3)
- linkedin (1)
- LinkedIn IPO (1)
- Lotus Quickr (1)
- malicious software (1)
- malwarevirus protection (1)
- McAfee online backup service (1)
- medicine (2)
- Microsoft (1)
- mobile internet connections (1)
- nortel (1)
- online data backup (1)
- online server backup (1)
- Operating System (2)
- Oxford University (1)
- Oxford University ban on Spotify students (1)
- Oxford University Computing Services (1)
- Pen Drive (1)
- phishing and e-mail scams (1)
- Piracy detection software (1)
- Pirates of the Caribbean (1)
- printer (1)
- privacy advocates (1)
- Product Review (3)
- Products (1)
- Security (1)
- Software Reviews (8)
- Software Update (1)
- Sony X-Series laptop review (1)
- spam filter (1)
- Steroid (1)
- t mobile touch phone (1)
- T mobile touch pro2 (1)
- Technology (2)
- United kingdom (1)
- unlimited storage space (1)
- USB Drives (1)
- Virgin Media (1)
- weightloss (2)
- World’s Lightest Laptop (1)
- Yamaha YSP-4000 Digital Sound Projector Review (1)