Bad Computer Habits
Like their real world equivalent, virus spread their infection from one thing to another. The only way to not catch a virus is to isolate yourself from any other form of contact. In the real world this would be a carefully controlled and sterile environment. In the virtual world, this would mean your device is not online, and you don’t download anything to this device…ever. For most, this is simply not an option. There are things you can do that may help limit the spread of infection, and lower your chances of getting a virus. There are also bad habits that may leave you wide open for infection. Here is a list of bad computer habits, the virtual viruses equivalent of not washing your hands, that you may be doing.

Assuming That Having Anti-Virus Makes You Safe
This is a big one. Many believe that all they need to do to avoid malware is drop some money on an antivirus subscription (or worse…using free antivirus programs). Don’t misunderstand me, antivirus is important and everyone should have an antivirus that is right for them. However, antivirus programs are reactive, not proactive. They can protect only from viruses that have been logged in their databases, and since new malware is made everyday, antivirus companies simply cannot create a solution until after someone has fallen prey to the latest and greatest virus. Additionally, they are not infallible even after data-basing a particular virus. Many viruses are designed specifically to evade antivirus detection, or can even rewrite the antivirus program, disabling its protection.

Browsing with Java Enabled
Java is a programming language and computing platform that integrate well with internet applications. Many websites will have limited or no functionality if a browser has Java turned off. By default, most browsers leave Java turned on, since inexperienced users might not know why a website is functioning incorrectly without it. So why turn Java off at all? Java is a programming language that tells a device what to do, which means seedy websites (or websites that are unaware of an infection) can use Java to install programs (such as malware) without the user’s knowledge. Leaving Java off is a good way to protect a device if a random link was accidentally clicked and a user ends up somewhere on the internet they didn’t want to be. Most websites will prompt a visitor that has Java disabled if it is needed for the website, allowing the user control of whether their content is displayed or not. Activating and Disabling Java may seem annoying (and tedious), keep in mind that Java is one of the top ways a computers security can be compromised.

Not Taking Precautions On Wireless Connections
Leaving the wireless function set to automatically use wireless connections on mobile devices such as cell phones and laptops seems harmless enough. However, without using safe wireless connections, a device can be automatically registered into a network on random wireless connections. Being apart of the network could allow attackers to attempt to hack the device, or more simply, send malware to the device with a data transfer. It’s best to set a device to not automatically connect free wireless connections. This way, the owner of the device can be certain of which wireless network the device is connecting to. Always check to make sure the wireless network is secure, and if it is a public connection, such as those offered by many restaurants, only use the connection when the device has your full attention, so you can disconnect if you see any suspicious activity.

Downloading With Default Settings
Using a default download setting or an express setting allows the downloading program to legally attach other programs, such as adware or internet extensions that could lead to obtaining other malware. Always choose the custom download if the option is available, this will allow the other programs to be unselected for the download.

Opening Suspicious Emails
Malware loves to attach to emails to spread. Worms, a type of self replicating malware, can automatically attach itself to emails and then send itself to everyone in the contacts of the infected computer. These emails usually have strange and vague subject lines. Its good practice to send emails with very specific subject lines to minimize the spread of worms. If you see a strange subject line, it might be better to contact your friend before opening. Additionally, malware spreads through spam mail, usually claiming you’ve won something, or that the email is from some important institution.

Clicking on Fake Download Links
Many websites will have what appears to be multiple download links. Many of these links are actually ads that are designed to appear like download links to trick a user into going to their website and downloading trojans and other malware. If websites have these you should probably avoid those sites all together. But, if you absolutely need that download, there is a simple test to see if it is the real download or a fake one. Left-click the link and attempt to drag the link. If it doesn’t drag on screen, it’s the real download link on the page (though it could still be dangerous!). If it does drag, it’s a fake download link add.

Not Reading the End User Licence Agreement
Nobody wants to read pages and pages of legal jargon right before the get to use a program, and end user licence agreements (or EULA), are a great way for companies to hide the use of adware (and even hidden fees) in the use of their software. Usually, only companies with “free” software would bundle adware in this way, and because of the EULA being accepted, it’s perfectly legal to attach adware to the program. Although adware is mostly innocent (and annoying) it can be used as a gateway for other, more sinister, malware.

Downloading Random Pictures
Virus can be attached to any program and any file, including pictures on the internet. Your normal attackers aren’t the only culprits, many more unscrupulous characters will attach viruses to their pictures in an attempt to punish those who download their pictures without permission or purchase. Make sure that the download is coming from a source that shares its photos willingly.

File Sharing and Torrenting
File sharing and torrenting files is already dangerous from a legal standpoint, and many uploaders of these files use the promise of “free” software to infect unsuspecting users computers. Additionally, some egotistical uploaders (especially on torrent sites) want to make certain that the users who download their content are “worthy” and will hide viruses that are otherwise simple enough to spot for those who are computer savvy enough to meet their standards.

Turning Off Firewall Protection
Sometimes that firewall is just causing a program to not work correctly, or causing a download not to complete, or slowing your computer down with lag, and it’s so tempting to just turn it off and forget about it. True, occasionally the firewall needs to be turned off to get something to work correctly, but that should be your last resort (check online to see if the program you are using typically needs this). First, try adding exceptions to your firewall. This can usually be done under the control panel or settings of your computer. If that doesn’t work, and you turn off your firewall, it’s very important to remember to turn it back on. A majority of infections on a device occur simply from forgetting that the firewall was turned off.

Leaving Remote Desktop Access On
There are built in ways to access a computer with a different computer. Many technicians (including Computer Cleric) use remote desktop access to take control of a client’s computer to fix it from afar. However, it is important to remember to turn remote desktop off for the computer when a technician is finished, otherwise a tech could access your computer whens its idle to attempt to steal information. Of course, no legitimate technician or business would do this, but many “free” technicians will hope that you leave your computer access on, so they can steal information and upload spyware onto an unsuspecting clients pc.

Good Computer Habits
There are also habits that can be done to decrease the chance of getting a malware infection on a computer. Many of these habits seem unimportant at first glance, and are often ignored by computer users, but they do help. Its best to try to perform these habits regularly.

Scan Everything
Use that antivirus for everything its worth. Scan all files that enter the computer. Set express scans of vulnerable areas on the computer (such as temporary internet files) to run daily, and do full system scans weekly. Don’t forget to keep the antivirus database up to date.

Erasing Temp Files
Those temporary internet files just mention above, might as well erase them weekly. These files are used to speed up browsing to sites that are frequented by a user, additionally they are an excellent place for malware to hide. All browsers have a different way of accessing these files and erasing the data within.

Frequently Creating Rollbacks
Rollbacks can be created in a computer system to save a user’s configuration encase the computer’s system becomes compromised. The rollback can then be used to reset a computer to an earlier time, restoring configurations that might have been altered by a virus. There are different ways of doing this depending on which operating system is being used. Rollbacks should be created before and after system updates, before downloading any major programs, and monthly just to be safe.

Registry Cleaners
Cleaning your registry is as important as backing up the registry. As changes are made to a pc, such as installing and uninstalling programs, the registry creates the paths that allow the computer to access the programs. When programs are uninstalled, traces are usually left behind on the registry, which will slow down a computer (and could open it up to infection). Clean and repaired registries help a computer run faster and healthier. There are many free programs (as well as paid for programs) that can do this online. Before downloading these do some research into user testimonials, to see if the program is legitimate.

Update…Everything
Most updates for programs are for fixing holes in a program’s security. It’s important to keep all programs running on a device up-to-date, additionally updating the hardware drivers frequently couldn’t hurt.

Leave a Reply

Your email address will not be published. Required fields are marked *