Computer Virus Protection

##AUTHORSPLIT##<--->

A computer virus is a program — a piece of executable code — that has the unique ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file, and are spread by replicating and being sent from one individual to another. Simply having virus protection software on your institution's computer system d'esn't guarantee safety and security. Instead, protection and prevention is a team effort between the users and the anti-virus software.

Virus Protection Tips

An article from the online magazine Viewz, titled "Virus Protection Tips" (www.viewz.com/features/virustips.shtml), provides some excellent tips that can help protect your school from computer viruses:

  1. Install anti-virus software and keep the virus definitions up to date.
  2. Don't automatically open attachments and make sure your e-mail program d'esn't do so either. This will ensure that you can examine and scan attachments before they run. Refer to your e-mail program's safety options or preferences menu for instructions.
  3. Scan all incoming e-mail attachments. Be sure to run each attachment you plan to open through the anti-virus check. Most anti-virus software can be set up to check files automatically.
  4. Update anti-virus software frequently. An anti-virus program is only as good as the frequency with which it is updated. New viruses, worms and Trojan horses are created daily, and variations of them can slip by software that is not current. Most anti-virus software is easy to update online, with options to do so automatically.
  5. Avoid downloading files you can't be sure are safe. This includes freeware, screen savers, games and any other executable program — any files with an ".exe" or ".com" extension. If you have to download from the Internet, be sure to scan each program before running it.
  6. Don't share floppies. Even a well-meaning friend may unknowingly pass along a virus. Label your floppies clearly so you know they're yours. If a friend passes you a floppy, suggest an alternative method of sharing files. In addition, always be sure to scan all floppies before using them.
  7. Use common sense. It's always better to err on the side of safety. If you're unsure about an attachment, delete it — especially if it's from a source you don't recognize. Also, beware of strange links or unexpected attachments that come through instant messaging programs.

Online Virus Protection Resources:

  • Symantec's Virus Encyclopedia
    http://securityresponse.symantec.com/avcenter/vinfodb.html
    Symantec's site provides a synopsis of the latest virus-related threats, including information on risk, threat names, day the threat was identified, and day a virus definition was added to protect against the threat.
  • Safe Computing Guide
    www.trendmicro.com/en/security/general/guide/overview.htm
    Trend Micro offers a step-by-step online guide to help you keep using today's advanced computer information access technology without falling prey to viruses and other malicious code.
  • VirusList.com
    www.viruslist.com
    This site bills itself as "the biggest virus encyclopedia," covering everything from hoaxes, new viruses with descriptions, warnings and advice, new technologies, events, as well as online comment and discussion forums.
  • Virus Information Library
    www.networkassociates.com/us/security/vil.htm
    Network Associates' site provides detailed information on where viruses come from, how they infect your system, the names of viruses, as well as current threats and how to remove them from your system.
  • Computer Virus Timeline
    www.infoplease.com/ipa/A0872842.html
    This Information Please site has a comprehensive timeline of viruses, starting in 1949 when theories for self-replicating programs were first developed. The site also offers tips on protecting yourself from computer viruses.

Contact Judith B. Rajala, M.A., president and founder of EduHound.com, at [email protected].

Featured

  • blue AI cloud connected to circuit lines, a server stack, and a shield with a padlock icon

    Report: AI Security Controls Lag Behind Adoption of AI Cloud Services

    According to a recent report from cybersecurity firm Wiz, nearly nine out of 10 organizations are already using AI services in the cloud — but fewer than one in seven have implemented AI-specific security controls.

  • stacks of glowing digital documents with circuit patterns and data streams

    Mistral AI Intros Advanced AI-Powered OCR

    French AI startup Mistral AI has announced Mistral OCR, an advanced optical character recognition (OCR) API designed to convert printed and scanned documents into digital files with "unprecedented accuracy."

  • robot waving

    Copilot Updates Aim to Personalize AI

    Microsoft has introduced a range of updates to its Copilot platform, marking a new phase in its effort to deliver what it calls a "true AI companion" that adapts to individual users' needs, preferences and routines.

  • teenager interacts with a chatbot on a computer screen

    Character.AI Rolls Out New Parental Insights Feature Amid Safety Concerns

    Chatbot platform Character.AI has introduced a new Parental Insights feature aimed at giving parents a window into their children's activity on the platform. The feature allows users under 18 to share a weekly report of their chatbot interactions directly with a parent's e-mail address.