We protect your computer from viruses. How to protect your home computer from your own child How to protect your computer from intrusion

Yesterday I wanted to write an article for Windows 7 about security, then I decided to review antiviruses, but I came across something interesting and decided to correct it a bit. In this article, I will write how you can protect yourself in free, manual ways, give recommendations on choosing an antivirus and what you need to do to be protected.

There are many jokes about this, for example, "The most secure computer is the one that has not yet been released (or turned off)" or "the most important virus sits on a chair in front of the monitor." Of course, there is some truth in this. But what if you follow these examples, then do not turn on the computer at all and do not surf the Internet and do not work? Let's figure it out...

This article will not be a review of antiviruses or their test with pros and cons. There are billions of requests and answers on the Internet about this. This is such a pressing issue that it simply cannot be touched upon. Yes, and you should not believe all the tests and ratings, because in some there is something true, somewhere there is advertising (for denyushka) of antiviral, somewhere the positions jump. And clearly answer questions like How to protect yourself on the Internet or What is the best antivirus You won't find. Especially on forums, even popular ones. As they say - "How many people, so many opinions", and on the same forums, even on one product, you will see many conflicting opinions - someone writes the truth, someone advertises, someone succeeded, someone did not succeed. Depends on many factors, up to the curvature of the hands

How can you still protect yourself?
The main problem to be protected from is computer viruses(there are also crooked hands, the same and all sorts of physical factors - such as a power surge or a falling flower pot, but this is another topic, less common), and they get into the computer in three ways - via the Internet, via software, through devices (flash drives, cards memory, portable, LAN, etc.).
If antiviruses help get rid of infected software (I think everyone knows what it is), then from all sorts of network attacks and Internet threats from sites will help various firewalls (you can read about them on).

Get to the point.

I will give you some tips for free effective computer protection from the use of which you will protect yourself somewhat, and if you do everything, then at least 80-90 percent will be protected. No one will give a 100% guarantee, I wrote about such protection above.

1) Disable autorun flash drive or portable drive.
On the one hand, this is convenient - I connected the USB flash drive to the computer and the operating system turns on autorun, it remains only to choose how to open it. And some of them just sit and wait for it to open. However, viruses use this common and most unprotected way and safely "move" to a new place of residence - that is, to our computer, which has not yet been infected. If you connect another USB flash drive to a computer infected with viruses - malware rewrite themselves again - this is one of the most common ways for malware to enter a computer.
Therefore, I turned off this function and open everything that is connected through the file manager (not a standard explorer!) Total Commander. It does not allow viruses to "auto-start" and shows everything that is hidden and is generally very convenient. When opening in this way, you need to immediately pay attention to hidden files and folders (usually they are exclamation mark and the names are strange for you). On a normal clean flash drive or portable hard drive, there will never be such files and folders (with the exception of), only if the owner himself has not done so (they usually hide files a la XXX).
If you find such suspicious files on your flash drive, immediately check it with an antivirus (maybe even more than one).

Disable flash drive autorun can be done in two ways:
1 - through the Control Panel.
Start - Control Panel - AutoPlay and uncheck the box "Use AutoPlay for all media and devices" or hold fine tuning for each media type.


Save your settings and restart your computer.

2 - using the Editor group policy(If you have a version of Windows 7 from Home Premium ( Home Premium) and higher).
- Press the "Start" button, enter Gpedit.msc in the search field and press the Enter key. If you are prompted to enter an administrator password, enter. If you are prompted to start the program, confirm it.
- In the "Local Group Policy Editor" window that opens, in the "Computer Configuration" section, expand the "Administrative Templates", "Windows Components", and "AutoPlay Policies" nodes in turn.
- In the area on the right, double-click "Disable AutoPlay".
- In the window that opens, select the option "Enabled" and just below "All devices".


- To restart a computer

2) Install an antivirus.
You can install some paid antivirus or even a combine (2 in 1. and antivirus and firewall). But now I will focus on free solutions.
As I wrote above, you should not immediately believe in some kind of test or rating and put what is recommended there. In fact - any antivirus will not detect 100% of all viruses, trojans, spyware and other evil spirits. Something will be detected by one antivirus, something by another, something by a third ...
I had this problem in my life:

Kaspersky antivirus was installed, always new (I reset the key every month), always updated and found something. But one fine, not good day, I could not access the site (and at that moment I had a site with downloads for phones) and all the mail was deleted. At first I didn’t understand, I thought it was a failure (I didn’t want to believe in the sad), I changed passwords everywhere, but it didn’t help. I never returned the site. Then I received a letter sent to myself in which there was a text like "if you do not want your computer to be used further, remove the virus." I acted drastically - I just copied the necessary data, formatted HDD and installed Linux, which I used for more than six months. After that, my trust in Kaspersky disappeared and I began to do the things that I describe in this article.


But all the same, from free antiviruses, I would advise you to put a top three, which is on this moment has the most reviews. Of course, both positive and negative (how many people have so many opinions) are, and. But just because I recommend them doesn't mean they are the best. These companies perform quite well in almost all tests and do not occupy the last places.
I would like to offer you, which I used until yesterday, but after I found out that at the last independent testing from Dennis Technology Labs (AMTSO member) on February 8 this year, it showed the latest results (and turned out to be in the minuses in one) , then I ran through several dozen sites and saw a similar picture - he lost many times. Although... I already wrote about ratings and testing and what will be your main one - it's up to you.
Here are some more free products worth checking out: , .

3) Check with other antiviruses.
All the same, for a greater degree of protection, I advise you to check your computer at least once a week with free "scanners" from well-known paid antiviruses, such as, (5 in 1), or send the file infected in your opinion to an online scanner that will check it for more than 40 antiviruses. This and .
As I already wrote - if one does not find, then others can.

4) Install a firewall (firewall).
This is more suitable when you have a fairly powerful computer. Yes, and some antiviruses come with their firewall. This is enough good decision and conflict-free, but some nerd craftsmen still install different antiviruses and firewalls. For example, Comodo has solutions like just an antivirus, just a firewall, and there are both, but the antivirus in this case still leaves much to be desired. I recommend that you set . Of the other free ones, I advise you to pay attention to and. There are others, but they are trial.

5) Lower User Permissions.
In Windows, by default, any user is granted administrative rights - the maximum possible in the system. At the same time, all malicious programs, such as viruses that have entered the system, also receive administrator rights and the damage from their operation is maximum.
In the Control Panel, go to "User Accounts".
For Windows XP: → "Create an account", enter a name → select "Restricted entry" and at the bottom click "Create an account" (or "Finish"). In the next window → "Change account", select the created account → "Create password" and enter it, at the bottom → "Create password".
For Vista and Windows7: in "Control other account» select "Create a new account", enter the account name → "General access" → "Create an account". In the next window, select the created account → "Create a password" and enter a password.

If you want to use the old familiar name for a limited account, then create a new account, but with administrator rights. Log in with this account and go to "User Accounts". In your old account, click on "Change account type", select "General access" (for XP, select "Restricted access").
Well, I think you know how to switch between users.

6) Use free anti-rootkits and anti-spyware.
One of the most popular utilities in this case is . A wonderful program mainly anti-spyware. Does not require installation. Check periodically.

7) Use proactive defense software.
Although some antiviruses have such an opportunity, I don’t know what kind of antivirus you have. The purpose of such programs is to monitor the state of the computer and notify immediately of any changes that may occur without your attention. One of the best programs in this area is .

8) Use programs USB protection ports and USB drives.
These programs block "authorans" (I will write an article about them soon) on USB drives. A great solution in this case would be to install the product. It protects both the computer (prevents any AutoRun file from running, whether the device is infected or not) and itself. USB stick(disables the AutoRun file so that it cannot be read, modified, or moved malicious code).

9) Use Prevx Threat Prevention.
This, of course, is more suitable for paranoid even more protection, but it is up to you to decide whether to take it or not.
The meaning of this utility is that when installing new software or detecting a process, this program sends data to its database over the Internet and looks at what is new in the system, then sends a response. Usually this is either a virus, or a normal program, or an unknown program. Also a kind of protection. True, it is paid (like $ 35), but not a trial one, but simply the functionality is cut down. In this case, it will simply show that this file is a virus, and you need to delete it by hand. You can download as always at .

10) Install updates in a timely manner.
Both the operating system itself and antiviruses, firewalls, browsers and other programs. True, most often they themselves are installed both without our attention and with a request.

11) Protect yourself in mail, skype, ICQ, etc..
It is important to remember here that you should not open and look at what the unknown Masha Milyasskaya wrote to you and what file she attached in the letter and where the link in the text of the ICQ chat leads. Such letters and messages should not be opened at all. It's good if it turns out to be spam, or maybe they are trying to "shove" a virus.

12) Ignore offers from websites.
Now it is often found that on sites there are all kinds of banners or messages stating that your Operating System or browser or something else is just like a pipets in need of an update. Or a message appears from VK, email, classmates and other social networks (moreover, very similar to the original) with a request to add or get acquainted or tell how to make money. Or a page appears that your account is in VK, Facebook, etc. social networks are hacked and you urgently need to send sms otherwise kaput.
In any of these cases, you can immediately understand that this is all a scam, fraud, etc. Okay, they will try to take money from you, but they can also "give" the virus. Be careful! Pay attention to the address bar of the browser, do not click on messages from social networks. networks (better go to the tab or social network of this and check), do not click on ANY update. Think a few times before panicking "poking" at this kind of picture.
In general, I sometimes laugh at such messages, sometimes it's funny to see that my Opera needs updating when I'm sitting with Iron. Or when my VK account is blocked, and there is all sorts of nonsense in the address bar, and VK is open in a separate window for me. But sites that put a message about a virus on the right and at the same time the sound of a slaughtered pig - I immediately close.
It doesn't matter to site owners, they make money on such advertising, but they are not to blame for what they have on their site in banners. This is a completely different topic.

13) Download programs and their updates only from the links on the website of the direct developer.
Therefore, I try to post links on the site only to official sites. I already wrote about this in some article, but I repeat once again - this is not due to lack of space on the server, but for your own safety. And new versions are always the first to appear on the developer's website. And if you download something from third-party sites, then make sure that the site is known to you and there is trust in it.

14) Create backups.
It would be nice to have external hard disk for such purposes and periodically (for example, once a month) make a full backup of the entire system and write it there. It is possible on local disk do this either on a USB flash drive or on disks. Only you yourself understand what a perversion how long it will be, especially if on a flash drive or disks. And it can also get to a local virus.

Well, basically, that's all. In principle, the first 2-5 points are enough for protection, but more points can be completed for greater awareness and security.
What is not clear or what questions - write in the comments.

Computer viruses cause a lot of trouble and problems to many users. And all of them in the vast majority of cases have antivirus installed. There is only one conclusion - the antivirus does not provide the necessary level of protection. This problem must be solved by complex computer settings and the study of the basics of security.

1. What you need to know about viruses

A virus is a malicious program created by an attacker. The purpose of the first viruses was the self-affirmation of their creators, and their action was to harm the computer. Today, the vast majority of viruses are aimed at illegally obtaining funds in one way or another.

In order to effectively protect yourself from viruses, you need to know how they work. The main tasks of viruses are to penetrate the user's computer, ensure their launch, protect themselves from detection and removal, and perform destructive actions.

2. Types of viruses

Viruses infect a computer in various ways and, depending on this, are divided into different types.

File virus

Infects other programs and files by adding its own program code. Thus, when an infected program or file is launched, malicious code is executed. If system files are infected with a virus, then the malicious code is launched automatically every time the computer boots.

Worm

The worm is a self-replicating virus. Having penetrated the user's computer, the worm duplicates itself many times, placing many copies of itself in different folders with different names, which makes it difficult to remove. Worms can also copy themselves over a local network to public folders on other computers, spread themselves through email, messaging programs, and network attacks.

twin virus

Some viruses remove or hide user files and folders and replace them with malicious files with the same icons and names. The user tries to open them and runs malicious code. Such viruses are now found on flash drives.

Trojan

Trojans are viruses that do not infect other files, but place their own files on the user's computer. Often these files are located in the folders of the operating system, disguised as system files, registered in startup and launched every time the computer boots. Trojans are more difficult to identify because they act like other programs that also add their files to the system and run with the computer.

False Program

Some viruses disguise themselves as useful programs for the user, designed to download files from the Internet, watch videos on websites, improve computer performance and even protect against viruses. The user installs the program himself, uses it and is not even aware of its "undocumented capabilities".

Also, such programs often try to get money from the user. For example, a false antivirus or a program for fixing errors in the system detects several dozen non-existent viruses or problems on your computer, some of them offer to fix it for free, and the rest after purchase full version or sending SMS. This is a classic scam.

3. Actions of viruses

Regardless of how a computer is infected, viruses can produce various activities and on this basis they are also divided into different types.

Display intrusive ads in Internet browsers, change the address home page, redirect users to different sites. They are installed as an additional program, plug-in or browser panel with other free programs or under the guise of something useful from the Internet.

Spies and Keyloggers

Designed to steal confidential information and passwords. They monitor user actions, look for confidential information on the computer, collect data entered from the keyboard, from the clipboard, take screenshots of the screen and send them to the attacker. The purpose of such programs is a variety of data. Rooms bank cards allow you to steal funds from your bank account. Hacked social media and Skype accounts can send messages to your friends asking them to download a file or visit a website. Mail can be used to send spam. Software license keys, account and property from online games can be sold.

Ransomware blockers

They block the operation of the operating system and display a message with a request to send an SMS or pay a certain amount to some account. After that, it promises to unlock the computer. But in the vast majority of cases, unlocking does not occur. In order to remove such a virus and restore the normal operation of the computer, you need to have some experience.

Ransomware-blockers can report that you allegedly violated license agreement Windows, pretend to be law enforcement agencies (MVD), show shocking pictures and obscene text.

Ransomware ransomware

They quietly encrypt all user files on the computer - documents, photos, videos, etc. When all files are encrypted, a message appears on the screen asking you to send an SMS or pay a certain amount to some account. After that, it is promised to decrypt the files. But in the vast majority of cases, decryption does not occur.

Restoring encrypted files is only possible from a backup. I recommend storing valuable files (documents, photos, etc.) on an external drive.


Botnets

They spread to a large number of computers and provide access to them to an attacker. The virus does not manifest itself until it receives a special command. Infected computers (zombies) are used to organize large-scale attacks on the servers of enterprises, government agencies and send spam.

Backdoors

Provide access to the computer. Using them, an attacker can download various malicious programs to the user's computer. These programs may be removed or replaced as needed.

4. Ways of penetration of viruses

Viruses can enter a computer in several ways - from an infected flash drive, CD / DVD, from the Internet and local computer network. In this case, various vulnerabilities in the operating system, programs, social engineering and phishing can be used.

Flash drives

Many viruses spread using files on flash drives and external drives. It is enough to insert a USB flash drive into an infected computer and the virus will immediately appear on it. Then, when you insert a USB flash drive into a healthy computer, the virus is transferred to it. After that, the newly infected computer starts to infect other flash drives.

CD/ DVD-discs

Viruses can be carried through CD/DVDs. These can be both infected user files and viruses that have penetrated through the disc burning program.

Internet

There are many infected files and programs on the Internet, after downloading and opening them, the computer becomes infected with a virus. In addition, modern sites use scripts and other technologies based on program code to increase interactivity. Attackers create scripts designed to spread viruses. It is enough to go to the site with such a script and the virus is already on your computer, even if you have not downloaded or installed anything.

The local network

If one of the computers connected to a local network with other computers becomes infected, then viruses from it can be transmitted to other computers through public folders or through network attacks. If your provider, in addition to the Internet service, also has a local network, then the intensity of network attacks and the likelihood of infection will be high.

Vulnerabilities in the system

Network attacks are constantly being made on users' computers, which are possible both from the local network and from the Internet. They exploit various vulnerabilities in the operating system, network services, and drivers. Special messages are sent to the user's computer. network packages, which lead to failures in the operation of software components in order to take control over them. Then a loophole is created in them through which the virus enters the computer. To infect, it is enough to connect the computer to a local network or the Internet, no user action is required.

Vulnerabilities in programs

Viruses can also enter a computer through various vulnerabilities in programs. These can be both network attacks on programs using the Internet, and various infected files. For example, malicious code can be injected into Word file, Excel, PDF or any other. When an infected file is opened, control over the program is intercepted and the virus is further introduced into the system.

social engineering

Many viruses are spread by Email and Internet sites by persuading the user that he will get something useful, valuable or interesting if he opens a certain file or goes to a certain site. If the user believes this and takes the proposed action, then his computer will be infected with a virus.

Users are also sent emails, messages in social networks, Skype, SMS, and even calls are received asking for some personal data. In this case, the attacker may present himself as an employee of a bank, a support service of some site, and even a friend or relative.

Phishing

Phishing is a substitution of the address of some popular site in order to infect a computer with a virus or obtain confidential information.

Users receive messages allegedly on behalf of the administration of the site or social network where they are actually registered, with an offer to go to the site to resolve some issue, and they are offered a link very similar to the official site address. If a user follows this link, then his computer becomes infected with a virus.

Also, attackers create special sites that exactly repeat the authorization pages of the official websites of banks, postal services, social networks, online games, etc. The site address can also be very similar. Users are then sent an email, ostensibly on behalf of the site, with some kind of notification and a link to go to the site. By clicking on the link, the user is taken to a fake authorization page, where they are prompted to enter a username and password. After entering the password, it is sent to the attacker and the account is hacked, and the user is redirected to the real site and does not notice the substitution.

After the virus has penetrated the computer, it is written to startup to run every time the computer is turned on. Here are the main ways to autoload viruses:

  • Task Manager
  • Windows Registry
  • Windows Services
  • Internet browser plugins and panels
  • Windows Explorer plugins
  • Infected system files
  • Boot sector or disk partition
  • Alternate NTFS streams
  • network stack
  • Print pool
  • In addition, there are hundreds of so-called autorun points. The same virus can use several of them at once. This makes it much more difficult to detect and remove malware.

    6. Self-defense of viruses

    Almost any virus, having penetrated a computer and registered in startup, tries to protect itself from detection and removal in various ways.

    Automatic restart

    The easiest way to protect a virus is to run several independent processes that monitor each other. If one of the processes terminates, the remaining one restarts it. This makes it difficult to disable the virus to remove it.

    Deletion Protection

    Virus processes in the computer's memory monitor the virus files on the disk and autorun points. If the user or the antivirus deletes the virus file or its autostart point, then the virus processes in memory immediately restore them. Also, the self-healing of the virus can occur every time you boot your computer.

    Disguise

    More advanced modern viruses use various ways disguise.

    Encryption is often used to protect virus files from detection, which prevents antivirus programs from detecting malicious code. When downloaded, the virus code is extracted from the encrypted file and placed in the computer's memory.

    Polymorphic (mutating) viruses change their code every time they infect a new computer, and sometimes every time the computer is restarted. This prevents the antivirus from identifying malicious code using already known signatures.

    Rootkits are special components included in the protection complex of modern viruses. They penetrate the core of the operating system and have the highest powers. Rootkits are designed to hide viruses from antivirus program. For example, they can intercept antivirus disk and registry calls, remove virus file names and registry settings from the data stream, and send already cleaned data to the antivirus.

    Also, the virus itself can run in kernel mode, where only the most important system components, such as device drivers, have access. From there, they can even fight anti-virus programs.

    Neutralization of antiviruses

    Some high-tech viruses can successfully resist anti-virus programs, completely or partially neutralize their algorithms.

    Most dangerous virus one that does not allow itself to be detected, does not lead to problems in the operating system and lives on the computer for a long time in order to steal confidential information and user funds.

    7. Basic ways to protect against viruses

    I decided to divide the ways to protect against viruses and security threats into the main ones - mandatory for everyone, and additional ones - at the request of the user. In this section we will look at the main methods of protection, and in the next we will talk about additional ones.

    Modern viruses are high-tech programs with a complex of masking and self-defense that are difficult to detect and neutralize. Therefore, complex measures must also be taken to protect against them. This is an antivirus program, overlapping all possible ways penetration of viruses and adherence to the principles of security when working on a computer. All this is not so difficult, it is enough to set up the computer well once and not violate certain rules.

    7.1. File virus protection

    In order to protect yourself from viruses infecting files, it is enough to install any antivirus.

    Paid antiviruses provide high level protection from other security threats. It makes sense to acquire them if you are dealing with valuable confidential information or are carrying out serious financial operations. The best for Russian-speaking countries is Kaspersky internet security. If the computer is weak, then you can purchase a faster and lighter Dr.Web security space.

    Of the free ones, for the Windows 7,8.1,10 operating system, I recommend Avast. For Windows XP - 360 Total Security or Avira. Both programs are fast, lightweight, and well suited for low-end computers. 360 Total Security has various additional functions- disk cleanup, monitoring Windows updates, webcam protection and is more suitable for those who like to understand everything. Avira contains everything necessary elements protection and is more suitable for lovers of minimalism who do not want to delve into the settings.

    Never turn off your antivirus or open suspicious files, no matter how much you want to. In the vast majority of cases, you will not get what you want and only hurt yourself.

    7.2. Protection against false and infected programs

    Use only popular well-known programs. Download programs only from developer sites and popular well-known sites. Check all downloaded files at VirusTotal.com.

    Refrain from installing dubious programs, especially those that have been checked by VirusTotal.com as unwanted. Always select custom installation and uncheck optional features.

    7.3. Flash drive virus protection

    It is easiest to protect yourself from computer infection through a USB flash drive. To do this, you need to disable autorun flash drives in the Windows registry. I made a special file that sets desired parameters in the registry automatically and works with all versions of Windows. You just need to run it and agree to make changes to the registry.

    You must restart your computer for the changes to take effect. After that, autorun viruses from flash drives will not be possible. Please note that the autorun window will not appear when inserting flash drives. You can access the flash drive through windows explorer(My computer).

    You can download the file to disable autorun of flash drives in the "" section.

    7.4. Virus protection on CD/DVDs

    CD/DVD autorun could also be disabled in the registry. But the spread of viruses on disks is already rare and antiviruses can easily block them. And disabling autorun disks will cause a lot of inconvenience, since you will have to manually look for the autorun program on them. So I recommend not to bother with it.

    7.5. Browser script protection

    For the Firefox browser, there are very good plugin NoScript. After installing it, some sites may lose some functionality. But it is enough to add them to the allowed list with a simple mouse click and their functionality will be restored.

    But you do not need to add everything in a row, but only those sites that you absolutely trust. Then the security on the Internet will be at a sufficiently high level.

    For Chrome browser there is a similar ScriptBlock plugin. The principle of its operation is the same. On allowed sites, scripts are not blocked, but on the rest you will be safe.

    7.6. Password protection in the browser

    All browsers allow you to remember passwords for sites the first time you enter them.

    This is convenient because you do not need to enter a password the next time you access this site. But this is not safe, as the password from the browser can be stolen.

    For Firefox and Chrome browsers, there is a great LastPass plugin that also offers to save passwords when entering them on sites, but stores them in secure storage. When entering the sites, it substitutes the username and password in the required fields, which is very convenient.

    Do not enter your passwords on other people's computers, as they may be infected with a spyware or keylogger.

    You can download the LastPass plugin in the "" section.

    7.7. Protection against social engineering

    Don't click on questionable online ads, especially flashing pictures with unbelievable promises. At best, you will end up on a site where they will try to convince you to buy something by fraudulent means, at worst, on a site infected with a virus.

    Never download files or follow links from emails that come from people you don't know. No matter how tempting or harmless this message is, in 99% of cases they want to deceive you!

    Also, don't open attachments or follow links from strange messages that came from someone you know (like look at my photo or download a cool program). Most likely, this indicates that your friend's account has been hacked and is being used to send malicious messages. Contact your friend, ask if he sent you this message and warn about a possible problem.

    If the message you think might be of high importance (for example, from your bank), then call them. Do not tell anyone your passwords for banking transactions, e-mail, etc. Official representatives have no right to ask about it.

    Be selective in social networks, do not add everyone who asks you as a friend. These people may try to get your personal data, send you messages to infected, fraudulent sites, or simply bombard you with ads. If suspicious activity appears, remove these people from your friends.

    Recently, attackers also often use SMS and even calls to deceive. Do not send reply SMS and do not call indicated numbers because it will take money from your account. Do not follow links in SMS, they are now used to spread viruses on smartphones. Specify all the information by official phones and official websites, and not by the contact information that was sent to you.

    Recently, there have been more frequent reports that something happened to your relative or you won some very valuable prize (car, house, apartment, etc.) and you are asked for money to settle some issues. Never trust such messages and check information through reliable channels. The main thing is the understanding that no one ever gives anything to anyone just like that. If you did not buy anything and did not register for the promotion, then this is a 99% scam.

    7.8. Phishing Protection

    To protect yourself from site spoofing through phishing, never click on links that are sent to electronic messages. open new page browser and go to the desired site from bookmarks or enter the address manually.

    In all modern browsers There is a built-in protection against phishing. If a site is identified as phishing, then access to it is blocked.

    Similar blocking windows may be displayed when malware is found on the site.

    But browsers can only detect fakes of the most popular sites or those sites that are blacklisted.

    Comprehensive paid antiviruses such as Kaspersky Internet Security and Dr.Web Security Space fight against phishing most effectively. Most popular free antiviruses also have phishing protection.

    7.9. Protection against vulnerabilities in the system

    To protect against vulnerabilities in the operating system, you need to regularly install important updates, as these are mainly security updates. Go to "Control Panel\System and Security\Windows Update\Settings" and check your update settings. I advise you to enable the installation of updates in automatic mode.

    Despite the fact that the official Windows support XP has been discontinued, for some older computers it is the only system that provides sufficient performance and functionality. There is a way to extend the receipt of security updates for Windows XP until April 2019. To do this, I made a special file that adds to Windows registry little change. It is enough to run it and agree with making changes to the registry.

    After that, installation of security updates in Windows XP will last until April 2019.

    You can download this file in the "" section.

    7.10. Disabling unnecessary services

    Another generally recognized method of protection is to disable unnecessary functionality. If potentially vulnerable components are disabled, then an attack on them is impossible. First of all, it concerns Windows services, which run on every computer and are most often targeted for attacks. Many of them are not needed normal operation computer, and disabling them also has a nice bonus in the form of an increase in system performance.

    A-Data Ultimate SU650 120GB Hard Drive

    In order to disable unnecessary services, you need to go to the computer's management console. To do this, click right click mouse on the icon "My Computer" or "Windows" (in Windows 8.10) and select "Manage ...".

    We go to the Services section.

    Now you need to right-click on the service that you want to disable and select "Properties".

    After that, set "Startup Type: Disabled" and click "OK".

    Now, when you turn on the computer, the service will not start.

    It is painless to disable some services that are not network services. Also, if you do not have a local computer network, you can disable some network services. I have prepared a description of the most important services and recommendations for setting them up. You can download them in the "" section.

    7.11. Protection against vulnerabilities in applications

    To protect against vulnerabilities in programs, it is advisable to regularly update them to new versions. Most programs have a feature to check for updates. As soon as an update for the program is found, the user is prompted to install it. Do not neglect updating programs, especially those that work with the Internet (browser, Skype, torrent client, etc.).

    7.12. Protection against network attacks

    The best way to protect against network attacks is to disable unnecessary services, regularly update the operating system and programs in order to eliminate the vulnerabilities that are used in attacks.

    But there are also programs specifically for protecting against network attacks, which are called firewalls. The firewall principle is that it does not allow Internet packets to reach the computer that contain data not requested by the user. For example, if you enter a website address in a browser, you will receive Internet packets with the content of the website in response, and the firewall will let them through. Infected Internet packets arrive at the computer without the user's request and the firewall blocks them.

    IN operating systems ah Windows has its own built-in firewall called the Firewall. With proper system security settings, it is usually sufficient. But there are also third-party solutions that are more advanced and reliable. If your computer has a valuable confidential information or you are actively working with payment systems, then additional protection in the form of a good firewall will not hurt.

    The firewall is part of paid antiviruses, the best of which are Kaspersky Internet Security and Dr.Web Security Space. If you have such an antivirus, then your computer is reliably protected from network attacks and you do not need a separate firewall. In addition, such a solution will be the best in terms of antivirus compatibility with the firewall.

    Of the free ones, the most popular firewall is Outpost Firewall Free, which can be installed from the Outpost Security Suite FREE anti-virus package and used in addition to any free antivirus. The disadvantage of this solution is the possible conflicts between the antivirus and the firewall.

    The best way to protect yourself from attacks from the Internet or the provider's local network is to connect your computer through a router. The router has the functionality of a hardware firewall. It hides your computer from hackers and securely blocks all unsolicited internet packets before they reach your computer. In addition, the router to some extent protects motherboard from electrical breakdowns by the provider, which happens quite often.

    However, a router does not protect against attacks from infected computers connected via it to a home or office local network, but only from those that come from the Internet. Therefore, a software firewall should still be running on every computer.

    7.13. System backup

    Even high-quality computer settings and adherence to security principles do not give a 100% guarantee that some kind of cunning virus will not penetrate the computer. But there is a tool that will reliably protect you from the consequences of infection. This is a creation.

    Built-in tool Windows Recovery is not efficient enough. Firstly, it protects only the most important system files, and the virus can be in another place. Secondly, viruses often infiltrate the backup storage and are restored along with the system restore, which nullifies the entire backup system.

    In order to create a reliable copy of the system, you need to set up your computer from scratch and make a complete image of the C drive using a third-party program. Additionally, this will protect you from any failures in the system or software.

    One of the best backup software is Acronis True Image, it is paid. But there is a great free alternative– Paragon Rescue Kit Free.

    For a successful backup of the system, followed by a quick restore, you need to follow a few simple conditions.

    User files should not be stored on the C drive, otherwise they will be lost during system restore. Please note that the files on the "Desktop" and in the "My Documents" folder are physically located on the "C" drive. Therefore, store all your files on another partition, such as the "D" drive.

    Do not install games on the "C" drive, as they take up a very large volume, which will make it difficult to backup and system recovery. Install games on another partition, for example, on the "D" drive.

    A-Data Ultimate SU650 240GB Hard Drive

    Detailed instructions for using backup programs are available on the developers' websites from the "" section.

    7.14. File backup

    A backup copy of the operating system is designed to quickly restore the computer's performance and completely eliminate viruses. But this will not protect your files if they are deleted or encrypted by a virus.

    To protect your personal files, you should regularly back them up. You can simply copy files to a USB flash drive or external drive standard means, but this is not so convenient and can take a lot of time. It is better to use efficient synchronization algorithms for this.

    For example, in the popular file manager Total Commander has a directory synchronization feature. Open the folder with your files on the computer disk in the left panel, and the folder on the flash drive in the right panel.
    Transcend JetFlash 790 8Gb

    Go to the menu "Tools \ Synchronize directories".

    Set all the parameters as in the screenshot above and click the "Compare" button. After the comparison is completed, click the "Synchronize" button that has become active.

    One of the best free programs designed specifically for file synchronization is . The principle of operation is similar, but it works even better.

    In the left panel, you specify the folders that you want to synchronize on your computer's disk, and in the right folder on a USB flash drive or in another place where backups. After that, the “Compare” button is first pressed, and then “Synchronize”. For example, I synchronize my folders with a drive on another computer over a local network.

    Synchronization takes significantly less time than copying files because only new and changed files are copied. In addition, files that you deleted on your computer are removed from the backup.

    Remember! The question is not if you will lose your files if you don't back them up, but when it will happen...

    8. Additional ways to protect against viruses

    In this section, we will look at additional less popular protection methods that you can apply at will. However, some of them can greatly enhance the protection of your computer.

    8.1. Protection against spyware and keyloggers

    Exist special programs to protect against spyware and keyloggers. The most popular of them are Ad-Aware Free Antivirus+, Malwarebytes Anti-Malware Free, Spyware Terminator. But all modern antiviruses already have protection against spyware and keyloggers, and the use of several antivirus programs at the same time can lead to various problems.

    8.2. Anti-Phishing Plugin

    If you work with a large number of social and payment services and want to have additional free protection, then you can install an anti-phishing plugin. One of the most popular is McAfee SiteAdvisor, which supports Firefox browsers and Chrome. It does not require any configuration, but simply blocks phishing and some other malicious sites.

    Such plugins add some antiviruses to browsers, such as Avast. The link to the McAfee SiteAdvisor plugin is in the "" section.

    8.3. Security with DNS servers

    There are special secure DNS servers to protect against malicious sites. One of the most popular free DNS servers in Runet belongs to Yandex (dns.yandex.ru).

    It is enough to register the address of a secure DNS server in the settings network card and all sites, before they are loaded into your browser, will pass a security check on the Yandex server. Several DNS servers are offered: no protection, protection against malicious sites, and additional protection against adult content (can be used on a child's computer).

    In Windows XP, go to Start/Control Panel/Network and Internet Connections/Network Connections.

    In Windows 7, go to Start/Control Panel/Network and Internet/Network and Sharing Center/Change adapter settings.

    In Windows 8.10, right-click on the "Start" button and select "Network Connections".

    Select Internet Protocol Version 4 and click the Properties button.

    Enter the addresses of Yandex DNS servers.

    After that, only verified safe sites will be loaded in your browser.

    8.4. Working from a limited account

    If you are seriously concerned about the security of working on a computer, then it is a good idea to create a limited user account and work from under it. This is done easily through the "Control Panel / User Accounts ...".

    After that, a password is set on the Administrator account and it is used mainly for installing new programs and configuring the computer.

    The fact is that a virus, having got on a computer or just launched in a browser, receives the authority of the user who is currently working on the computer. If the user works with administrator rights, then the virus will run with administrator rights and will be able to change any system files and registry settings. If you work under a limited account, then if the virus still seeps through a well-tuned protection system, it will not be able to infect system files and register at startup, and it will be easier for the antivirus program to neutralize it.

    8.5. Cleaning the system

    Keep your operating system clean and tidy, then viruses will not be so comfortable in it. Use one of the popular programs to clean the system of garbage. They delete files from the temporary folders of the system, programs and browsers. Viruses and malicious scripts often like to sit in these folders. In addition, you will save disk space.

    Such functionality has, for example, antivirus 360 Total Security. I can recommend an excellent popular program. It keeps the system clean and deletes temporary files every time you boot your computer, a link to it is also below.

    9. Links

    Here you can download all the files that were mentioned in the article and will greatly help you in protecting your computer from viruses.

    Transcend StoreJet 25H3 2TB Hard Drive
    Hard Drive Transcend StoreJet 25M3 1TB
    Transcend StoreJet 25M TS500GSJ25M 500GB Hard Drive

    Computer viruses are a general term for programs that harm the system, steal personal data, or make working with a computer uncomfortable by showing ads. Some malware can encrypt data on hard drives which can lead to their loss. In this article, we will talk about how you can protect your PC from these pests.

    There are several ways to protect against viruses, and their differences lie in the effectiveness and expediency of application. For example, powerful antivirus software designed for the corporate segment will not work ordinary user home PC, and subject to a number of conditions, you can do without antivirus altogether. Next, we will analyze in detail the different options, as well as talk about what to do in case of infection.

    How viruses get on a computer

    In fact, there are only two options for malware to penetrate a PC - the Internet and physical media. Through the network they come to us by downloading various files from dubious sources, sending infected email attachments, as well as more in cunning ways. Avoiding this is quite easy - just follow the simple rules, which we will discuss below.

    With physical media - flash drives - you need to be much more careful. If attacks over the Internet are done at random, then the transfer of an infected drive may have a specific goal. Most often, this is taking control of your PC and (or) stealing personal data - logins and passwords from services and wallets or other important information.

    Method 1: Antivirus

    The expediency of installing a paid antivirus is an individual question for each user. If the machine is used as a source of income, which involves storing important information, projects, and other things, then it is highly recommended to use paid licenses. In the same case, if the computer is intended for leisure and surfing, then you can do without free product, such as Avast Free Antivirus or Avira Free Antivirus.

    It is also worth mentioning that powerful paid programs create a significant load on the system. They're in background constantly monitor processes, check hard drives and downloads from the network. This behavior can negatively affect performance, especially for weak PCs.

    Method 2: Windows System Tools

    All modern Windows versions, starting with XP, are equipped with a built-in antivirus program with the simple name " Windows Defender» ( Windows Defender). This product has the necessary minimum of functions - real-time protection and scanning file system for virus detection. An obvious plus of the program is that the user does not need to install additional software. Minus - low efficiency.

    Windows Defender is perfect if you do not install unlicensed programs on your computer, only trusted resources on the Internet are visited, and the machine is used only as a means of entertainment and communication. In other cases, you should think about additional protection in the form of an antivirus.

    Safety regulations

    Most of the key rules in one form or another have already been voiced above, so just summarize what has been said.

    • In all cases, except in exceptional cases, for example, if you have a very weak computer, you need to use additional protection in the form of an antivirus.
    • Use only licensed programs and visit trusted sites.
    • Do not use other people's flash drives. The information on your flash drives also needs to be protected from viruses.
    • If the computer is a source of income, then it is necessary to use paid anti-virus products.
    • Make regular backups of your system and important files so that you can restore them in case of an attack.

    What to do in case of infection

    Even the most “cool” antiviruses are not able to provide one hundred percent protection. "Craftsmen" are not asleep, and new viruses do not immediately enter the database. If your PC is still infected with malicious code, then you can (should) do the following:

    1. First of all, make sure that the infection has taken place. You can determine it by some signs, as well as using virus scanners.
    2. When pests are found, self cleaning using special utilities, and in case of failure, seek help from specialists on specialized resources.

    Conclusion

    Protecting your computer from viruses is a matter for which the responsibility lies entirely with the user. When choosing a method, try to determine as accurately as possible how you will use the PC. Mistakes can lead to sad consequences in the form of data loss, and possibly even money. If it is quite possible to cope with the first backup, then no one will return the funds to you.

    Any computer connected to the Internet can potentially become a victim of hackers and be attacked by them. Hackers and intruders are constantly "roaming" the network, looking for vulnerabilities to hack computer systems. A hacker can steal just a small piece of information from your PC in order to cause you serious harm. The worst thing you can do is just assume that your computer itself is well protected.

    Who is a hacker and how do they become one?

    Computer hackers are individuals who want to gain access to a computer in order to use it without any knowledge or permission from you, for their own illegal purposes.

    Most hackers are motivated by curiosity, a challenge in life, or a false sense of power, while others are only motivated by money. However, whatever the hacker's motive, computer hacking is an illegal activity, and hackers are real people who can break into your computer just like thieves can break into your home.

    Therefore, you must know how to stop hackers (thieves) and how to protect your computer from hackers who can steal your money or damage your personal reputation.

    There are various subgroups of hackers, differing in their "moral" attitudes.

    • For example, "white" hackers do not break into systems for malicious purposes,
    • while "black" hackers compromise security for criminal purposes, such as stealing information about credit cards or vandalism.

    Stages of activity

    1. The hacker first collects information about the intended target,
    2. figure out the best plan of attack,
    3. and then attacks possible vulnerabilities (weak points) in the system.

    Malicious programs such as Trojans and worms are specifically designed and used by hackers to hack.

    While there is no completely foolproof method to protect yourself from hackers, you can, however, prevent yourself from becoming an easy target for them. Learn how to protect your computer in affordable, effective and free ways.

    Protection against hacker tools: antivirus, firewall and antispyware

    First of all, download and install an antivirus application. Antivirus software helps to protect the system from external threats. Malicious, Trojan, hacker programs and viruses are developed "non-stop" for a variety of reasons. Such programs are designed to produce various computer failures, including turning off the firewall.

    They may come in the first wave of attacks before a hacker can actually search your computer for the information he needs.

    Keeping your antivirus software up to date will help protect your computer from latest versions viruses.

    Run a virus scan regularly. Choose a convenient time when you are not using your computer or, for example, are away on business - because virus scanning slows down your computer significantly. Scan your hard drive at least once a week.

    Always use a firewall (firewall). A firewall is designed to block unauthorized and unwanted traffic and is your main line of defense against hackers and intrusions. Almost all computer operating systems include a firewall, but sometimes it can be turned off by default. Leaving the firewall off is like leaving your front door open at night.

    Turn on the system firewall (click "Start" - "Control Panel" - "Security", then " Windows Firewall”) unless you are using a third party firewall. Be aware that running multiple firewalls at the same time is redundant - it does not provide additional security, and in fact can even be counterproductive. Therefore, choose one.

    A firewall will protect your computer from external hackers by making it invisible to them and their attacks. It is highly unlikely that a hacker will spend much of their time trying to break into your personal firewall.

    Find a reliable anti-spyware program and install it on your PC. Spyware placed on the system can collect small pieces of information without your knowledge.

    Spyware is often used by marketing firms to monitor consumer buying habits. Information obtained from spyware, even if it is for marketing purposes, is still obtained without your knowledge or consent.

    Web surfing and mail

    How to protect your computer while surfing the web? Never let browsers remember your passwords on websites, login forms, profiles, etc. Of course, it can be inconvenient to enter a password each time you log in to your Mailbox, V social network or payment system.

    But by letting your browsers remember passwords for you, you invite hackers to throw a "party" on personal accounts and in the system.

    Make your passwords long and complex, with a good mix of letters and numbers. To be completely safe, don't use anything related to birthdays, your children's names, or anything like that.

    If a hacker wants to hack something from you, at least make him sweat a lot. Never use the same password for different accounts, and change your password every 90 days.

    Hackers are known to use email as a form of transmitting malicious codes. Never open email attachments from someone you don't know, even if you're very curious to do so.

    Do not open emails and messages from strange sources. Opening "weird" messages and the attachments that come with them is one of the better ways become the "prey" of a hacker.

    Only download files or anything else from sources you trust. Often hackers can attach items for download or even hide viruses and other things like " secure boot”, which, after installation, begin to steal personal information.

    It can be very tempting to click on the various "annoying" ads that pop up as online ads like "You just won a free iPhone!".

    But most of these ads can be faked to install spyware or adware in your OS after clicking on them. You are asking for trouble if you click on these ads.

    Disconnect your computer from the Internet when not in use. Most people prefer to leave their computer connected because they find it convenient to get online quickly.

    However, leaving your computer on even when you're away poses some security risks. The hacker in this case, human or robot, may have more time to test and identify vulnerabilities in your computer's security.

    And turning off your computer will not only save energy, reduce wear and tear on computer parts, but also prevent hackers from transmitting signals to your computer. The only sure way to make a computer completely invisible and protected from hackers is to disable access altogether.

    Keep your operating system updated with the latest security patches. Use the automatic update feature of your computer's operating system.

    Operating system developers regularly release security updates for all registered users. Hackers are good at spotting OS security loopholes, and turning off automatic updates leaves those loopholes open.

    Finally, keep track of events in the system. Check your system logs periodically to see what your computer is doing. If you receive notifications about any programs that you do not know, be on the lookout. Watch for any warnings and TCP/IP messages.

    So how do you protect your computer from hackers? Just follow the above tips while keeping your computer up to date with firewall support and it will help you keep hackers at bay as they will likely keep looking for an easier target than your PC.

    I decided to write my own instruction on computer security.

    1.Selecting a password.

    The word nemonic just sounds scary. With this help, you can create long passwords that are very easy to remember and impossible to guess. They are much more reliable than a set of 8-9 random letters with numbers, and much easier to remember.

    Creating a mnemonic password is very easy. Choose a phrase that you will never forget. Any song chorus or quatrain that you already know by heart will do.

    For example:

    Why does it exist in the world
    Article one hundred thirty-four?
    Prevents children from loving
    With whom it is possible - he decides for them!

    If you write down all the first letters of this chorus, and the number of the article in numbers, you will have a wonderful 17-character password: zsvms134dlmskmznr.

    Looks difficult? You don't even have to memorize it, just remember that these are all the first letters from the chorus of the song, which you already know.

    Zachem Sushetvuet V World
    Statya134
    Detyam Love Meshaet,
    S Kem Mojno - Za Nih Reshaet!

    It is even better to write down one word in a row as a whole. For example, the word statya: zsvmstatya134dlmskmznr. You've got a giant 22-letter password that can't be picked up or spied on, but you'll never forget it.

    From one chorus, you can collect dozens of strong passwords, for example, by highlighting not the first, but the last letter in the words: mtea134mttsmoaht. But it is better to choose your own quatrain for each new password.

    Disclaimer: Do not under any circumstances use the quatrain from my example. After this article, it will be punched in the first place. Choose your own, something not too famous.

    2. Encrypt data on your computer.

    The police hacked into Navalny's emails through a seized computer. They committed a misdemeanor (who's surprised?), but that's no excuse for being careless. If Navalny had encrypted the data, the investigative committee, in an embrace with the hacker Hell on the navel, would have twisted, but nothing would have been extracted.

    Remember, the system password does not protect against anything. What you enter when you turn on the computer is a meaningless trick. It only protects data encryption.

    Namake, this is done in a couple of clicks with built-in tools, here is a step-by-step instruction.

    On a PC, it is best to download TrueCrypt. It is also very easy to set up.

    Once you have encrypted the entire system, you can be sure that without a password none of your files can be read. For you, it will look just like a normal login. Only in contrast to the system password, these programs securely protect your data.

    Disclaimer: When encrypting a drive, remember that if you lose your password, you will have no way to access your files. This is the essence of encryption.

    3. Do not link a phone number to your accounts.

    I have seen activists paranoidly remove batteries from their phones before a meeting, but do not hesitate to enter a cell number in case of "password recovery". Your phones are already being tapped, reading SMS is even easier. One password request on the phone + SMS interception and your mail is compromised. The simple secret of the cool hackers from the "E" center.

    4. DO NOT USE SECRET QUESTIONS.

    Figuring out your mother's maiden name is not easy, it's incredibly easy. It will take me about 3 clicks, the center "E" one single call.

    Finding out the name of your pet is also a trivial task. For example, Yulia Sazonova’s mail asks “my dog’s name.” I figured it out in 10 minutes. Julia, change the question, and the password at the same time.

    By the way, her mother's maiden name is London. It's a question of how easy such things are to compute.

    It's best not to enter a security question at all. If some service insists on it, enter deliberate rubbish (long!), which cannot be picked up.

    5. Do not link different accounts to each other (especially Facebook to mail).

    Thus, by withdrawing one account, all of you will be withdrawn at once.

    6. NEVER use Russian mail providers.

    All Russian providers electronic services accountable to law enforcement agencies and will give your account on demand.

    7. Make the most of incognito mode in your browser.

    Cookie hijacking is one of the most common methods of access hijacking. In incognito mode, all new cookies are automatically deleted after the window is closed.

    It was safety. The very basics of prevention available to everyone. The next two points are a little more advanced. If you do them too, your online stay will be bulletproof.

    8. Get a VPN abroad.

    In 2000, the then “K” department ordered all telecom operators to install the SORM system. Since then, special services have been able to track all your activities on the Internet with one keystroke.

    VPN is an encrypted tunnel (signal) to a remote computer. All you really need to know is that with it your activity will become absolutely opaque to your provider, and therefore to Russian intelligence agencies and hackers. Under VPN, it is safe to use open Wi-Fi, go from unfamiliar places to the network and not worry that your signal will be intercepted by a sniffer.

    All reliable VPNs are paid, but they cost their money. I strongly advise you not to use free services, they are slow and in most cases are sweet traps.

    I use VyprVPN, I got it with a giganews account. There are even more reliable providers:

    A VPN will secure all your equipment. Through VPN, not only a computer, but also an iPhone, and an iPad, and Android phones can work.

    Everything is set up very simply: instructions for iPhone / iPad, instructions for mac, instructions for Windows7, instructions for android

    Once everything is set up, you will not need anything else. Everything will work as before, you will not notice the difference. Only you will be protected.

    An additional bonus is reliable protection against the new censorship law. Whatever resources United Russia and Ilya Ponomarev decide to block, you will still have access to all sites banned in Russia. You will also have several foreign aipins to choose from in different parts of the world. You will no longer be tracked directly on the web, as your trail will lead to other countries.

    9. Make a secret mailbox that no one will know about.

    My public mail This address is 7 years old, all letters come to me here, all my accounts are registered to it. But it's just a screen, I don't use it. From it, all letters automatically go to a completely different address, and from this box they are immediately automatically deleted. Similar autoforwarding on gmail is very easy to set up

    I reply to letters from a secret address. Let's name it None of my recipients knows this, because the public address is spoofed (written) in the body of the letter. This is also very easy to set up in the same gmail

    Thus, there is no mail for me, it is a technical address that I distribute to the whole network. I go into it every six months to change the password and that's it. But for everyone else, there is no address where I write mail, use Google, and so on.

    Of course, if someone gets hold of your public address and examines your settings, they will also know your secret address. But in front of him there will be virgin-clean mail, because the entire archive of you is stored in a completely different place. (Unlike fools who advise never to keep archives, I understand well how important it is to save everything.) While the cracker will frantically break your secret mail, you will have time to calmly return the public address, transfer the archive to a new location.

    10. Don't be a fool.

    Do not write down the password on a piece of paper or text file. Do not use the same password on different accounts. Do not log in on other people's computers. Do not download dubious files, do not respond to phishing. And also to your wife, forget that a talker is a godsend for a spy.

    PS: I deliberately did not begin to explain how it works, but only how to work with it. My task was to write the most accessible practical guide. For the same reason, I did not begin to describe other more zadrotskih means of protection. There are many of them, they are reliable - but they seriously affect usability.

    Once you've set everything up, you won't notice any difference in usability at all. I armed you, if they continue to break you, then you are your own fools.



    Loading...
    Top