Skip to main content

12 Tips to maintain a Virus Free Computer.

Is your computer infected with virus? Do you often get mysterious error messages? Well, this is a common problem faced by almost all the computer users across the globe.
Even though some of them are harmless, they do have the ability to do a number of nasty things up to and including damaging or erasing sensitive data from your computer. However, there are ways to keep viruses and other malware away from your computer.

Ways to Keep Your Computer Virus Free:

Here are the 12 tips to maintain a virus free computer:
  1. Email is one of the common ways by which your computer can catch a virus. So, it is always recommended to stay away from SPAM. Open only those emails that has its origin from a trusted source such as those which comes from your contact list.
    If you are using your own private email host (other than Gmail, Yahoo, Hotmail etc.) then it is highly recommended that you use a good spam filter. And finally NEVER click on any links in the emails that comes from untrusted sources.
  2. USB thumb/pen drives is another common way by which viruses spread rapidly. So, it is always a good habit to perform a virus scan before copying any data onto your computer. NEVER double-click the pen drive to open it. Instead right-click on it and select the option “open”. This is the safe way to open a pen drive.
  3. Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail programs, unless you have an efficient antivirus programs running. Use Pegasus or Thunderbird (by Mozilla), or a web-based program such as Hotmail or Yahoo (In Firefox).
  4. As we all know, Internet is the main source of all malicious programs including viruses, worms, trojans etc. In fact, Internet contributes to virus infection by up to 80 percent. So, here are the tips for safe surfing habits so that you can ward off virus infection up to the maximum possible extent.
    • Do not click on pop-up windows that announce a sudden disaster in your city or announce that you’ve won an hourly prize. They are the ways to mislead Internet users and you should never trust them.
    • You can also use a pop-up blocker to automatically block those pop-ups.
  5. Most of us use search engines like Google to find what we are looking for. It is quite obvious for a malicious website to get listed in the search results. So, in order to avoid visiting those untrusted malicious websites, you can download and install the AVG LinkScanner which is a freeware. This tool can become very handy and will help you to stay away from those malicious websites.
  6. Install a good antivirus software and keep it updated. Also perform full system scan periodically. It is highly recommended that you turn on the automatic update feature. This is the most essential task to protect your PC from viruses. If PC security is your first option then it is recommended that you go for a shareware antivirus software rather than using the freeware stuffs.
    Most of the antivirus programs offer the auto-protect feature that provides real-time security for your PC. Make sure that this feature is turned on.
  7. In addition to an antivirus, it is worthwhile to spend a few bucks on a good anti-spyware program. This can provide extra security for your computer.
  8. Never open any email attachments that come from untrusted sources. If it is a picture, text or sound file (these attachments end in the extensions .txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, .html, and .avi), you are probably safe, but still perform a virus scan before opening them.
  9. Do not use disks that other people gave you, even from work. The disk could be infected with a virus. Of course, you can run a virus scan on it first to check it out.
  10. Set up your Windows update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both the operating system and Internet Explorer. These updates fix security holes in both pieces of software.
  11. While you download files from untrusted websites/sources such as torrents, warez etc. make sure that you run a virus scan before executing them.
  12. And finally it is recommended not to visit those websites that feature illegal/unwanted stuffs such as cracks, serials, warez etc. as they contribute much in spreading of virus and other malicious programs.

Comments

Popular posts from this blog

Top 10 Free Instagram Hacker App For iPhone and Android.

Top 10 Free Instagram Hacker App For iPhone and Android Posted by Nagesh ;) Instagram is no doubt one of the most used apps when it comes to uploading and sharing pictures with your friends and families. However, as much as you may like to use Instagram, the fact remains that anyone can access your account with or without your consent. How is this possible you may ask? The answer lies in the Instagram hacker app. Yes!! You heard right. An Instagram hacker app is a type of an app that works by retrieving passwords and other login details from a target account. As it stands, since Instagram is available on both the Android and iOS platforms, these apps can be found on this platforms as well. These Instagram hack apps are efficient when it comes to hacking passwords, so it's best to be guaranteed that they will hack your IG account in a matter of minutes. Part 1: 5 Free Instagram Hacker App For iPhone Part 2: 5 Free Instagram Hacker App For Android Part 3: Using ...

How Hack.chat Makes Private and Disappearing Chatrooms in 5 Seconds

How "Hack.chat" Makes Private and Disappearing Chatrooms in 5 Seconds There is no dearth of instant messaging applications these days and people are addicted to Facebook Messenger, WhatsApp, Snapchat, IM on Twitter, Hangouts and other apps for communicating to each other every moment. Recently, Facebook announced that now  you don’t even need a Facebook account to use Messenger . But if you want to create your own DOS style chatroom right from your web browser that destroys itself when chat’s over,  Hack.chat  is the just the right thing for you. W hen you use  Hack.chat , there’s nothing to worry about privacy breach or sign-ins. Creating a chat room is dead simple and it could be disposed at any point after the completion of chat. I call it disposable as it doesn’t keep record of all unappropriated and private message you’ve ever sent. How to create instant disposable chatrooms with Hack.chat? Creating a private chatroom in  Hack.chat ...

How to Unlock MAC with Android Device’s Fingerprint.

How to Unlock MAC with Android Device’s Fingerprint.                                                                                  May 18, 2017                                Unlock Mac with Android Device's Fingerprint Now you can Unlock Mac with Android Device’s Fingerprint by creating the common authentication platform between both the device to use your Android device as an authenticator for your Mac.   W hile if you are a Mac user, then you might be simply knowing that there are a lot of apps on the iPhone devices that could be used to interact with the Mac system. Many apps could be used to unlock your Mac directly through the iPhone device, and this is what the users p...