5. Protection methods and types
Assets* Antivirus: programs that try to discover the traces left by a malicious software, to detect and eliminate it, and in some cases contain or stop the contamination. They try to control the system while it works by stopping known infection routes and notifying the user of possible security incidents. For example, when you see that a file called Win32.EXE.vbs is created in the C: \ Windows \% System32% \ folder in the background, you see that it is suspicious behavior, it jumps and notifies the user.
The selection of an antivirus program is made depending on the type of protection that is desired and the environment (home, office or corporate). Focusing on solutions for the home or small office, there are numerous programs on the market that offer adequate protection.
No antivirus program offers 100% protection, so we must choose according to the periodic comparisons that appear on pages such as cnet.com, pcmag.com or toptenreviews.com.
For personal use there are free solutions, which offer more than 95% protection such as:
or G DATA
or F-Secure
or TrustPort
or Kaspersky 2010
or eScan
or The Shield
o AntiVir Premium
or Ashampoo
or Ikarus
or AntiVir Personal
or AVG Free
or Avast Free
o BitDefender 2010
o Avast Professional
or Nod32
o BitDefender 2009 Free
* File filters: consists in generating filters of harmful files if the computer is connected to a network. These filters can be used, for example, in the mail system or using firewall techniques. In general, this system provides a security where the intervention of the user is not required, it can be very effective, and allow to use only resources more selectively.
Liabilities
* Avoid introducing removable storage media to your computer that you think might be infected with a virus.
* Do not install software "pirate", it may have dubious origin.
* Do not open messages from an unknown e-mail address.
* Do not accept e-mails from strangers.
* Learn and use more secure operating systems.
* Do not open documents without ensuring the type of file. It can be an executable or incorporate macros inside it.
* Instructive to take some solutions:
o The backup of personal information is basically "copy" files in another place, which must be a location on the computer that is safe and recognized by the user. The above is of great importance, since, despite the fact that the technology advances every day, any type of physical incident at the software level that affects your computer, will produce loss of your information. Generally the files that we manage in our team acquire a personal value with the passage of time: jobs, reports, images, documents, which had special dedication to finalize them. Although on some occasions the recovery methods are effective, the recovered information is recovered in a disorderly manner and with different names.
To back up files on DVD, we must take into account the files to be backed up, for this we will search and select the folder that contains those documents, which are recommended to be correctly identified. In this first step, it is recommended to store all the information in the My Documents folder, since it has easy access to the categories Documents, Music, Images, among others, not in the Desktop folder, since this location generates different folders with the same systematized information that allows to store the file My Documents.
A specific recommendation for the personal user is to backup in an external storage medium with sufficient space (pendrive or external disk) and store it with a trusted friend or neighbor. This simple method offers a fairly adequate security, as long as we periodically update the information contained in said backup.


0 komentar:
Posting Komentar