Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Welcome to the TechnoWorldInc! Community!
Recent Updates
[August 11, 2025, 02:03:44 PM]

[August 11, 2025, 02:03:44 PM]

[August 11, 2025, 02:03:44 PM]

[August 11, 2025, 02:03:44 PM]

[May 13, 2025, 02:04:25 PM]

[May 13, 2025, 02:04:25 PM]

[May 13, 2025, 02:04:25 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Ethical Hacking / Security / Viruses » Viruses
 Tips for preventing VIRUS, WORM and TROJAN HORSE infections
Pages: [1]   Go Down
  Print  
Author Topic: Tips for preventing VIRUS, WORM and TROJAN HORSE infections  (Read 787 times)
Daniel Franklin
TWI Hero
**********


Karma: 3
Offline Offline

Posts: 16647


View Profile Email
Tips for preventing VIRUS, WORM and TROJAN HORSE infections
« Posted: September 29, 2007, 04:10:31 PM »


Methods that guarantee a computer or network is safe from computer viruses, worms and trojan horses simply do not exist. Users can take several precautions, however to protect their home and work computers from these malicious infections. The precautionary measures are:

1. Never start a computer with a floppy disk in drive A; unless it is an uninfected recovery disk.

2. Set the macro security in programs so you can enable and disable macros. Only enable macros if the document is from a trusted source and you are expecting it.

3. Install an antivirus program on all of your computers. Obtain updates to the antivirus signature files on a regular basis.

4. Check all downloaded programs for viruses, worms, or trojan horses. These malicious-logic programs often are placed in seemingly innocent programs, so they will affect a large number of users.

5. Never open an e-mail attachment unless you are expecting it and it is from a trusted source. Scan for viruses in all e-mail attachments you intend to open. Turn off message preview.

6.Write-protect your recovery disk by sliding the write-protect tab into the write-protect position.

7.If the antivirus program flags an e-mail attachment is infected, delete the attachment immediately.

8. Before using any floppy disk or zip disk, use the antivirus scan program to check the disk for infection. Incorporate this procedure even for shrink-wrapped software from major developers. Some commercial software has been infected and distributed to unsuspecting users this way.

9. Back up your files regularly. Scan the backup program before backing up disks and files to ensure the backup program is virus free.

Articles Source - Free Articles

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.057 seconds with 23 queries.