Threat Type: Software based, victim enabled Examples of Threats:Modify, corrupt, or destroy files on your computer Corrupt the computer operating system causing unpredictable behavior, poor performance, or security holes Unauthorized e-mailing of files or the virus itself to people on your contact list Allow a hacker to gain control of your computer through a back door Our Tips:Enable antivirus protection at your Internet service provider (ISP) and/or e-mail provider if it is available. Install antivirus software on each computer in your home network. Set up antivirus software to automatically perform periodic virus scans. Make sure any antivirus software automatically retrieves signature updates. | When people talk about computer and network security, they almost always mention computer viruses sooner or later. Even people who do not often use computers have heard about viruses because of all the news hype that surrounds them. In this chapter, we discuss viruses and other malicious code (collectively referred to as malware, bad software), including where they come from, what they do, how you can protect your computer against them, and how to get rid of them if you do get infected. |