Computer viruses--just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there's a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you:
Understand the risks and analyze your PC's current condition Select, install, and configure antivirus software Scan your computer and e-mail Rid your computer of viruses it's already caught Update antivirus software and install security patches Use firewalls and spyware blockers Protect handheld PDAs from viruses Adopt safe computing practices, especially with e-mail and when you're surfing the Net Written by Peter H. Gregory, coauthor of CISSP For Dummies and Security + For Dummies, Computer Viruses For Dummies goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best program(s) for your needs.
Remember, if you don't protect your computer, not only do you risk having your computer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book! This guide will help you properly immunize your PC with antivirus software now and install updates and security patches that are like booster shots to keep your software protected against new viruses.
Author(s): Peter H. Gregory
Series: For Dummies
Publisher: For Dummies
Year: 2004
Language: English
Pages: 274
Computer Viruses For Dummies
Introduction
About This Book
How This Book Is Organized
Conventions Used in This Book
What You’re Not to Read
Meanings of the Term “ Virus”
Foolish Assumptions
Icons Used in This Book
Where to Go from Here
Write to Us!
Part I: Evaluating Your Virus Situation
Chapter 1: Understanding Virus Risks
Assessing the Threat to Your Computer
Deciding How Much Security Is Enough
Chapter 2: Does My Computer Have a Virus?
Looking at Common Virus Symptoms
Finding and Fixing a Virus
Developing Good Habits
Finding Out More about Viruses
Chapter 3: Does Your Computer Have Antivirus Software?
Understanding Antivirus Software
Looking Around for Antivirus Icons
Asking at Your Place of Purchase
Checking the Health of Your Antivirus Software
Part II: Deploying Your Antivirus Defenses
Chapter 4: Obtaining and Installing Antivirus Software
Sticking with Name Brands You Know
Considering Important Antivirus Features
Upgrading and Switching Brands
Checking Out the Purchasing Venues
Installing Antivirus Software
Chapter 5: Configuring Antivirus Software
Setting Your Computer Boot Options
Configuring Automatic Protection
Scheduling Scans
Scheduling Updates
Configuring Heuristics
Configuring E-Mail Protection
Configuring Instant Messaging Protection
Chapter 6: Scanning Your Computer and E-Mail
Deciding to Scan Your Computer File-by-File
Scanning for Viruses
Scheduling Scans
Evaluating Online Scanning Services
Scanning E-mail
Chapter 7: Ridding Your Computer of Viruses
Interpreting Warning Messages
Finding Quarantined Files
Repairing Your System
Part III: Maintaining Your Vigilance
Chapter 8: Updating Antivirus Software and Signatures
Getting a Signature Update
Deciding How Often to Get Updates
Getting Updates
Scanning after an Update
Chapter 9: Installing Security Patches
Figuring Out Why You Need Security Patches
Scrutinizing Security Patches
Preparing to Install Security Patches
Installing Security Patches
Installing Service Packs
Removing Patches
Chapter 10: Using Firewalls and Spyware Blockers
Protecting Your Computer with a Firewall
Dealing with Spyware
Chapter 11: Protecting PDAs from Viruses
PDAs Grow Up (And Grow Vulnerable)
Understanding Why Antivirus Software Is Needed for PDAs
Installing and Configuring Antivirus Software on PDAs
Protecting Your PDA in Other Ways
Protecting and Securing Your Computer
Chapter 12: Incorporating Safe Computing Practices
Backing Up Your Data Regularly
Installing Only Programs Known to Be Safe
Saving Your License Information
Securing Your Web Browser
Keeping Alternate E-Mail Accounts
Surfing the Web Safely
Sharing Personal Information Carefully
Adding Parental Internet Blockers
Avoiding Spam
Blocking Spyware
Using Public Computers
Part IV: Looking at Viruses under the Microscope
Chapter 13: Viruses and the Losers WhoWrite Them
Invasion of the Computer Viruses
How Viruses Have Evolved with the Times
How Early Viruses Spread from Computer to Computer
The People Who Write Viruses
The Origins of Antivirus Tools
Chapter 14: Trojan Horses, Worms, Spam, and Hoaxes
Trojan Horses: Misleading Tricks
Phishing Scams: Skilled Imposters
Worms: Viruses on Autopilot
Hostile Web Sites: Caution — Contains Poison
Scams and Fraud
Hoaxes: Preying on Gullibility
Chapter 15: How Viruses Function and Propagate
Types of Viruses
How Viruses Propagate
Part V: The Part of Tens
Chapter 16: Almost Ten Myths about Computer Viruses
My Computer Stopped — I Must Have a Virus
I Have Antivirus Software, So My Computer Can’t Get a Virus
All Viruses Are Destructive
Viruses Can Damage Computer Hardware
Viruses Can Hide inside Data Files
Pictures Can Give You Computer Viruses
I Need More Than One Antivirus Software Program to Be Fully Protected
You Can’t Get a Virus from an Official Software CD
Antivirus Software Companies Create Viruses
Some Countries Sponsor Virus Writers and Hackers
Chapter 17: Ten Antivirus Programs
Command Antivirus
eTrust EZ Armor
F-Prot for Windows
F-Secure
Kaspersky
McAfee
NOD32 Antivirus System
Norton AntiVirus
Panda Antivirus Platinum
PC-Cillin
Vexira Antivirus for Windows
Index