10 main rules and how to defend against computer viruses (malware) and Trojans? a “February 2 Although the hackers are running to develop new tricks to steal identities and commit crimes, we the users can actively participate in protecting of our systems. You need only a powerful combination of security software and the determination to follow some basic safety guidelines. Then mention the main rules to improve the protection of a computer: 1 .- Protect your computer via a powerful Antivirus Software: Make sure Antivirus is a reliable and updated constantly. Effectiveness of this will depend upon virus detection, as if it has a database updated and a solid record automatically detect and remove malicious code. 2 .- Use a secure firewall and try to set it up very well, since it is responsible for registering all traffic entering and leaving your computer through the Internet and block those that do not meet safety criteria you’ve specified. More information is housed here: Pete Cashmore.
3 .- Enable Windows Auto Update: or download Microsoft updates regularly to keep your operating system protected against known vulnerabilities. 4 .- Try to be very careful when opening attachments: Never open commercial emails you have not requested or attachments do not expect, for better protection configure your antivirus software to scan all attachments automatically from your emails. 5.-Take precautions if you use file-sharing networks: the Trojans are currently hidden in sharing files waiting to be downloaded. When you download these files prevents run files with the extensions:. Exe,. Scr,. Bat,. Vbs,.
Dll,. Bin,. Cmd. A tip: Before opening tries to analyze them with your antivirus software. 6 .- Before accessing a website, make sure it is safe. For this there are many software that performs these checks automatically. 7 .- Also very important is to download the latest version of your browser: browsers now use a Tectology to identify and filter sites that may contain malicious code. 8 .- As I said in my previous article avoids downloading suspicious programs, the most common is that the Trojans are hidden in free programs which, when downloaded by the user and then executed, they begin to infect our PC. 9 .- Back up your files regularly and store them in a different location on your computer. If you are a victim of a Trojan attack, you can recover your photos, music, movies and personal information like your tax returns or bank statements. 10 .- a sta is the most important rule of all: Try to make all those rules. And most importantly, makes it at least. A greeting and I hope the information has proved interesting.