How to determine that you will catch a computer virus in a couple of days?

A virus is a program written to harm the user through data corruption or theft, and possibly damage to equipment. Viruses do not have a graphical interface and work in the background without showing obvious signs of their presence. Nobody wants to catch a virus on their computer or smartphone, so let's discuss how to understand that in a couple of days a virus will settle on your device.

Virus habitats

Device infection does not have to wait long if you walk side by side with viruses in where they are most concentrated.

Infected programs

Today, in 99% of cases, infection occurs via the Internet. But not all the Internet is the same, the greatest danger is fraught with software sites - warez. When you search for a program for Windows, the search engines do not always display the official website of the program in the top line. Unfortunately, the scammers have perfected the skill of promotion in the Yandex and Google search engines so much that the official site may not be in the first position of the search results.

Fraudulent sites usually contain the name of the program with other prefixes and subdomains in the name. The sites are similar to normal, with a good description of the program and a direct download link. Most likely, the program will even turn out to be working, but additional services and browsers will be installed on the computer, and maybe a virus. It is especially dangerous to run an installation file if it takes up little space than expected. For example, the program should "weigh" at least 10-20MB, and the installer takes only 1MB on the disk. The task of the installer is to download the program and "something else".

There are large warez aggregators where you can download almost any program, each of which will be with a surprise. But usually in this case there will be no virus, but the sudden replenishment of shortcuts of unnecessary services in the Start menu and on the Desktop is guaranteed.

To filter dangerous sites, you need an antivirus with an Internet filter. BitDefender Antivirus analyzes websites with potentially dangerous content on the fly and blocks page loading, so experts often rate this program. BitDefender is able to completely block the site, issuing instead of the page, a warning on the entire browser window. The site may be normal, but loaded with potentially dangerous javascript. In this case, the page appears, but only these scripts are blocked from loading.

Sites with hacked paid programs pose the greatest danger. They offer to download the program and the crack file."Kryak" is a small program, can be called "Crack.exe", "keygen.exe" - to generate a valid serial number, or somehow. Hackers do not work for free, which means there is some kind of benefit. This benefit in the bush in the program for hacking.

The complexity here is that the crack can be clean, and maybe with a trojan. It is difficult to find out because Anti-virus software almost always defines cracks as viruses. This is due to the work of heuristic analyzers who know how to determine the threats of the zero day, i.e. More unknown viruses. Kryaki intervene in the executable third-party files, which means their behavioral pattern potentially unsafe, resembles a virus. For a more accurate definition, the virus is or not, Run a file of 80 anti-virus databases using the VirustOl service.

Email and flash drives

Another "lackcle" for intruders is your email. Boxes are clogged with dozens of letters with setting themes:

  • You came with money transfer!
  • You won a random promotion!
  • You got the inheritance from the African Millionaire Grandpa!
  • The first Bitcoin sent to you!

Any letters from unknown addresses with detachable contents are dangerous letters. In no case cannot be followed by links and open attachments, even pictures! Even if the destination is known to you, you need to know that there is no problem send a letter and specify any addressee. For example, I can send you a letter from the address "[email protected]". For better protection, you need to install antivirus with phishing protection, for example, BitDefender AntiVirus, the database of phishing sites of which is constantly updated.

If you mindlessly open all the letters with the hope of winning a million or get the inheritance from Buffett, then the fun evening you are secured! And even better - disable spam filters or use mail with filters. The best protection is provided by mail Gmail, Mail. Ru, Yandex.

Even more infection will accelerate a disorderly effect of other people's flash drives that bring to the workplace. Without an installed antivirus with the function of scanning removable media, the flash drives are just a storage of viral threats.

Software for protection against viruses

How fast and what kind of virus you do, depends on your protection methods. The most common is:

  • Troyans
  • Ruktites
  • Encryptors-extortionists
  • Spies
  • worms

Troyan is a malicious program that comes in a set "with other software. Trojan can delete, block, change, copy data, affect the operation of the computer and network, as well as download another malware. The work of antiviruses is most aimed precisely on the detection of Trojans.

Root tiles attack the kernel of the OS and system files are capable of putting the maximum damage to the computer by operating at a low system level. As a rule, all eminent antiviruses can detect rootkits.

Encryptors have become a big headache over the past few years. They encrypt the files on the hard disk and reboot the computer, but instead of the greeting the message is shown on the entire screen with extortion of redemption. Further operation of the computer is impossible. A large redemption in the equivalent of $ 500-700 is asked in cryptocurrency Bitcoin. It is due to the growth of popularity cryptocurrency, encrypters received widespread. Cryptocurrency anonymous and do not allow to track the final recipient of funds.

Do not pay for the requested amount, because No decryption key exists. In some cases, the data can be decompressed using special utilities. BitDefender anti-virus is sharpened to work with extortioners, it detects encryption attempts and instantly blocks the operation, restoring already encrypted files from the backup. The chances of infection are growing strongly if you do not use specialized software for extortioners, then

Spy viruses steal confidential information, such as logins and passwords, bank card data, Private keys, work documents, personal correspondence, photos and videos. Also, spies are able to include a webcam and microphone to monitor what is happening in the room. On smartphones, spies are able to inconsistently include the camera as applications for hidden shooting on android.

In order not to infect the spyware to use the usual antivirus together with the added anti-spin softe. For example, Antispyware Blaster closes in browsers the ability to start spy scripts and installing cooking files. There are antiviruses working in real time, as ordinary antivirus, but sharpened to the capture of spyware.

For maximum spy protection , it is recommended to use the OS not lower than Windows 10. The top ten embeds the functions of controlling the rights of access to the webcam and microphone. Tools can only be used by those programs that are clearly provided with rights.

worms fall onto a computer not by running the infected program. They are inlets through network holes, network vulnerability and open ports. Anti-viruses with real-time protection function, in principle, caught the worms in the system, but it will be an incessant process. To proper protection, you need to include a firewall, which is embedded in Windows 7/8/10 or is part of the antivirus. Firewall (firewall) closes vulnerable ports, monitors suspicious network activity, prevents attempts to unauthorized access from the Internet. Firewall significantly reduces the chances of infection with a network infection.