Vírus, Worms and Trojans
Virus, worms and trojans are programs that can gravelly damage your computer, the information contained on it and make your internet access very slow.
A virus is a component of code that spreads from computer to computer and through the Internet with the objective of interfering with the normal operation of the computer, being able to damage files, software programs and even hardware.
The gravity of the data processing virus can vary from a small incompatibility to an elevated rank of destruction. The most frequent virus is conceived to make the computers slower.
The virus can only spread with human intervention. For example, upon sharing a file or an email.
Know how to detect if you have a virus on your computer
The most common signs that your computer is infected with a virus are:
- It Functions slower than the normal one;
- Is constantly blocked;
- Restarts and stops working suddenly;
- Some application do not function correctly;
- Disks and/or disk drives stay inaccessible;
- Printing is not done correctly;
- Unusual error messages keep showing;
- Presents distorted menus and dialogue boxes.
If your computer is infected with virus you should remove it immediately with an antivirus software. Only by doing this can you guarantee that it does not spread to other areas of the computer or to other computers.
We remind you that with suitably prevention, the probability of your computer getting infected with a virus is limited.
A worm, as a virus, spreads-itself from computer to computer, but in an automatic manner and without intervention from the user. As such, it empower itself with the functionalities of the computer through which accesses and sends files or information.
The great danger of worms is the capacity to replicate in a large scale, sending copies of itself, what causes congestion in the network of the companies and throughout the Internet, infiltrating the system and allowing that third parties take remote control of the computer.
The term derives from the Troy horse from the mythology that pretended to be a gift when in reality contained in its interior Greek military who took over the city of Troy. The Trojans (Troy horses) are malicious software programs with remote access which permit criminal control of the computer through its connection to the Internet. These programs come across as beneficial programs but contain malicious or destructive code which acquires permission without your knowledge.
Kinds of harm or exploitation the Trojans can cause to the computer:
- See, alter, copy and delete files. This can happen all at once or whenever the computer is turned on;
- Monitor and register activities and send information to another computer. This process helps criminals uncover user codes and passwords introduced on the computer;
- Make use of the computer to attack others computers normally with the objective of overwhelming servants with messages, spread virus or spyware;
- Alter the functions of the computer;
- Create pop-up windows with the objective of annoying or link to malicious sites;
- Perform or enclose a program, process or connection on your computer;
- Seize video and audio devices which have been connected to the computer.
How to avoid Trojans
- Do not reveal your email address to people you don’t know;
- Do not include your email address on big mailing lists on the Internet and sites destined to job announcements;
- Do not open enclosed (images, audio files, video files, etc.) from instant emails, if you are not certain sent them;
- Do not execute, transfer or make use of software which you have no knowledge or confidence of the source;
- Maintain the operating system and the browser of your computer up to date;
- Install an antivirus and keep it up to date;
- Install or configure a personal firewall.
Keep in mind that Trojans can have access to your computer even without any involvement from you.