Computer Viruses For Dummies

Overview

Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail.

Fortunately, there are ways to inoculate and protect your computer. Computer ...

See more details below
Paperback
$11.36
BN.com price
(Save 36%)$17.99 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Paperback)
  • All (33) from $1.99   
  • New (6) from $4.99   
  • Used (27) from $1.99   
Computer Viruses For Dummies

Available on NOOK devices and apps  
  • NOOK Devices
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK Study
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$10.49
BN.com price
(Save 41%)$17.99 List Price

Overview

Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail.

Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you:

  • Understand the risks and analyze your PC’s current condition
  • Select, install, and configure antivirus software
  • Scan your computer and e-mail
  • Rid your computer of viruses it’s already caught
  • Update antivirus software and install security patches
  • Use firewalls and spyware blockers
  • Protect handheld PDAs from viruses
  • Adopt safe computing practices, especially with e-mail and when you’re surfing the Net

Written by Peter H. Gregory, coauthor of CISSP For Dummies and Security + For Dummies, Computer Viruses For Dummies goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best program(s) for your needs.

Remember, if you don’t protect your computer, not only do you risk having your computer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book! This guide will help you properly immunize your PC with antivirus software now and install updates and security patches that are like booster shots to keep your software protected against new viruses.

Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
With one major new cyberattack nearly every day, it’s official: you simply must understand viruses (and worms, Trojan horses, spyware, and their rotten relatives). Computer Viruses for Dummies has all the information you need -- and it’s easy enough for Aunt Millie, who’s always getting infected and calling you for help.

This is the whole deal: making sure your anti-virus software is running and up-to-date (it’s not always obvious); practicing safe computing to reduce your risk; setting up firewalls to keep other bad guys out; rooting out the sneaky spyware that’s infested your PC; staying up-to-date with security patches without becoming a computer pro; even protecting your handheld PDA. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks for Dummies, Second Edition.

Read More Show Less

Product Details

  • ISBN-13: 9780764574184
  • Publisher: Wiley
  • Publication date: 8/16/2004
  • Series: For Dummies Series
  • Edition number: 1
  • Pages: 292
  • Sales rank: 799,029
  • Product dimensions: 5.46 (w) x 8.48 (h) x 0.65 (d)

Meet the Author

Peter Gregory, CISSP, CISA, has spent 20 years developing technology solutions for those who aren’t technologically oriented. He is an information security strategist for a wireless telecommunications carrier.

Read More Show Less

Table of Contents

Introduction.

Part I: Evaluating Your Virus Situation.

Chapter 1: Understanding Virus Risks.

Chapter 2: Does My Computer Have a Virus?

Chapter 3: Does Your Computer Have Antivirus Software?

Part II: Deploying Your Antivirus Defenses.

Chapter 4: Obtaining and Installing Antivirus Software.

Chapter 5: Configuring Antivirus Software.

Chapter 6: Scanning Your Computer and E-Mail.

Chapter 7: Ridding Your Computer of Viruses.

Part III: Maintaining Your Vigilance.

Chapter 8: Updating Antivirus Software and Signatures.

Chapter 9: Installing Security Patches.

Chapter 10: Using Firewalls and Spyware Blockers.

Chapter 11: Protecting PDAs from Viruses.

Chapter 12: Incorporating Safe Computing Practices.

Part IV: Looking at Viruses under the Microscope.

Chapter 13: Viruses and the Losers Who Write Them.

Chapter 14: Trojan Horses, Worms, Spam, and Hoaxes.

Chapter 15: How Viruses Function and Propagate.

Part V: The Part of Tens.

Chapter 16: Almost Ten Myths about Computer Viruses.

Chapter 17: Ten Antivirus Programs.

Index.

Read More Show Less

First Chapter

Computer Viruses For Dummies


By Peter H. Gregory

John Wiley & Sons

ISBN: 0-7645-7418-3


Chapter One

Understanding Virus Risks

In This Chapter

* Figuring out whether you're at risk

* Making good security decisions

There's an old saying: "Just because you're not paranoid doesn't mean that everyone isn't out to get you." This saying is proven by the people who write computer viruses - they are out to get you! And, in fact, a little paranoia may go a long way in protecting your computer.

In this chapter, I provide you with the factors that may increase your personal level of useful paranoia - in other words, the factors that can influence you to lower your personal risk level. Why? Because, get this, some people are more apt to catch computer viruses than others, and it's largely based upon some basic factors such as the version of Windows they're using, as well as their Internet and e-mail habits. In the computer world as well as in the biological world, good hygiene goes a long way in preventing infection in the first place - and prevention is far easier to deal with than curing an infection after it happens.

Assessing the Threat to Your Computer

Three primary factors contribute to your risk of catching viruses:

  •   The version of the Windows operating system you are using
  •   Whether you have installed security patches on your computer
  •   How many people use the computer

But also important are your Internet browsing habits:

  •   Do you visit many different Web sites?
  •   Do you visit sites that try to mess with your computer's settings (and how would you know - and prevent - that)?
  •   Do you have a tendency to open e-mail attachments from people you don't know?
  •   Do you visit Web sites cited in e-mail messages from strangers?

All these factors have a direct bearing on whether you are prone to catching viruses.

Finally, the manner in which your computer is connected to the Internet determines your susceptibility to viruses. If you have a high-speed, "always-on" Internet connection, then virus writers are actively trying to find you (or already have!). Dial-up connections are somewhat less risky - but not risk-free.

Which operating system are you using?

Microsoft's earlier versions of Windows had very little in the way of security - they conformed to Microsoft's earlier (and flawed) premise that everyone in corporations and everyone on the Internet is nice and can be trusted and that no one will do anything bad. Microsoft, by the way, has been humbled by the experience and, as a result, the newer versions of Windows are far more secure than their predecessors.

Windows 95 and Windows 98

Collectively known as Windows 9x, these earlier versions of Windows lack the basic security components found in modern operating systems. Their primary fault is that they don't separate the function of the operating system from the person who uses it. You, the computer's user, have complete control over every aspect of the computer. Even back in the '90s that wasn't too safe; if you catch a virus, the virus has the same range of control over your computer as you do.

Microsoft no longer supports Windows 95. This means that, if any security vulnerability is discovered in Windows 95, Microsoft will not issue bulletins, advice, or security patches to fix it. Not an enviable position for any user to be in.

In 2003, Microsoft announced that it would soon end support for Windows 98. But when thousands of corporate and individual computer users stormed the Microsoft castle in Redmond, Washington, armed with torches, spears, axes, and old dot-matrix printers, Microsoft relented and postponed the Windows 98 "end of life."

But for users of Windows 98, the message is clear: Your days of support from Microsoft are growing short.

Windows ME

Officially called Windows Millennium Edition or Windows ME (and playfully referred to in some circles as the Windows Miserable Edition), this is just Windows 98 with some additional features thrown in and some stability improvements. The stability improvements come at the price of higher hardware requirements, however, and Windows ME suffers from the same basic security issues as its predecessors, namely that viruses can run roughshod throughout the unprotected operating system.

Windows 2000

At long last, Microsoft had taken the kernel (insides) of Windows NT and grafted on the Windows 98 user interface (the stuff that you see on-screen when you use it), and after exhausting the world's supply of duct tape and baling wire, made it work.

Windows 2000 is a very decent operating system. It contains most of the security features that corporate customers and consumers had been requesting for a long time. Primary is the notion of "logging on" to the computer. In Windows 2000 and newer versions of Windows, if you can't log on to the computer, you can't use it. Contrast that to Windows 9x - if you can make the computer run, you can use it and do anything you want to it.

Windows XP

Windows XP contains many refinements over Windows 2000 and is even more secure. For the most part, Windows XP is an improved version of Windows 2000 and includes additional features and functions.

I've heard some say that Windows XP is just Windows 2000 with the soft, friendly interface. If you haven't seen Windows XP, it's like Windows 2000 with brighter colors and smooth, rounded corners.

Do you install security patches?

Microsoft regularly releases security patches - fixes to their software - that close security holes that could lead to virus infections. Many of these patches are deemed "critical," and a good number of them have been exploited by those chip-on-their-shoulder Internet thugs who have nothing better to do than to spread misery to as many people as possible.

Microsoft has provided a number of ways that you can use to find out about and install security patches, including Windows Update, Automatic Update, and e-mail notifications of new patches.

If you do install the critical patches that Microsoft releases, then you're in far better shape than if you have no security patches at all. Having no security patches is almost as bad as having no antivirus software: You're up the creek with a sitting duck.

I don't want you to feel bad if you're among (what I suspect is) the majority of computer users - those who have never installed security patches. Had I chosen a different career path without much chance to get familiar with computers, the thought of installing security patches would seem about as intimidating as working on my home's electrical wiring or working on a late-model automobile with all its complex wiring and safety systems. But that's what this book is for: to help get you past the reluctance.

How many people use the computer?

Are you the only person who uses your computer? Or are several colleagues, family members, or (gasp!) total strangers using your computer, like so many people sharing a germ-infested bathroom water cup?

The greater the number of people using a computer, the greater the chances are that something bad will happen. How do I know this? When several people share a complex machine like a PC, the inconsistencies in the ways that the people use the computer, and the accumulation of every user's bad habits and mistakes, can make the computer's condition deteriorate over time.

How is your computer connected to the Internet?

While there are many ways to connect to the Internet, I'm concerned with just one factor: Is your computer "always on and connected" through any sort of a broadband (high-speed) connection like DSL, a cable modem, ISDN, or satellite? Or do you use a dial-up (phone-line) connection to connect your computer to the Internet, get your e-mail, do a little surfing, and then disconnect?

It boils down to this: Is your computer always on and always connected to the Internet? If so, then your computer is far more likely to be targeted by Internet worms. Some hackers like to scan for - and find - new always-on computers.

They're looking for recruits - to see whether they can add your system to their legion of slave computers.

TECHNICAL STUFF

Let me explain this high-speed, always-on thing a little more. If your computer is connected to the Internet using a high-speed connection, then your computer is statistically more likely to be found by a scan than it would be if it were connected, say, only one or two hours per day. Statistically speaking, an always-on computer is ten times more likely to be scanned, because it's connected ten times as many hours per day. But more than that, if your computer is always on and always connected, then hackers would consider your computer more dependable. And because the connection is higher speed than dial-up, they can get more performance out of your computer for their own evil purposes.

Do you have a firewall?

A firewall, as I explain more fully in Chapter 10, is something that is designed to block the probing scans that are often associated with viruses, worms, and Trojan horses. Those people who have installed either a software firewall or a hardware firewall have far better protection than people who have neither.

A software firewall is a program that runs on your computer, invisibly (in the background), much like an antivirus program. The software firewall program carefully watches all communication coming into your computer and leaving your computer. Each network message - or packet - is examined to ascertain its type, origin, and destination. These properties are then compared to a list of rules to determine whether each packet should be allowed to pass through or not. Should the message be allowed to pass, the firewall lets it move along towards its destination. But should the message be blocked, then the firewall will not permit it to pass - and it will fail to reach its destination, like a postal letter that is intercepted in transit and simply thrown away.

A hardware firewall is an electronic appliance that is installed on a network. Its internal function is essentially similar to the software firewall, except that its protection is more centralized: All the computers on the network are protected by the hardware firewall, so none of the bad traffic on the Internet is permitted to reach any of the computers on the network.

A firewall is like a security guard at the entrance of an office building. He (or she) scrutinizes each person coming and going. He may want to look at each person's identification by examining their employee badge or other credential. If the person coming or going is carrying anything, he may ask questions about it. If the person is a guest, the guard may request that the user sign their name into a visitor's log.

The guard has a list of rules that he uses to determine whether each person coming and going will be permitted to pass through. Occasionally he will need to turn someone away, for one reason or another. He will detail each such denial so his boss can later view who was denied access and why.

Occasionally, the guard will need to call his boss and ask if a visitor is permitted to pass through (in a firewall software program, this takes the form of a pop-up window that asks if a particular program should be permitted to communicate or not).

High-risk activities

The types of activities performed on your PC also contribute to your risk, whether high or low. Each of these activities is related to how social you permit your computer to be. Do you often take it out in public where it can exchange information with other computers? In the analogy between biological viruses and computer viruses, a high degree of socialization (mingling with others) increases risk. The following sections look at some examples.

Wireless "Hot Spots"

Hoping to attract well-to-do customers, many public establishments - such as coffee houses, restaurants, and other businesses - have installed so-called Internet hot spots. These hot spots are Internet connections that a customer can use to connect to the Internet with a laptop computer, provided it's equipped with a wireless networking (also called Wi-Fi or 802.11) capability. Some establishments charge a fee for the use of their hot spots; others permit use free of charge.

People who own laptops equipped with those Wi-Fi connections can visit any of the hundreds of thousands (or perhaps millions) of Wi-Fi-equipped establishments and access the Internet to retrieve e-mail, visit Web sites, or whatever they do on the Internet. At a coffeehouse, for instance, you would purchase your tall double-shot vanilla low-fat latte and then sit down at one of the tables, turn on your laptop, and catch up on e-mail while quaffing your favorite coffee drink.

But here's the problem: These hot-spot connections have many of the same risks that are associated with always-on high-speed connections. Hackers and worms frequently scan the wireless networks in these establishments, hoping to find new victims - like, f'rinstance, your computer. Computers lacking adequate antivirus protection fall victim to the worm and become one of those zombie computers, awaiting the commands from their fiendish master.

Downloading and file sharing

If you or someone with access to your computer is doing a lot of file and program downloading and file sharing with others, chances are that sooner or later one of the files you download will be infected with a virus.

Because many viruses travel from computer to computer by hiding inside of software program files, it makes sense that the more program files you bring into your system, the more likely it will be that one of them will have a virus. Also, program files that have been copied from other computers (rather than coming directly from the manufacturer) have a much greater chance of being infected with a virus.

Instant messaging

If you are an Instant Messaging (IM) user, you are increasing your chances of catching a virus (or, of course a worm, Trojan, or other ill fate). As the popularity of IM rises, so too does this get the attention of virus writers looking for new ways to get viruses from one computer to another. Already, there have been a number of worms that have propagated themselves using IM. Every day, minute by minute, you can be sure that there will have been more such incidents.

Add-on programs

If you are the type who can't resist an online or computer store bargain, sooner or later something you pick up will have a little extra feature.

Continues...


Excerpted from Computer Viruses For Dummies by Peter H. Gregory Excerpted by permission.
All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)