|
Glens Falls, NY
Current Temp
(click for weather)
|
|
Viruses and Computer Vulnerability to Attack
Let's face the facts.
Viruses have accounted for over millions of dollars
in losses in the last year. Even with the best protection, you can never
be certain that your computers will be safe. It seems the best
protection from viruses is to completely isolate your computer
from any network or disks containing data from another computer.
Unfortunately in today's high-paced computer-based world, that is impossible
and not practical.
The Spread of Germs: Lots of people in a
small place
Virus authors have begun
to rely on the explosion of the great Internet data-highway, ignorance of
computer users, and the simplicity of the
vulnerability of email programs' ease of use to write software that
infiltrates your PC's and reproduces itself on your network.
It is frightening how similarly a computer virus spreads like a real virus.
Decreased productivity and security
Most of these trojan horse programs implant
themselves into your computer's network environment and transmit anything
they want back to the virus author.
Aside from exposing private information,
your computer becomes susceptible to the whims of the hackers. Usually this
is characterized by frequent program crashes, files being renamed, deleted,
screens displaying vulgarity, or unexplainable computer lock-ups. If your computers show any of these
symptoms, it may be more than a program error, but compromised security.
Not all viruses are easily removable!
If you think you can go out and buy an anti-virus program to repair an
infected computer, you may be out of luck. Many
viruses install themselves directly into your file or operating
system, which means you won't be able to remove them while you're using the
operating system. Some memory-resident viruses can even load themselves
up the second your computer beeps when you turn it on. Other's can
completely reprogram your motherboard's BIOS chip making the computer
inoperable!
Simply running a virus scan in Windows will not ensure you have a clean
computing environment. If a virus is running on your computer when you
run an antivirus program, the virus may in effect
make itself invisible to the antivirus program.
It doesn't take a virus to break into your
computer
In addition to viral infection, a new breed of attack is brewing via the
Internet. Windows-based computers contain a vulnerability overlooked
practically everyone, including Microsoft (if they did care they wouldn't
make Windows computers susceptible to this). Without your
knowledge or permission, your computer may be sharing your entire hard drive
publicly! If you share files on a network in your home or office, and also use
the Internet on the same computers, you are most likely at risk!!
You need to reconfigure your network settings on each machine or install
a firewall program like Zone Alarm® to block the requests for data from
coming in, and your data from going out.
Experience you can count on
We have been using the Internet since 1994 and are experienced with
all types of viruses, from
program, boot, and disk viruses, to the new breed of internet-borne
"back-door" trojans, worms, and email variants.
As viruses get more clever, we're right on top of them.
Our experienced experts
can diagnose your computer systems, track down the culprit viruses, remove
them safely, and make sure you don't get reinfected again.
We scan your system from low-level DOS.
This ensures that boot
sector and viruses that must reside in memory cannot be
loaded first.
The Windows sharing vulnerability will also be looked for and removed
immediately. We are very familiar with this breed of attack and can
configure your PC's to make this extremely common vulnerability
non-existent to them.
Preventative Maintenance
If your computer is accessible to the Internet and email, viruses
are accessible to
you whether you like it or not. If you're not protecting your data now,
you're playing Russian Roulette with it.
Capital District Computer Services will
scan all your computers for viruses (and if remove any if present) and install
the latest updated versions of
Norton Antivirus®
and Zone Alarm Personal Firewall®, or optionally
Norton Internet Security® which combines antivirus
protection along with an award-winning firewall.
Don't take chances with your personal files or business.
Have Capital District Computer Services make your computers safe!
Email CDCSR by using this
form right now!
|
Steps You Can Take Now To ensure a happy and safe virus and hacker-free
computing experience:
|
- Make sure EVERY computer in your office or home is
running Anti-Virus software
that is continually updated!
Norton Antivirus® contains Live Update® which connects to
Symantec's main server daily to check for updates. When one is available
it will notify you immediately, or automatically install it if desired.
- Any computer that has Internet access should have a firewall installed
Just as a "firewall" in a building blocks fire from entering that building,
a firewall program blocks unwanted data from entering your computer.
It knows what data your computer has requested, and lets that through.
All other is blocked.
We recommend Zone Alarm®
or Norton Internet Security®.
- Do NOT open any suspicious email attachments!
This comes under lots of scrutiny since mail may appear to be from
a trusted friend or colleague. This trust is exactly what the virus
writers are hoping!!! If you receive an attachment aren't 100% positive
of its contents, delete it immediately!
Tell your friends & family if they are going to send you attachments
to let you know ahead of time!
- Complete full system scans weekly.
Most antivirus programs can be scheduled to run automatic scans
during off hours, to ensure your productivity is not compromised.
Many trojans or viruses may be sitting dormant on your hard drive just
waiting for you to click on them. Running weekly scans of ALL FILES
makes certain that such a file will be found and deleted.
|
We trust Symantec's Norton Antivirus®,
Norton Internet Security®
and Zone Alarm®.
|
Click on the logo on the top to return, or click here.
|
|