Those Nasty Bugs: Protect Your Computer System from Infection - Tire Review Magazine

Those Nasty Bugs: Protect Your Computer System from Infection

Protect Your Computer System from Infection – Or Get Eaten Alive!

One recent afternoon, the antivirus system on our corporate server intercepted an inbound, virus-infected e-mail. As is the case whenever this happens, an automatic reply notified the sender that they were infected. This particular sender, completely misunderstanding the message, called to tell us that we had sent him a virus when, in fact, we had only sent him notice that he had sent us one.

The interesting aspect of this whole story is that the infected e-mail sender was a complete stranger! So, how did he even obtain our e-mail address? The answer, more than likely, involved a chain e-mail. You’ve seen one of those, "Forward this e-mail to as many of your friends as you can®ƒ" Although the message varies, it always pleads with you to continue the propagation. Chain e-mail messages, simply by tugging on heartstrings, can be an effective, if even completely innocent, spreader of computer viruses.

Knowing this, it’s easy to see how a total stranger can come to possess your e-mail address. You receive a chain e-mail from a friend. That e-mail was probably addressed to at least a dozen other people you may or may not know. Of course, you know better than to forward these things, but somebody else is sure to do exactly as the message says.

Depending on how they forward it, and what type of e-mail program they use, your name may wind up in their address book. If they forward it without snipping the thousands of previous recipient addresses (as is typically the case), then your address gets to ride along to the next wave of recipients. This can continue until your e-mail address is scattered far and wide.

Enter the virus. Imagine now that a virus infects somebody’s PC. Your e-mail address is in their address book because a friend of a friend of a … Well, you’re probably starting to see how a complete stranger can wind up with your e-mail address.

A computer virus will comb through address lists on infected computers, sending copies of itself to everyone on those lists. Because it happens in the background, the victims of this infection won’t even know that this is happening. The first sign of infection is often a reply from somebody’s antivirus software – just like in the story I related.

The moral here: Don’t forward chain e-mail. They are almost always hoaxes, urban myths, outdated or just plain incorrect – and often dangerous.

What Is A Virus?

So how should you protect your PC or system from viruses? Let’s start by examining what a virus really is and what you can do to protect your computes.

The word "virus" is typically used in a generic fashion to describe anything that infects a computer, whether spread via e-mail or downloaded from a Web site. A true virus falls into the "self-replicating" category and is a piece of code that infects or attaches itself to another file, such as a Windows operating system file, the most popular target for most viruses.

Similar to viruses are "worms." Worms are also self-replicating, but are able to stand by themselves and don’t need to attach to another file. Worms often have their own built-in e-mail capabilities and can send copies of themselves without even using your e-mail software.

Next are the "Trojan horses," which can’t replicate themselves but must be downloaded or e-mailed by someone. Trojans are programs that masquerade as harmless applications, games or utilities while wreaking havoc on your computer system. Keep this in mind the next time someone e-mails you something that claims to be able to improve your computer’s performance or is supposed to "do something really cool" when you double-click it.

How Can I Protect My Computer?

The real focus should be on how to protect your data, because in protecting your data, you’ll also be protecting your computers. After all, a virus can toast your operating system, yet only an hour or two with the manufacturer’s recovery CD-ROMs will have you up and running again. But what about all of those word processing documents, spreadsheets and financial records? These are what you stand to lose if your computer becomes infected.

To protect these files, you should be making frequent backups onto removable media such as CD-RWs or Zip disks. Most newer computers now come with CD or Zip drives that are capable of storing backups of your most-prized files. Floppy drives will work for some people with few and small files, but their storage limitations will likely render them useless in the very near future. Software is available to make file backup less painful, but is not necessary if you keep your files neatly organized.

Antivirus Software Is Essential

Maintaining backups, however, is only part of the strategy. Running a good antivirus program is absolutely essential these days. If you have Internet access and you swap e-mail with anybody, you will encounter a virus. In my experience, it is not just highly likely, it’s inevitable.

Good antivirus software will not only scan all of your e-mails for viruses, it will also log onto the manufacturer’s Web site at regular intervals to download antivirus updates. And it will perform occasional system scans to ensure that nothing has slipped past its watch between updates.

There are many such antivirus programs available, but make sure that you understand their basic operation and can verify that they’re working. You should feel comfortable enough with your antivirus software to know how to check up on it from time to time.

"What about those free online scans?" you may be asking. I would avoid those for two reasons. First of all, they’re not capable of watching your computer at all times. Secondly, there’s no such thing as a free lunch – even on the Internet. You run the risk of loading "spyware" onto your computer when you open it up for such scans.

Spyware is software that’s installed onto your computer – often without your consent or knowledge ®“ for the purpose of watching your computer activities. Spyware sends reports to some entity interested in what music you enjoy, what sites you visit on the Web, etc.

Good antivirus software will allow you to enjoy the Internet without risking viral catastrophe, not to mention the embarrassment of having to explain to all of your friends, acquaintances and business contacts that you don’t have antivirus software – right after sending them a dozen copies of some virus that’s been cruising the Internet for a couple of years.

Most antivirus software will give you a year’s worth of free updates. Beyond that, you’ll have to pay for annual renewals. Renewal cost is modest – typically less than $20. Renewals are easy to do and you really can’t opt out; otherwise, your protection will be compromised.

Things To Keep In Mind

®′ Treat e-mail attachments with caution, especially if they’re from somebody you don’t know. If you do know the sender, save the attachment to a safe place on your computer and run a manual antivirus scan against it. If you don’t know the sender, just delete the e-mail, attachment and all. Additionally, and this isn’t a hard-and-fast rule, many virus-laden e-mails have very poor grammar and/or misspellings in the body of the message or in the subject line. Watch for those!

®′ Attachment file extensions are often indicative of an infectious payload. If the attachment comes with a file extension such as .EXE, .BAT, .COM or .PIF, beware! These are executable files. Although executable files are not inherently harmful, be cautious when dealing with them in e-mail. Even more dangerous are .VBS files – just delete them.

®′ If somebody gives you a floppy disk, CD-ROM or Zip disk, make sure to run a manual antivirus scan on it before opening any of its contents. The same goes for any files that somebody may send you through any of the online file transfer services or chat engines (e.g. ICQ, IRC, AOL Instant Messenger, etc.).

®′ New viruses are discovered daily. There is always a small risk of infection before a new antivirus update becomes available. Although this period is brief, it’s still possible to become infected by a very new, fast-moving virus. The larger antivirus software manufacturers’ Web sites will often have downloadable tools for removing such infections.

Virus infection can be prevented through simple measures. Armed with basic knowledge of what viruses are and how they operate, you can easily avoid dangerous practices, like sending chain e-mail and opening attachments from strangers. Proper use and maintenance of a good antivirus program will lower your risk.

If you find yourself infected, don’t panic! Your antivirus software manufacturer is probably on the case already and will quickly provide you with an antivirus update and removal tool.

Knowing how to protect yourself from viruses is key to safely using the Internet and e-mail. If all else fails, you’ll have those current Zip or CD-ROM backups of your valuable files to save the day – right?

You May Also Like

Tire Industry Labor Shortage: Improve This to Keep Employees

I’ve spoken to many representatives from manufacturers, wholesalers and retailers who report that techs, counter people, drivers and even white-collar team members have walked off the job, failed to report, or given notice, and their businesses have been impacted by these departures. This isn’t just a tire industry issue—and goes beyond the tech shortage that

Tire Industry-Labor Shortage-Great-Resignation

I’ve spoken to many representatives from manufacturers, wholesalers and retailers who report that techs, counter people, drivers and even white-collar team members have walked off the job, failed to report, or given notice, and their businesses have been impacted by these departures. This isn’t just a tire industry issue—and goes beyond the tech shortage that has plagued the industry for decades.

Consider Software Solutions to Streamline Operations

Representatives from several software providers share how solutions drive efficiency and profitability, as well as what to look for when considering a system in your shop.

software-solutions-stock
How Data, Analytics Can Boost Profitability for Tire Retailers

By collecting and analyzing data about a dealer’s sales history, inventory levels and market demand, data and analytics platforms can analyze the performance of each dealer’s store and recommend actionable improvement opportunities.

How to Start the PPP Loan Payback Process

For many PPP loan recipients, it is time to start the repayment process—or file for PPP loan forgiveness. Read on to find out which portion of your loan may be forgivable and how to apply for forgiveness, as well as how to start the repayment process.

Creating a Positive Work Environment

Larry Sutton of RNR Tire Express shares seven different practices that have helped him create a positive work environment.

Other Posts

Using Data to Enrich the Customer Experience

Attaching data or a number to a vehicle’s service record adds a level of transparency to the discussion, and moves it from an “opinionated upsell” to a true, fact-based service need.

Coats Tread Depth Data
Microlearning Makes the Tire Industry Smarter, More Profitable

Microlearning modules can be customized to company and team member needs, where participants can learn through their own experiences and at their own pace.

Setting Up for Success: The Importance of Onboarding New Employees

Onboarding serves to not only give a new employee practical information that they will need in the job, but having that information gives them confidence as they start out in their new position.

employee-onboarding
Online Reputation Management

Eighty-eight percent of consumers trust online reviews as much as they trust personal recommendations.

Online-Business-Management