Virus:
Computer viruses are malicious programs that are introduced into a computer, generally without the user's knowledge, change the functioning and can alter or damage the system. They generally get into devices in the form of executable files, and users through overconfidence or lack of knowledge open them and the computer is automatically infected.
This type of software can cause both physical and software damage.
When a malicious application attacks hardware, it can damage the hard drive, reducing its performance and effectiveness, and even causing the microprocessor to fail, among other things.
As for software, such programs often modify and delete programs and files, steal confidential information and user data, most often slowing down the operating system and affecting the Internet connection.
Types of viruses depending on the effect they want to cause:
Ransomware or cryptovirus. It is a type of malicious code that specializes in taking over data, files or computer hardware to demand ransom payments. In recent years, it has paralyzed companies around the world, causing multimillion-dollar losses.
Criminal software. This is a type of software that is designed to carry out economic and financial crimes, in online environments, and that allows you to make economic gains.
Malware. The purpose is to nest in the computer and partially or completely damage the computer, programs or simply files. This group includes Trojans(malware), programs that perform actions not authorized by the user. They work for cybercriminals: stealing data (e.g., electronic banking), installing other programs, taking control of a device or forcing the user to pay a ransom.
Antivirus:
This is software that searches for and removes computer viruses. One of the biggest risks that a computer running the Windows operating system faces is the huge number of viruses created for it. One way to minimize the risk is to constantly update your antivirus program. In this way, your computer can be protected from attacks.
Antivirus software has two types of updates: software updates and database updates. The latter stores all viruses and their various variants. Day after day new viruses are created. Updating the database is very important, usually done almost daily.
The most recommended antivirus programs, which are easy to use, "free" and save resources, are: Avast, AVG and Windows Defender.
Important: Under no circumstances should you install two antivirus programs on the same computer at the same time. Antivirus software works by looking for applications that monitor or send information, so one blocks the other, deeming it to be dangerous software or a threat. In addition to this, your computer may crash due to high resource consumption.
Other recommended programs:
Firewall - blocks certain types of network traffic to prevent various security threats (e.g., remote logging).
It controls the input and output of all data transmitted on the network. All information sent or received that passes through the firewall is compared according to a set of rules to determine whether a data packet can pass or must be blocked. It is a kind of gatekeeper that controls computer traffic.
Anti-spyware software. It is designed to detect and eliminate spyware (spyware) programs installed on the computer without the user's knowledge. Through spyware, cybercriminals learn all users' browsing habits, and passwords and other data, which they can then sell to other parties.
Pop-up blocker. It aims to identify the codes that generate the opening of POP-UPS, or pop-up windows that appear while surfing the Internet. Some of these windows may contain spyware viruses. Browsers such as Chrome and Firefox have predefined blocking of these pop-ups.
Anti-spam. This is one of the tools used to prevent spam from getting through. They take care of forwarding junk mail directly from the Inbox to the mail's Spam folder or, if so configured, directly to the trash.
Antimalware It is a program capable of stopping, eliminating and blocking all kinds of malware.
Software updates
Updates always introduce new features to the operating system, correcting possible vulnerabilities that some hackers try to exploit to gain access to our system. Nowadays, in both corporate and family environments, we store a variety of work, photos, videos - information that must not fall into the hands of the wrong people. In short, software updates resolve vulnerabilities in systems and make them much more secure and stable, That's why it's necessary to download updates.
Use of strong passwords
Personal data in the digital world is a very valuable commodity. Therefore, this data must be well secured and copied in a protected environment. Passwords should not be written on sticky notes. By creating long passwords with letters and symbols, you limit easy access to your data. How can you do this?
Use long passwords containing letters, numbers and symbols, such as %, #, & or /. Using lowercase and uppercase letters also increases security. Example #Cs%985a6T8.
Avoid using your name, identification number, place or date of birth, car license plate number or pet's name. They are easy to remember, yes, but also easy for others to discover. In any case, we recommend combining several. Example *H0m3*9895.
Use a different password for each service or application: don't reuse them. Although you can't remember them all, you can generate 4 or 5, depending on how you intend to use them.
Use two-factor authentication whenever possible. You will know that if someone knows your password, they will not be able to access your account because they are using an unrecognized device.
Other passwords to avoid:
12345/123456/12345678
Password
Qwerty
Regularly change passwords for important data, for example, for electronic banking. Of course, let this change not be every week, but one password every few years is also not advisable.
There is one big problem with passwords. Everyone around recommends that you use unique passwords everywhere. One password = one website, service or service.
Because only then, if your password leaks from one place, a cybercriminal won't get into your other online accounts. So how do you create strong and hard-to-crack passwords that are unique and how do you remember them?
All you have to do is use a program or application called a password manager.
A password manager is an application that generates random and unique passwords and stores them in a secure, encrypted way in the memory of your computer or phone.
It goes without saying that a computer program will generate a better and more secure password than we can. The computer is also better at remembering than we are.
At a time when there are so many places we log in to using passwords, a password manager is the only way to use truly unique and secure passwords for any service or service.
It is crucial to make sure that no one discovers your master password for the password manager.
3. secure installation of programs (applications)
We must be very careful when downloading and installing free programs. It is important to read carefully, otherwise it is very possible that through ignorance we may allow the installation of malicious software. Therefore, it is important to take certain precautions:
Make sure you always download programs from official sites, especially when it comes to cell phones. Downloading from other types of sites may not necessarily contain a virus, just as downloading from official sites is not virus-free. But official sites are usually tested and therefore less likely to be infected.
It is important to have an up-to-date antivirus program, especially when we download programs, for installation. This way we can avoid possible threats.
Keep all programs up to date to avoid possible security vulnerabilities. Especially in Windows or Microsoft Office.
Take a close look at the installation conditions. This point is very important, there is a tendency to click "Accept" without reading. Many FREE programs suggest the possibility of installing other programs of questionable origin. They usually ask if you want to "cooperate with them" by installing such software.
Reach out to people who have more experience with computers
Think about what you want to use the installed program for. Maybe you don't need it, and you are installing it because someone suggested it to you.
It is very important to use common sense. Be careful, never run a program of questionable origin, whose source you do not know, etc.