Is Your PC/Laptop Unresponsive or Slow? Get a quick fix

Most computer users are oblivious of the diverse attacks while carrying out their activities online or offline (via external storage). Some visit webpages that have trojans, malware or virus imbedded in them. Some install cracked softwares which are also ladened with trojans and malwares. Some technicians or repairer will tell you all manner of story like your ram needs to be increased or you have to format your system. Before heeding their advice, we would like to draw your attention to some issues you need to check before losing ALL YOUR FILES or shelling out those quid.

  1. You need to ensure you have a functional and up-to-date anti-virus. We recommend downloading Avast or Avira (please we do not have any relationship with any of the  anti-virus/anti-malaware company mentioned in this post) which would give you a FREE licence for a year.
  2. Download and update an anti-malware program to protect you from new online threats that antivirus can’t detect. We would also recommend downloading Malwarebytes. Choose the free version (do not enable the start free trial if you do not intend to buy the Premium version after downloading the program) and update to the latest.
  3. Scan your PC thoroughly by choosing all the drives on it. If you find any virus or malware, quarantine the files and restart your system.
  4. Regularly update the database of the anti-virus/malware.

Please take note of  the following:

  • Anti-virus/malware softwares are released on a yearly basis (while some pirated softwares will give you a 35 year licence);
  • New online threats are released every day (So you have to update your database at least every two days);
  • Windows PCs are prone to virus attack due to the fact that its the most used and the codes can be written by anyone;
  • Mostly viruses are of exe files (application are also exe) which is executable file in windows but in linux exe file is of no use, in linux different format is used for executable files.
  • Windows open application as administrative user & thus application have total control over system but in linux application are run in restricted mode & only required authorities are gives to virus.

Lastly, we would like to point out the difference between a virus and a trojan.

Viruses, worms, Trojans, and bots are all part of a class of software called malware. Malware or malicious code (malcode) is short for malicious software. It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks.

A computer virus is a type of malware that propagates by inserting a copy of itself into and becoming part of another program. It spreads from one computer to another, leaving infections as it travels.

A Trojan is another type of malware named after the wooden horse the Greeks used to infiltrate Troy. It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems. After it is activated, it can achieve any number of attacks on the host, from irritating the user (popping up windows or changing desktops) to damaging the host (deleting files, stealing data, or activating and spreading other malware, such as viruses). Trojans are also known to create back doors to give malicious users access to the system.

Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. Trojans must spread through user interaction such as opening an e-mail attachment or downloading and running a file from the Internet.

You can follow us on Twitter, add us to your circle on Google+ or like our Facebook page to get first-hand information on ICT related issues.



Let's know what you think

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s