How to Keep Out Malwares from Your Computer

How to Keep Out Malwares from Your Computer

Your computer is a valued device, your data is much more important than your computer. Both must be protected at all costs. The issue of computer malware confuses a lot of people.

The term malware is actually a shortened form of malicious software. Thus malware is software created or developed to damage or perform unwanted actions to your computer. Malware is also capable of disrupting your computer operations and gathering your sensitive information without your knowledge. Examples of malwares are:

  1. Computer virus
  2. Computer worms
  3. Spyware
  4. Trojan horses
  5. Rogue security software

Computer Virus

A computer virus is a software program designed to interfere with the normal operations of your computer. It can corrupt or worse delete data on a computer making it impossible for you to access your documents. They spread rapidly from an infected computer to other uninfected computers.

They can also be infected to systems that are already infected making you end up with a mixed grill of viruses. They are easily spread via removable devices like USB flash drives, through Internet by downloading infected software or through email programs especially attachments.

Computer Worms

A worm is a malicious software that propagates itself by replicating without the users interaction. Usually, it uses a computer network to pass from one computer to another. In most cases worms will originate from email attachments where they spread to the computer when the attachment is opened. They also send themselves as infected email messages to other computers. Worms are not as harmful as viruses but they end up consuming bandwidth of your network.

Malware Scan

Malware scanning in progress with three objects detected
Malware scanning in progress with three objects detected | Source

Spyware

This is a software package that secretly gathers information from your computer through the Internet connection without your authority or knowledge. In most cases this is done for advertising purposes. They are capable of collecting your sensitive information like bank or credit information, user logins, and browsing habits.

Having acquired your browsing habits, you can then be bombarded with advertisements related to your surfing habits. Others can also install additional software, change your computer settings, and slow down your Internet connection speeds.

Trojan Horse

A Trojan horse is a malicious program that masquerades as a normal program inside other programs. It gains access to the computer by hiding itself in a legitimate program for instance a screensaver, free applications, and games from the Internet. Then, once inside your computer, it will put a code into the operating system and from there on you are at the mercy of a hacker.

Rogue Security Software

This is a software program that tricks you to think that your computer has a virus attack, thus it prompts you to buy or download a program that will clean your computer. These messages usually appears as pop ups which should be closed using the Alt + F4 key combinations. Always be extra careful before downloading any software from the Internet.

Why You Need An Anti-Malware In Your Computer

Many people will install an antivirus program in their system and think that they are 100% protected. That is what I have been doing until my computer was attacked by a Csrss.exe Trojan horse. Checking from the processes running, the csrss for windows service was having lower case letters while the Trojan had a capital C. The antivirus I was using could not detect it. The Trojan was turning word documents to have the .exe (executable) extension. So, it is only after opening such documents that I was getting a warning about an attempt to open a suspicious file.

Turning to the Internet, I decided to download malwarebytes, a free anti-malware, though you can also get a paid version. I used the free version which managed to detect and delete all the Trojan horses I had in my computer.

Trojan Horse Detected

Detected trojans
Detected trojans | Source

How To Protect Your Computer Against Malware

  1. Install an antivirus program in your computer - the antivirus you use should be able to detect a wide range of virus including the current ones because viruses are created on daily basis. We have a lot of free antivirus that are good and capable of protecting your computer just like the paid versions.
  2. Install an anti-malware - you should also go for a reliable malware that will be able to detect malwares and destroy them.
  3. Keep on updating your antivirus and anti-malware regularly.
  4. Scan removable devices like USB flash drives after attaching them to your computer.
  5. Scan software and other documents you download for malicious software.
  6. Be extra cautious when opening attachments specially from dubious sources.

Is your computer secured?

  • Yes I have an antivirus and a malware
  • Yes I have an antivirus
  • I do not have either
See results without voting

© 2012 Patrick Kamau

More by this Author


Comments 8 comments

Patkay profile image

Patkay 3 years ago from Nairobi, Kenya Author

Thanks Jatinder Joshi for reading and commenting. It is good you check your computer for malwares as some of the antiviruses we use are unable to detect malwares. There are some free antimalwares as well as paid versions that you can go for.


Jatinder Joshi profile image

Jatinder Joshi 3 years ago from Whitby, Ontario, Canada

Thank you for sharing this valuable information. My google chrome was very slow. So, I removed and re-installed it and now it works fine.

May have been slowed down by virus/ malware/ trojan horse?


Patkay profile image

Patkay 4 years ago from Nairobi, Kenya Author

Thanks lucy patrick. It is a good anti-malware. It will keep malwares out of your computer. Thanks for reading and commenting.


lucy patrick 4 years ago

that very true, i used this anti-malware and it cleaned all the threats. thanks patkay


Patkay profile image

Patkay 4 years ago from Nairobi, Kenya Author

Thanks josiejossy for reading and commenting. It true combining the two will have a great performance on a computer.


josiejossy profile image

josiejossy 4 years ago from Nairobi Kenya

Great tip there Patkay....thanx for sharing with us...actualy by using malwarebytes it cleans up the machine completely...voted up,...


Patkay profile image

Patkay 4 years ago from Nairobi, Kenya Author

Yes, it is true Lady_E, we should always safeguard our data. The above precautionary measures are important. Thanks for your visit and for commenting.


Lady_E profile image

Lady_E 4 years ago from London, UK

Thanks. This is very useful and extremely important.

    Sign in or sign up and post using a HubPages Network account.

    0 of 8192 characters used
    Post Comment

    No HTML is allowed in comments, but URLs will be hyperlinked. Comments are not for promoting your articles or other sites.


    Click to Rate This Article
    working