ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Best ways to protect your computer from malwares and viruses

Updated on July 13, 2014
Virus can even eat up your system.
Virus can even eat up your system.

How to protect a computer from virus? What are Malwares?

Malwares are malicious software which include Viruses, Spywares, Key-loggers, Worms, Trojans, Ad-wares, etc which are specially programmed to cause damage or pose security threats to a system.

A virus is a type of malware that multiples by inserting copies of itself to damage the files, or hamper the boot sector of the hard drive. If replication succeeds, the affected areas are then said to be "infected". Viruses perform various types of harmful activity on infected data, such as stealing hard disk space or altering the CPU date and time, accessing private information, corrupting and damaging data, displaying absurd messages on the user's screen, spamming their contacts, or logging their keystrokes. Key-logger is special type of malware which if executed stores the keystrokes and by email, send the data to the programmer, hence valuable information is available and the user is prone to various attacks.

Listed below are few methods to help users to learn the way they can be attacked and protection they should use to safeguard their system.

Virus attacks by emails.

Most malwares enter a system through e-mail attachments. Never download e-mail attachments from an unidentified or unknown source. To elude the dangerous attachments, the programmers may compress the code into a .zip or .rar archive file. If the e-mail program is not adequately filtering spam from the inbox, consider additional spam filtering software. If the security software is a security suite, spam filtering may be a feature that needs to be switched on.

Freebies and Software installations

Download of “free ringtones”, “free images”, “free smiley” should be avoided, except from trustworthy sites. Most of the freebies contain harmful malware. Clicking on suspicious links should be avoided. If you are unaware about a particular site, do not visit it. Sponsored links and ads on blogs on various non-reputed websites are mainly scams and may contain malware, which may corrupt your system.

Download of software should only be from a reputed source, and one should always read the license agreement before installing a new software. All ways keep the softwares updated. It is also recommended to create a System Restore Point before installing a new software.

Infected Computer!!!
Infected Computer!!!

So how do you protect your computer ?

No computer is malware-proof by default. Turning on Automatic Updates and the built-in firewall system is helpful. Use of a third-party firewall is recommended for additional benefits, since Firewalls filters both incoming and outgoing data streams.

Install Anti-Virus software, free versions are often limited; therefore buy a well known anti-virus software. It must be set to regular updates over the internet. Update the virus database in your anti-virus program regularly. Some antivirus software blocks known malicious web sites that attempt to install malware. In addition, many websites run by antivirus software companies provide free online virus scanning, with limited cleaning facilities to provide a quick update on the system.

Microsoft provides software for the users named, Microsoft Security Essentials, (for Windows XP, Vista and Windows 7) for real-time protection, the Windows Malicious Software Removal Tool (now included with Windows (Security) Updates, and Windows Defender (an optional download in the case of Windows XP) which is quite helpful in safe-guarding a PC.

Do you keep Windows Firewall and Automatic Updates On?

See results

Extra protective measures

Always keep two trusted Anti-spyware programs in the system, spy-wares and key-loggers are coded in a manner, such that they are not easily detected by anti-virus programs. It is highly recommended to scan a USB flash drive every time before accessing the contents; there may be malicious programs which may install itself on clicking.

Use of proper web browsers like Firefox, Chrome is advised since they control several pop-ups which may pose serious threats. Configure your web browsers to disable ActiveX, Java, and Javascript. You'll lose some of the fun the Web's been known for, but you'll save your computer from contracting a virus and speed up your connection.

Do you use Microsoft Protection software or Third party anti-virus programs?

See results
Virus Detected!!!
Virus Detected!!!

Last but not the least : Data Back-Up

Even with optimum protection, users fall prey to various malwares which delivers information to the programmers and damage useful data. Handling of important information should be done in a secured manner, and Data back up should always be maintained in case the system gets infected.


    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)