ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How to Protect Your Computer From Malware

Updated on May 16, 2021
Patkay profile image

Patrick is a dedicated computer technician and writer. He strives to make the world better by informing individuals who seek more knowledge.

A Hacker

An Image of a Hacker
An Image of a Hacker | Source

Secure Your Computer To Secure Your Data

Your personal computer is a valued device, your data is much more important than your computer. Both must be protected at all costs.

The issue of computer malware confuses a lot of people.

The term malware is actually a shortened form of malicious software. Malware is software created or developed to damage or perform unwanted actions on your computer.

Malware is also capable of disrupting your computer operations and gathering your sensitive information without your knowledge.

Examples of Malware are:

  1. Computer virus
  2. Computer worms
  3. Spyware
  4. Trojan horses
  5. Rogue security software

A Computer Virus

A computer virus is a software program designed to interfere with the normal operations of your computer.

It can corrupt or worse delete data on a computer making it impossible for you to access your documents.

They spread rapidly from an infected computer to other uninfected computers.

They can also be infected to systems that are already infected making you end up with a mixed grill of viruses.

They are easily spread via removable devices like USB flash drives, through the Internet by downloading infected software or through email programs especially attachments.

A Computer Worm

A worm is a malicious software that propagates itself by replicating without the user's interaction.

Usually, it uses a computer network to pass from one computer to another.

In most cases, worms will originate from email attachments where they spread to the computer when the attachment is opened.

They also send themselves as infected email messages to other computers.

Worms are not as harmful as viruses but they end up consuming the bandwidth of your network.

Malware Scan

Malware scanning in progress with three objects detected
Malware scanning in progress with three objects detected | Source


This is a software package that secretly gathers information from your computer. It does so through the Internet connection without your authority or knowledge.

In most cases, this is done for advertising purposes. They are capable of collecting sensitive information like bank or credit information, user logins, and browsing habits.

Having acquired your browsing habits, you can then be bombarded with advertisements related to your surfing habits.

Others can also install additional software, change your computer settings, and slow down your Internet connection speeds.

A Trojan Horse

A Trojan horse is a malicious program that masquerades as a normal program inside other programs.

It gains access to the computer by hiding itself in a legitimate program, for instance, a screensaver, free applications, and games from the Internet.

Then, once inside your computer, it will put a code into the operating system and from there on you are at the mercy of a hacker.

Rogue Security Software

This is a software program that tricks you to think that your computer has a virus attack.

Thus it prompts you to buy or download a program that will clean your computer.

These messages usually appear as pop-ups which should be closed using the Alt + F4 key combinations.

Always be extra careful before downloading any software from the Internet.

Why You Need An Anti-Malware In Your Computer

Many people will install an antivirus program in their system and think that they are 100% protected.

That is what I have been doing until my computer was attacked by a Csrss.exe Trojan horse.

Checking from the processes running, the csrss for windows service was having lower case letters while the Trojan had a capital C.

The antivirus I was using could not detect it. The Trojan was turning word documents to have the .exe (executable) extension.

So, it is only after opening such documents that I was getting a warning about an attempt to open a suspicious file.

Turning to the Internet, I decided to download Malwarebytes, a free anti-malware, though you can also get a paid version.

I used the free version which managed to detect and delete all the Trojan horses I had on my computer.

Trojan Horse Detected

Detected trojans
Detected trojans | Source

How To Protect Your Computer Against Malware

  1. Install an antivirus program on your computer. The antivirus you use should be able to detect a wide range of virus including the current ones because viruses are created daily. We have a lot of free antiviruses that are good and capable of protecting your computer just like the paid versions.
  2. Install an anti-malware. You should also go for reliable malware that will be able to detect malware and destroy them.
  3. Keep on updating your antivirus and anti-malware regularly.
  4. Scan removable devices like USB flash drives after attaching them to your computer.
  5. Scan software and other documents you download for malicious software.
  6. Be extra cautious when opening attachments especially from dubious sources.
  7. Regularly scan your computer.

Is your computer secured?

See results

This content is accurate and true to the best of the author’s knowledge and is not meant to substitute for formal and individualized advice from a qualified professional.

© 2012 Patrick Kamau


This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

Show Details
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)