How to choose an antivirus for your home computer

Which antivirus is better?

Absolutely all users, from computer gurus to beginners, know about such a terrible concept as “computer viruses”. Beginners are afraid of computer viruses, because for them they are fraught with a lot of myths and unknown, and advanced users know the extent of the consequences of such an unpleasant event as a PC infection with viruses, and are afraid of its onset. In any case, both beginners and advanced users want to reliably secure their data and their computer – this is what an antivirus is for. Antivirus will protect your files on your computer: documents, photos, music, videos and other data, including passwords and other personal data. In this article, our experts will try to help you choose the best antivirus for 2013 for your home computer.

 

 

 

 

Danger and types of viruses

To choose the best antivirus for yourself, you must understand that by the term “virus” we mean a complex of malicious files, programs and scripts that, one way or another, harm the computer. There are several types of computer viruses:

  • Worms

This type of virus does not pose any danger to the data, but at the same time “clogs” the computer by copying itself. As a result of this, the computer starts to work very slowly, in other words, it starts to “slow down”. It is worth noting that even a sufficiently powerful computer can work very slowly: windows open for a long time, programs start after a long pause, video slows down during playback, etc.

  • Trojans

Trojans are one of the most dangerous types of computer viruses. The danger of Trojans lies in the fact that they can steal data (most often passwords), change files, and delete them, disguising themselves as harmless and simple files.

  • Manipulators

Manipulator viruses, as a rule, do not harm the user’s data, their main goal is to turn the computer into a zombie so that it performs the desired action at a certain time. In the vast majority of cases, this type of virus is distributed by hackers in order to attack websites using zombie computers.

  • Blockers

Blockers are a type of virus that blocks the entrance to the operating system, requiring the user to transfer, under various pretexts, a certain amount of money to unlock.

 

 

 

Antivirus efficiency

It should be said right away that there is no perfect antivirus. Yes, antiviruses protect your computer, but no antivirus will protect your computer 100%. Why? The fact is that the essence of the work of the antivirus lies in its algorithms, thanks to which the presence of viruses in the computer is recognized. Viruses are detected by their activity or by certain actions. When the antivirus knows the virus and its features, then, when it enters the computer, the antivirus notices it and informs the user about the danger. This is what concerns well-known antiviruses, but there are also new viruses that are not yet known to antivirus developers and are not included in antivirus databases. This situation is well thought out. To do this, antivirus algorithms monitor the activity of files and applications and, if they are suspicious, inform the user by offering a specific list of actions. All this is good, but there are viruses that the antivirus may not notice, these are, as a rule, new viruses or updated old ones. There are other reasons for skipping viruses by antivirus, but we will probably not touch on them.

Protecting your computer on the Internet

Modern anti-virus programs include not only the ability to detect and remove viruses, but also the ability to protect your computer from various undesirable consequences: hacker attacks, intrusive advertising on sites, spam, etc. Thus, the antivirus includes a firewall, which, probably, most of you have heard of. If earlier antivirus and firewall were different programs, now, as a rule, the best and most advanced versions of antiviruses include comprehensive protection, that is, antivirus + firewall.

 

 

 

What are the criteria for choosing the best antivirus

The best antivirus for your own computer should initially include basic functions and have features that we will list below:

  • Antivirus scanner

The scanner function scans the hard disk and RAM for viruses. It is very good if the scanner periodically automatically checks for changed and added files, for the so-called passive security.

  • Antivirus monitor

This function of the antivirus continuously monitors the activities of your computer, that is, it monitors all events that occur on the computer, preventing viruses from leaking into the computer.

  • Application Control

Quite often, viruses penetrate programs or are pseudo-programs, which is why the program control function was created. If there are any suspicious actions of applications, this control immediately informs the user about it and determines the type of threat.

  • Network Control and Web Antivirus

Another necessary function of the antivirus, in our opinion, is to control the local network and Internet traffic. Thus, you will be protected from computer attacks from the local network and the Internet, as well as from the negative consequences of malicious codes and infected sites.

  • Flexible settings

The more settings an antivirus has, the better. Thanks to this, you can choose the level of control of a particular antivirus function: low, medium or high, or completely disable unnecessary functions in order to remove unnecessary load on your computer’s resources. In addition, you can create your own rules for searching and detecting viruses, as well as actions taken by the antivirus when detecting virus activity on your computer.

  • Updating anti-virus databases

Anti-virus databases are the so-called file cabinet of viruses and a repository of algorithms for their detection and neutralization. For reliable computer protection, anti-virus databases must be constantly updated and up-to-date, due to which, when a new virus appears on the network, developers will create a neutralization algorithm and add it to the anti-virus database. By frequently updating your anti-virus databases, your anti-virus will have the latest algorithms for neutralizing new or updated viruses.

  • Antivirus Self-Defense

An antivirus should ensure not only the security of the computer, but also its own security. That is, the antivirus must have self-defense, thanks to which viruses will not be able to turn it off, neutralize or block the launch. This is another reason why the antivirus may not detect or remove the virus.

  • Resource Efficiency in Passive Mode

Well, the last important factor when choosing an antivirus is to analyze the consumption of computer resources by it. Despite the fact that modern antiviruses use computer resources sparingly when working in passive mode, nevertheless, some unsuccessful versions of antiviruses can have this problem, so you need to pay attention to it. It should be noted that it is necessary to distinguish between the passive mode of operation of the antivirus and the active one. Passive mode is when the antivirus is minimized to tray and monitors the operation of the computer, and active mode is when you independently launched a computer scan for viruses or perform another active action.

These are the so-called basic functions that must be in your antivirus. The only exception is network control, which is related to the firewall.

Which antivirus is the best

All users have their own criteria and preferences in antiviruses, which is why each user will have their own best antivirus. Before touching on the list of the best antiviruses, according to MasterServis24.ru site experts, it is worth saying that the vast majority of antiviruses have 2 types of antivirus programs for computers and laptops: simple antivirus and antivirus + firewall (with additional functions). For a home computer, a regular antivirus is enough, but if we talk in the vein of our topic, then the distribution kit that includes an antivirus + firewall can be called the best. If your computer does not have an Internet connection, then, in fact, you do not need a version with a built-in firewall, but if you have Internet access, we recommend installing an antivirus with a firewall.

Next, we want to bring to your attention a list of the best popular antiviruses, based on our personal experience.

 

 

 

 

1. Kaspersky (Kaspersky Anti-Virus)

 

In our opinion, Kaspersky Anti-Virus is currently the best anti-virus solution. There are many versions of Kaspersky Anti-Virus, but we will highlight two of the most popular ones: Kaspersky Anti-Virus and Kaspersky Internet Security. The difference between these two versions of the antivirus is that the first version is a simple antivirus, the second is an antivirus + firewall. Despite the shortcomings, the advantages of this antivirus are much greater and they are more significant. Now let’s analyze all the pros and cons of Kaspersky Internet Security.

Benefits:

  • High degree of protection against viruses;
  • Beautiful and user-friendly interface;
  • High functionality and customization;
  • Global popularity;
  • Presence of traffic control, site check and anti-banner.

Weaknesses:

  • Sufficiently high price;
  • An extra “independence” of the antivirus in some situations;
  • Active scan consumes a lot of computer resources.

Antivirus prices:

A 1-year license for Kaspersky Anti-Virus is 1200 rubles.

A 1-year license for Kaspersky Internet Security will cost you 1,600 rubles.
 

 

 

 

2. Dr.Web

 

In our opinion, Dr.Web antivirus rightfully occupies the second place among the list of the best antiviruses. In principle, Dr.Web and Kaspersky go hand in hand, but, nevertheless, Dr.Web is somewhat inferior to its main competitor. Dr.Web antivirus has two versions Dr.Web Antivirus and Dr.Web Security Space, simple antivirus and antivirus + firewall, respectively. Let’s analyze them.

Benefits:

  • Good virus protection;
  • Internet control, website checker and anti-banner;
  • Simple interface.

Weaknesses:

  • Despite the good work of the antivirus, it sometimes misses viruses when scanning a PC;
  • In the latest versions of the antivirus, flaws were noticed that led to some problems in working with the program;
  • Compared to Kaspersky, it has a low price for a license, but it is not too affordable;
  • The lack of customization options as in the previous product.

Antivirus prices:

A 1-year license for Dr.Web Anti-Virus will cost 990 rubles.

A 1-year license for Dr.Web Security Space costs 1290 rubles.
 

 

 

 

3. NOD32

 

NOD32 is also a popular antivirus among home users. This antivirus protects your computer well from viruses and includes a number of useful additional features. Like other antiviruses, NOD32 has two versions: ESET NOD32 Antivirus and ESET Smart Security (with a firewall). After analyzing the antivirus, the following can be distinguished.

Benefits:

  • Good virus protection;
  • Ad blocking;
  • Social Security networks;
  • Ease of use.

Weaknesses:

  • Problems with complete removal of the antivirus from the computer;
  • Sometimes, quite simple Trojans have been seen to be missed by antivirus software;
  • High license cost (and unjustified);
  • Problems with the speed of checking the computer for viruses.

Antivirus prices:

A 1-year license for ESET NOD32 Antivirus will cost 1080 rubles.

A 1-year license for ESET NOD32 Smart Security costs 1690 rubles.

 

 

 

 

4. Аvast!

 

Well, at the end of the review of the best antivirus products, we should mention Avast! antivirus. As for its paid version – Avast! Internet Security, in our opinion, it occupies the last step in the ranking of the best antiviruses, which cannot be said about its free version – Avast! Free Antivirus, which is the best free antivirus available today. Avast! Free Antivirus is a full-fledged simple antivirus, and not a utility for checking your computer for viruses, which we will consider below.

Benefits:

  • Free, and a full-fledged antivirus, not a utility;
  • Good as for a free antivirus, virus detection;
  • Block sites that can harm your computer;
  • Nice interface.

Weaknesses:

  • Low functionality;
  • Compared to paid counterparts, it sometimes skips viruses;
  • Does not block ads or banners on websites.

Antivirus prices:

Avast! Free Antivirus is free.

1 year license for Avast! Internet Security is 1450 rubles.

Well, after all of the above and after describing the best antiviruses to date, it is worth summing up a little. Like it or not, only a paid antivirus can reliably protect your computer from various types of threats, and besides, it will include a lot of additional services, which is very convenient. Summing up, let’s say that, in our opinion, the best paid antivirus is Kaspersky Internet Security, and perhaps the only high-quality free antivirus is Avast! Free Antivirus. Well, the final choice is yours.

The material was taken from the site: http://masterservis24.ru

Website promotion principles

General information:

There is a crisis in the yard, which means that business, as well as in non-crisis times, is looking for ways to generate a flow of incoming customers cheaply. Creating a company website and promoting it on the Internet is a way to get new customers cheaply. Ideally, your site should present your product and prepare the client for purchase.

Now in the market of IT-services there are a lot of proposals for promoting websites on the Internet. Everyone is talking about keywords, headline optimization, rankings, charts sent, monthly maintenance…

So what is website promotion on the Internet and how does it differ from the work of increasing calls and letters from real customers?

Speaking about website promotion, we are talking primarily about Internet search engines. These include companies such as Yandex, Google, Mail, and others. Search engine – in response to the user’s request, issues a number of links to sites, ranking them according to “relevance”, that is, according to compliance with a particular consumer request.

Higher places in the search engine results, if you simplify everything, are occupied by sites in which the search word contains the maximum number of times. But in order for the site to meet the user’s requirements in the first place, search engines develop complex algorithms for evaluating sites for compliance with the search words – “key”, trying to predict the desires and interests of the client. These algorithms are kept secret, and the task of a specialist promoting your site in the search results is to try to predict the actions of the search engine algorithm and put the right words in the right places on your site so that it ranks higher in the search results.

Search engines with the help of robots constantly explore sites on the Internet, indexing them and placing ratings. Therefore, the promotion of the site in the issue takes months and years, and this allows you to take a monthly fee from you, giving you incomprehensible numbers in the charts.

But the results of the issuance of a modern search engine are the result of the work of a complex algorithm that remembers and knows your interests. For example, you probably noticed that when you look for a washing machine or a fishing rod on the Internet, how immediately within 2-3 weeks, information about washing and fishing somehow flashes on your monitor? This is also the result of the work of complex search engine algorithms.

Search results may be different on different computers. It all depends on the search history of a particular client.

We believe that the classic “Promotion” of the site and the battle for the first place in the search results, for example, by the word “Buy a puncher” is not an effective and outdated method.

We believe that in today’s environment, sales teams need to know and use free tools that are available to anyone and do not require special technical knowledge and skills.

Principles of customer acquisition.

Correct site content

  1. Be concise. The average visit time to a site is between 20 seconds and 3 minutes. Usually, it is easier for the user to close the window and go to your competitor’s site than to delve into the text and signs. – information on the site should be short, easy to read.
  2. Contacts – always in sight – the desired way of contacting you should always be in front of the client’s eyes.
  3. Product – face – attention on the main page of the site should be paid to YOUR PRODUCT!!!, and not to what a great company you are.

Using free marketing tools

  1. Study the client – Yandex counter codes must be configured and working on the site, with the configured Web Visor – this is a Yandex product that allows you to view the actions of your visitors. You just see how they move the mouse – which means what they are looking at. What are they interested in and so on.
  2. Know the client – the same Yandex counters give you information about the gender, age, equipment of the client. Google counters – give information about the client’s INTERESTS. Geographic location and status.
  3. Develop – work on optimizing the blocks on the site, improving the appearance of the product, in accordance with the actions of users on the site, should be carried out constantly.
  4. Study the market – Yandex projects word selection and Google trends – will help you study the history and popularity of certain queries on the topic of your product.
  5. Be healthy – among other things, it is necessary to check the site for viruses and spam applications weekly, check site backups. So, for example, if your site was hacked by a virus and placed malicious code on it, you can find out about it only after a few months, and as a rule this happens by accident. And the main danger is that your address on the Internet will fall into the bases of unreliable ones. In this case, it will take months to exclude you from the list of intruders. And all this time, when your clients try to access the site, they will receive warnings from their antiviruses, which is dangerous for you.

Using Paid Marketing Tools

Both Yandex and Google have paid and very inexpensive advertising tools that allow you to show your site in the first places in the search results in certain regions for certain categories of users at certain times. It works much more efficiently than any “promotion” of your site.

For example, according to the word “Buy a puncher” in Yandex – 5,000 requests and 10,000 sites. So your site for these words can be given out by Yandex in first place in 500 requests that are made from Ufa and only during business hours. And you pay only for clicks to your site, so you get about 50-70 clicks from guaranteed interested customers.

For more information about attracting customers to your business, please call 89899500527 or 89273211707 and talk to our specialists.

Application Victoria

Almost all computers today have a hard drive. And no matter how they tried to replace it with other more reliable and faster carriers, an equal alternative was never developed. Hard drives have a number of advantages, such as large amounts of data and low cost. Among the shortcomings are quick breakdowns, damaged sectors. Many know this firsthand. Almost everyone had unpleasant moments when the hard drive with all the information accumulated over the years began to act up.

One of the ways to save a hard drive or find out about its future failure is software repair and diagnostics using the Victoria program for Windows. Although many experts say that this program does not count anything other than the number of stars on the day of the banana harvest, it still has a lot of benefits.

Firstly, thanks to the Victoria hard drive recovery program for Windows, you can quickly detect bad sectors and mark them as non-working. After that, they will not be read at all, and, therefore, there will be no freezes and errors when reading.

Secondly, Victoria under Windows makes excellent diagnostics. The speed of diagnostics is not slower than in Victoria under DOS. After the diagnosis, you can always find out how much is left for your disk and whether you need to do treatment under paid versions of the program, or under DOS.

Thirdly, Victoria for Windows is very easy to use and does not require much knowledge. Even the most inexperienced beginner can run a series of tests that will show interesting results.

Let’s look at an example of checking and restoring a hard drive using Victoria. The application itself, as a rule, is distributed in an archive without an installer. And you do not need to install it: the program is distributed without an installer and fully works without installation. The size of the program does not exceed 600 kilobytes.

After the archive with the application is unpacked, you need to run the application itself. To do this, select the green cross icon and click on it. After that, you will be prompted with the program window. At first glance, everything seems complicated and incomprehensible, but in fact everything is very simple. Switching between tabs changes between basic information about the hard disk, or “passport”, and other program functions: information about the disk status, testing, deep work with sectors, settings. Let’s look at these tabs one by one below.

Standard.

In this tab, you can get basic information about the hard drive: model, firmware, serial number, and other additional data. In order for the program to read data about the disk, click “Passport”.

SMART.

Here you will find the basic information that the hard drive reports. This is a series of test results for reading and writing, health and responsiveness of the hard drive. The information is presented by a number of tests, the transcript of which you will find on the Internet. To get the results, click “Get SMART”.

TEST.

In the TEST tab, what we need is testing for errors and fixing them. This tab needs to be analyzed in more detail. On the left, in the working area of the program, we see a number of different cubes (rectangles). These are sectors. During testing, each cluster will be marked with a color that characterizes its state.

Gray sectors are good sectors.

Green – those that respond more slowly, their reading requires more time. However, they are also in good condition.

Orange. Orange sectors indicate a very long reading. As a rule, it is they who create the braking of the hard drive. When testing, there should be no more than 50 (approximately). They are working, but will soon fail. They cannot be restored.

Red sectors are damaged or cannot be read. Can’t be restored. The presence of such sectors indicates that you need to think about changing the disk.

Blue with a cross. Blue sectors with a cross are those that caused a failure when reading. Information from them cannot be recovered. It is necessary to re-partition such sectors so that the hard drive does not write to or read data from them. This is done using the “Remap” option, which you will read about below.

Also in the settings panel you can find round toggle buttons Ignore, Erase, Remap, Restore.

Ignore. This option tells the scanner that no changes need to be made. We ignore bad sectors.

Erase. The Erase option conveys that sectors need to be overwritten.

remap. This option must be enabled when you need to repartition bad sectors. Having found an error, the program marks the sector as non-working and replaces it with a healthy one.
Restore is used when a sector needs to be restored. Only available in the paid version.

After all the settings are set, you need to click “Start”. The program for checking the hard disk will scan the hard disk for a long time, which can take about a day or more if there are errors. A lot also depends on the size of the disk. A good disc is quickly checked.

In conclusion, I would like to say that checking the hard drive with the Victoria program will not save your drive, just as cosmetics do not save a person from old age. If your disk has grown old, then this is an irreversible process and cannot be returned. Sectors fail one by one, and their recovery does nothing. If there are dead sectors, it means that there will be more soon. It happens like a nuclear bomb explosion, a chain reaction. Therefore, if there are bad sectors, you need to change the disk and copy the information while it is available.

Protection against encoding apps. Part 2

1. Customize your computer settings.
Starting with Windows Wista, the OS includes a system protection service across all drives, which backs up files and folders during a backup or creation of a system restore point. After installing the OS, this service is enabled only for the system partition, usually drive C. For additional protection, it is recommended to enable this service for all drives.

2. What to do if the files are encrypted.
If an antivirus program is installed on the computer, then in the settings you need to do the following:
– disable automatic removal of detected malware.
– set to place suspicious files in quarantine.
– If you find a suspicious file, the launch of which has led to computer infection and file encryption, you can send it for analysis, for example, to Kaspersky Lab by e-mail [email protected]. Pack the files for analysis into an archive with the infected password (using the WinRar archiver). When setting a password, select the Encrypt file names check box.
– It is necessary to create a copy of all encrypted files.
– You can try to recover files using File History for Windows Vista, Windows 7, Windows 8, Windows 10.
– You can also try using Kaspersky Lab utilities for decryption: RectorDecryptor utility; XoristDecryptor utility; RakhniDecryptor utility.

Before running the utility, be sure to make copies of all files.
– List of places where files of the ransomware can be located:
APPDATA
OS Windows NT/2000/XP:

Drive:Documents and Settings%UserName%Application Data
%USERPROFILE%Local SettingsApplication Data

OS Windows Vista/7/8:

Drive:Users%UserName%AppDataRoaming
%USERPROFILE%AppDataLocal

TEMP (temporary directory)
%TEMP%???????.tmp (example: tempvum35a5.tmp)
%TEMP%???????.tmp?? (example: temp7ze5418.tmpmp)
%TEMP%??????? (example: temppcrdd27)
%WINDIR%Temp

Internet Explorer temporary directory
OS Windows NT/2000/XP: %USERPROFILE%Local SettingsTemporary Internet Files

OS Windows Vista/7/8:

%LOCALAPPDATA%MicrosoftWindowsTemporary Internet Files
..temporary internet filescontent.ie5
..temporary internet filescontent.ie5???????? (? — a-z, 0-9)

Desktop
%UserProfile%Desktop

Recycle Bin
Drive:Recycler
Drive:$Recycle.Bin
Drive:$Recycle.Bins-1-5-21-??????????-??????????-??????????-1000 (? — 0-9)

System directory
%WinDir%
%SystemRoot%system32

User document directory
%USERPROFILE%Мои документы
%USERPROFILE%Мои документыDownloads

Directory for downloading files in a web browser
%USERPROFILE%Downloads

Startup directory
%USERPROFILE%Главное менюПрограммыАвтозагрузка

Remote desktop connection using Team Viewer

Good afternoon

What is Team Viewer?

TeamViewer is a software package for remote control of computers, file exchange between the control and managed machines, video communications and web conferencing. TeamViewer runs on operating systems Windows, Mac OS X, Linux, iOS and Android[8][9].
In addition to a direct connection, access is possible through a firewall and NAT proxy, it is possible to gain access to a remote machine through a web browser.
TeamViewer GmbH was founded in 2005 in Germany. According to company press releases, TeamViewer is used on more than 15 million computers in fifty countries around the world.

Where to download and how to set it up?

You can download it from here Team Viewer

The setup methods are very simple. Download the file, open it, choose who you want to continue with and how you want to use this program. Then click “Accept-Finish” and wait for the installation to complete.

After the installation is complete, you will be prompted to set up uncontrolled access, the access with which a person who knows the username and password can connect to the computer without your knowledge.

Click continue. Enter the Username and password twice (using this password, the user will be able to connect without your consent to your computer)

After clicking the “Continue” button, you will be prompted to subscribe to the newsletter

At the end of the mailing selection, the program will give you “Your ID” and “Password”, the password will consist of 6 characters. This password of 6 characters is one-time, i.e. for each use of the password, the program will generate a password.

Remote desktop connection

What is Remote Desktop Connection?

You may have heard about a remote connection from a system administrator at work or from a friend who is well versed in computers. If you need to know what a remote connection to a desktop, computer is, then this article is well suited for this.

What is Remote Desktop Connection?

To understand what a remote connection is, you need to understand what happens and how. Remote Desktop Connection exists when there are two computers that can communicate with each other. This means that they must be on the same local network or be connected to the Internet.

Remote Desktop Connection allows you to use almost any computer or device to connect to another computer. After connecting remotely, you have access to all computer resources. The user is able to input information from their keyboardsand mouse, and on the display of the computer from which the control takes place, you can see everything that happens on the remote computer. Unrestricted access to the device means that you can do the same as being nearby.

For a more specific understanding, it is necessary to imagine a situation where you need to do work on an office computer in a short time, although it is impossible to do all the work in the office, but you need to work, it is on the office computer. In this situation, it would be great to continue working at a work computer while at home.

Everything is possible if you establish a remote desktop connection between your work computer and your personal computer. The office computer will be considered the main or host, because the work takes place with it. The home computer is the client, it is used to connect. After establishing a connection to a remote desktop, you can use your computer to do all the work in the office.

What do you need to set up a remote desktop connection?

First of all, in order to be able to establish a connection to a remote desktop, computers must support this function (operating systems) or a program for setting up remote connections must be installed.

If you are using a computer running Windows (Windows 7, Windows 8.1, Windows 10), these versions support remote connection by default and some earlier ones. But not everything is so great, each version of Windows is divided into separate editions with or without this feature. This feature is available on the following editions of Windows:

  • Windows 7 Professional, Ultimate and Enterprise;
  • Windows 10, 8.1 and 8 Professional and Enterprise;
  • Windows Vista Business Enterprise and Ultimate, and Windows XP Professional.

The remote computer must have one of the Windows listed above installed, but to connect to a remote desktop, this rule is not necessary and you can use any other Windows.

If the situation in which you need to establish a remote desktop connection between two computers that are not on the same network, but via the Internet, but IP address of the main is not statistical (not constant), then you need to use a third-party application like Team Viewer. You can see how to set up this program here

In addition to managing the remote desktop using a computer, you can also manage from other devices. The host device must be a computer, but another kind of device can be a client. The connection device for controlling the host computer (the computer to which they are connected) can be a smartphone, tablet, etc. For example, you can use your Android smartphone to control your home computer from a different location. To do this, you need to use the available remote desktop management applications.

Remote Desktop Connection allows you to control your computer from almost anywhere in the world. For many, this feature is indispensable, especially for the representative of the technical support team, the system administrator and the fan of postponing office work at home.

Protection against encoding apps. Part 1

Good time of the day!

Recently, ransomware programs have posed a great threat to the data on your computer. They encrypt all data files (.doc, .xls, .jpg, .bmp, databases, etc.) on the computer’s hard drive and accessible network folders, as a result, reading them becomes impossible. After that, a message appears that describes the procedure for contacting scammers, how to pay and receive a file for decrypting data. Naturally, no one can guarantee the result of data recovery. I propose to talk in the first part about general recommendations on how to protect information on your computer.

1. Do not open email attachments from questionable or unknown senders.

In most cases, ransomware is distributed via email attachments. Subjects of the letters contain threats: notification from the arbitration court about the claim; enforcement proceedings for the recovery of debts; initiation of criminal proceedings and the like. Or invoices, acts and accounting documents from various suppliers. The main task of scammers is to force them to open an email attachment and launch a malicious program. A malicious attachment will not necessarily have an .exe extension, it can be .doc and .pdf and others.

2.  Constant updating of anti-virus databases, OS update.

It is necessary to constantly update the databases and components of anti-virus programs. It is also necessary to update the OS on the computer in order to timely get rid of vulnerabilities that criminals can take advantage of.

3. Backup important information.

It is necessary to store copies of important information on external storage media (external hard drives, flash drives), or in cloud storage.

4. Setting access rights to shared network folders

If there are shared network folders, then you need to properly configure access to them to minimize data loss. It is recommended that each user set up a separate folder with full access to it, and give other users only read rights. Thus, when a computer is infected, the data will be encrypted only in one network folder, the rest will remain untouched.