Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


How to secure the computer from all threats

  • Please log in to reply
1 reply to this topic

#1 Asif Ahmed

Asif Ahmed

  • Members
  • 4 posts
  • Local time:01:25 AM

Posted 07 October 2010 - 04:04 AM

Lets make contribution and secure our computers . :thumbsup:

to perfectly understand how we can secure our computer we should understand how is it insecure .

computer gets infected through this media :-

1. internet
2. usb
3. cd drive
4. all removable storage (ipods , phones , etc ,..)

this are the types of infections takes place


Computer Viruses are small pieces of software that attach themselves to real programs. An example would be a virus that attaches itself onto windows explorer. Each time you run the program windows explorer the virus will also be executed and perform the function that it was meant to perform. This can be several things such as damaging files on your computer, or erasing them all together. This is also the time in which the virus will try to spread itself onto other programs and even other computers!


A worm just like a virus is a small piece of software. However worms rather then relying on an external program to function, will run themselves over computer networks and security holes to spread. The worm will scan the network from it's host computer until it finds another computer that it can attach itself to. It will then continue this process to replicate. Because this type of infection runs by itself it can have devastating impacts. The Mydoom worm is estimated to have infected over a quarter million computers in a single day when it first launched back in March 1999.

Trojan Horses

A Trojan horse is a computer programs that claims to be one thing, but is actually another. For example you might receive a Trojan horse that is disguised as an image, but when you go to open the file, it will do whatever it is that it was written to do.

E-mail Viruses

Email Viruses are very common. They work by spreading themselves through email messages. Once they infect a computer, they will then go ahead and replicate themselves by automatically mailing out again to everyone in the victim's e-mail address book. Several of these virus's have raced through the internet. Examples of email virus's are the Melissa Virus, and the ILOVEYOU virus.

and there are many more like malware , spyware , rootkits , and hackers .

so how can we secure the computer ??

we all do mistake by securing computer with only one kind of security like anti virus / internet security / firewall etc , that too with free anti virus which doesn't secure from all kind of threats .

so here is the simple solution

install all of this freeware : 1. anti virus 2.internet security (web , firewall , hackers ) 3. usb security . ( now at least we are 80 % secured )

:trumpet: ARTICLE by ASIF AHMED . :flowers:

Edited by Blade Zephon, 07 October 2010 - 06:09 AM.
Moved from AII to a more appropriate location. ~BZ

BC AdBot (Login to Remove)


#2 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 51,743 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:55 PM

Posted 07 October 2010 - 06:50 AM

A multi-layered defense using several anti-spyware products (including an effective firewall) to supplement your anti-virus combined with common sense, safe computing and safe surfing habits provides the most complete protection.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users