top of page

📣 recommend ways to prevent computer virus


📣 recommend ways to prevent computer virus  📌 Computer Virus A program that has the ability to copy itself onto a computer. And if there is a chance, it can be inserted into other computer systems. This can be caused by reusing an infected disc or flash drive from one computer to another. Any computer infected with a virus This means that the virus has already entered the computer's memory. For a virus to get into memory, it must be run. Usually, users tend to be unaware of that. while they run any program or open any file to run also called the virus up to run The purpose of each virus's functioning depends on its author, for example, it may create a virus to destroy other programs or data. address on computer or showing messages running around on the computer screen, etc.  📌 Types of viruses on the computer The function of a computer virus is to infiltrate and implant in the memory (ram) of the computer. After that, the virus will gradually damage the computer system. It works depending on the purpose of the virus. Whether it is the destruction of data within the computer. Theft of information about the personal history and financial information of the computer owner. or disrupting the inability to use the computer normally They may appear in the form of a moving mouse. Messages run across the screen. or unable to open the computer, etc. There are several types of computer viruses. which can be summarized into 7 types as follows:  1. Worm It is one of the dangerous types of computer virus. that can seriously damage the computer Due to its properties, it can spread quickly to computers and other electronic devices. As well as can greatly deteriorate the performance of the computer. In addition, because the worm virus can spread quickly to attack the system. This makes removal more difficult. And it is necessary to use an antivirus that has high potential to fight against worms that invade the computer system.  2. Boot Virus This type of computer virus lurks on CD-ROM or Flash drives to attack the computer immediately. When the hard disk starts reading the CD It targets the master boot record before moving to memory. and start working immediately When a computer starts booting after turning on, a computer infected with this type of virus does not show any obvious symptoms. But it usually spreads to the CD-ROM while the computer is booting to shutdown. and with this contact method This allows the boot virus to infect other computers without even knowing it.  3. Macro Virus It is another type of computer virus that can be found in the workplace. Especially the office work that has to deal with various document programs by macro virus infiltrates in document files such as Microsoft Word or Microsoft Excel. There is a feature to send macro commands for automated tasks in document files.  4. Trojan Horse Although a trojan cannot be called a computer virus. But it's purpose is to harass and undermine a computer's performance just like any other virus. In short, a trojan is a set of programs that are written to trick users into downloading and installing. It is believed that Taiwa will be able to use after installing it. Trojans come back to destroy or steal the data inside the computer. Causing damage and hurt that users are the ones who lead their homes by being tricked into installing trojans themselves. It's like the people of Troy who drag a Trojan horse into the city walls, recklessly thinking they're left behind by the enemy. Until late at night, enemy soldiers hiding in the Trojan horses climbed out and captured Troy from within. until it is the origin of the name of a trojan that is a semi-computer virus of this type  5. Stealth Virus As the name suggests, this type of computer virus has camouflage properties. For example, if a file contains a stealth virus. The file will not be able to check the actual file size. This is because a stealth virus has taken complete control of DOS, making the file look normal. but can't see the file size But actually the file is attacked by a stealth virus and camouflaged waiting for us to click on it.  6. Polymorphic Virus It is a computer virus that can be very difficult to control. Because it has the ability to copy itself until it spreads twice as much. Hundreds of patterns Today, there are many computer viruses with such features. As a result, virus scanning alone may not be enough to detect all types of viruses. Therefore, we need to use an antivirus that has a higher capacity and more versatility.  7. File Virus This type of virus is one of the most common everyday viruses. especially those who are popular for downloading free programs from the Internet The virus will disguise itself in the form of program installation files, most of which have an .exe extension, so you should check the source of the program. credibility of the website before loading those program files Because it may be a war to enter the house by bringing the virus to release into their own computer if not careful.  📌 How to prevent computer virus 1. Install an antivirus program and keep it updated. - Install a suitable antivirus program. - Create an Emergency Disk for system recovery - Update the program's virus information every day or every time the program prompts to update. - Enable auto-protect if the program supports it. - Always check for viruses before opening files from discs or storage media. - Use a program to check for viruses on your computer at least once a week.  2. Install the patch (patches) by updating software and applications regularly. - Operating system (OS) Windows, operating system, Internet Explorer (IE) and Microsoft Office programs, etc.  3. Optimized for the most secure software - Configure the program that is used to read E-mail from running attachments (Attachment) automatically. - If using Microsoft Office, macros should not be allowed. - Set the operating system to show all available files. You can also show the file extension by adjusting the Folder Options in Windows Explorer Tools.  4. Be careful of the dangers of opening files from various media. - Such as floppy disks, CDs, DVDs, tape backups, etc. - Scan for viruses from storage media before every use - Do not open files with strange and suspicious extensions such as .pif, etc., including files with overlapping extensions such as .jpg,.exe ,.gif.scr , txt.exe , etc. Delete the file immediately. - Do not use storage media unknown source  5. Be careful when opening and reading E-mail. - Do not open files attached to E-mail until you know the origin. - Do not open and read e-mails with a subject that is a motivational message. - Delete e-mails from unknown sources immediately. to cut all problems  6. Be aware of the risks of downloaded files. or obtained from the Internet - Do not open files attached to chat programs such as ICQ, MSN, etc., or exchange files. Especially files that can be run such as files with extensions .exe , .pif , .com , .bat , .vbs etc. without checking the source first. - Should not visit websites that come with E-mail or chat programs including propaganda or web pages that appear accidentally - Do not download any files from unconvinced websites. or unreliable - Stay up-to-date with virus alert information from security sources. Avoid sharing files unnecessarily. To share files It should be shared read-only. and set a password as well  📌 Virus detection or scan (Virus Scanner) Computer viruses can spread across all platforms and are cross-border in nature. Regardless of nationality or country just connect to the internet Every computer in the world is a target of computer viruses that can transmit and move from computers in one country to another very quickly. For this reason, there are programs to detect computer viruses by scanning or scanner. The need to be installed on the computer  By the way the scanner works, it extracts some features of a computer virus known as Virus Signature or a characteristic signature of a virus It is stored as a database so that when the antivirus is running, it can send a scanner to detect the virus by tracking the signature in the memory and Boot Sectors are not different from using sniffer dogs.  📌 There are many types of antivirus or antivirus programs. But they all have the same feature: detecting (identify) blocking and eliminating the operation of computer viruses. through the use of two techniques: 1. Checking the file suspects traces of a computer virus stored in the Virus Dictionary database.  2. Scan to detect abnormalities of programs, files or storage devices such as CD-ROM, Flash drives, whether there is a behavior that is likely to have a computer virus embedded in it or not. to carry out the containment and eventual destruction  ------------------------------------------------------------------------------------- Interested in online marketing care services | online marketing | complete graphics | can contact us anytime | brand building | online marketing | online marketing plan | brand building | Facebook fan page care | Take care of LINE OA. You can contact us 24 hours a day.   Details of online marketing services >> https://www.chatstickmarket.com/langran Examples of various brands that we take care of online marketing >>https://www.chatstickmarket.com/portfolio ---------------------------------------------------------------------------------------  💙 Consult our team 💙 📱Tel : 0840104252 📱0947805680 Office Hotline : 034-900-165 , 02-297-0811 (Monday-Friday) 📨 Inbox : http://m.me/ChatStick.TH ┏━━━━━━━━━┓ 📲 LINE: @chatstick ┗━━━━━━━━━┛ or click https://goo.gl/KuzCpM 🎉 details at http://www.chatstickmarket.com/langran 🎉 See our work at https://www.chatstickmarket.com/portfolio

📣 recommend ways to prevent computer virus


📌 Computer Virus

A program that has the ability to copy itself onto a computer. And if there is a chance, it can be inserted into other computer systems. This can be caused by reusing an infected disc or flash drive from one computer to another. Any computer infected with a virus This means that the virus has already entered the computer's memory. For a virus to get into memory, it must be run. Usually, users tend to be unaware of that. while they run any program or open any file to run also called the virus up to run The purpose of each virus's functioning depends on its author, for example, it may create a virus to destroy other programs or data. address on computer or showing messages running around on the computer screen, etc.


📌 Types of viruses on the computer

The function of a computer virus is to infiltrate and implant in the memory (ram) of the computer. After that, the virus will gradually damage the computer system. It works depending on the purpose of the virus. Whether it is the destruction of data within the computer. Theft of information about the personal history and financial information of the computer owner. or disrupting the inability to use the computer normally They may appear in the form of a moving mouse. Messages run across the screen. or unable to open the computer, etc. There are several types of computer viruses. which can be summarized into 7 types as follows:


1. Worm

It is one of the dangerous types of computer virus. that can seriously damage the computer Due to its properties, it can spread quickly to computers and other electronic devices. As well as can greatly deteriorate the performance of the computer. In addition, because the worm virus can spread quickly to attack the system. This makes removal more difficult. And it is necessary to use an antivirus that has high potential to fight against worms that invade the computer system.


2. Boot Virus

This type of computer virus lurks on CD-ROM or Flash drives to attack the computer immediately. When the hard disk starts reading the CD It targets the master boot record before moving to memory. and start working immediately When a computer starts booting after turning on, a computer infected with this type of virus does not show any obvious symptoms. But it usually spreads to the CD-ROM while the computer is booting to shutdown. and with this contact method This allows the boot virus to infect other computers without even knowing it.


3. Macro Virus

It is another type of computer virus that can be found in the workplace. Especially the office work that has to deal with various document programs by macro virus infiltrates in document files such as Microsoft Word or Microsoft Excel. There is a feature to send macro commands for automated tasks in document files.


4. Trojan Horse

Although a trojan cannot be called a computer virus. But it's purpose is to harass and undermine a computer's performance just like any other virus. In short, a trojan is a set of programs that are written to trick users into downloading and installing. It is believed that Taiwa will be able to use after installing it. Trojans come back to destroy or steal the data inside the computer. Causing damage and hurt that users are the ones who lead their homes by being tricked into installing trojans themselves. It's like the people of Troy who drag a Trojan horse into the city walls, recklessly thinking they're left behind by the enemy. Until late at night, enemy soldiers hiding in the Trojan horses climbed out and captured Troy from within. until it is the origin of the name of a trojan that is a semi-computer virus of this type


5. Stealth Virus

As the name suggests, this type of computer virus has camouflage properties. For example, if a file contains a stealth virus. The file will not be able to check the actual file size. This is because a stealth virus has taken complete control of DOS, making the file look normal. but can't see the file size But actually the file is attacked by a stealth virus and camouflaged waiting for us to click on it.


6. Polymorphic Virus

It is a computer virus that can be very difficult to control. Because it has the ability to copy itself until it spreads twice as much. Hundreds of patterns Today, there are many computer viruses with such features. As a result, virus scanning alone may not be enough to detect all types of viruses. Therefore, we need to use an antivirus that has a higher capacity and more versatility.


7. File Virus

This type of virus is one of the most common everyday viruses. especially those who are popular for downloading free programs from the Internet The virus will disguise itself in the form of program installation files, most of which have an .exe extension, so you should check the source of the program. credibility of the website before loading those program files Because it may be a war to enter the house by bringing the virus to release into their own computer if not careful.


📌 How to prevent computer virus

1. Install an antivirus program and keep it updated.

- Install a suitable antivirus program.

- Create an Emergency Disk for system recovery

- Update the program's virus information every day or every time the program prompts to update.

- Enable auto-protect if the program supports it.

- Always check for viruses before opening files from discs or storage media.

- Use a program to check for viruses on your computer at least once a week.


2. Install the patch (patches) by updating software and applications regularly.

- Operating system (OS) Windows, operating system, Internet Explorer (IE) and Microsoft Office programs, etc.


3. Optimized for the most secure software

- Configure the program that is used to read E-mail from running attachments (Attachment) automatically.

- If using Microsoft Office, macros should not be allowed.

- Set the operating system to show all available files. You can also show the file extension by adjusting the Folder Options in Windows Explorer Tools.


4. Be careful of the dangers of opening files from various media.

- Such as floppy disks, CDs, DVDs, tape backups, etc.

- Scan for viruses from storage media before every use

- Do not open files with strange and suspicious extensions such as .pif, etc., including files with overlapping extensions such as .jpg,.exe ,.gif.scr , txt.exe , etc. Delete the file immediately.

- Do not use storage media unknown source


5. Be careful when opening and reading E-mail.

- Do not open files attached to E-mail until you know the origin.

- Do not open and read e-mails with a subject that is a motivational message.

- Delete e-mails from unknown sources immediately. to cut all problems


6. Be aware of the risks of downloaded files. or obtained from the Internet

- Do not open files attached to chat programs such as ICQ, MSN, etc., or exchange files. Especially files that can be run such as files with extensions .exe , .pif , .com , .bat , .vbs etc. without checking the source first.

- Should not visit websites that come with E-mail or chat programs including propaganda or web pages that appear accidentally

- Do not download any files from unconvinced websites. or unreliable

- Stay up-to-date with virus alert information from security sources.

Avoid sharing files unnecessarily. To share files It should be shared read-only. and set a password as well


📌 Virus detection or scan (Virus Scanner)

Computer viruses can spread across all platforms and are cross-border in nature. Regardless of nationality or country just connect to the internet Every computer in the world is a target of computer viruses that can transmit and move from computers in one country to another very quickly. For this reason, there are programs to detect computer viruses by scanning or scanner. The need to be installed on the computer


By the way the scanner works, it extracts some features of a computer virus known as Virus Signature or a characteristic signature of a virus It is stored as a database so that when the antivirus is running, it can send a scanner to detect the virus by tracking the signature in the memory and Boot Sectors are not different from using sniffer dogs.


📌 There are many types of antivirus or antivirus programs. But they all have the same feature: detecting (identify) blocking and eliminating the operation of computer viruses. through the use of two techniques:

1. Checking the file suspects traces of a computer virus stored in the Virus Dictionary database.


2. Scan to detect abnormalities of programs, files or storage devices such as CD-ROM, Flash drives, whether there is a behavior that is likely to have a computer virus embedded in it or not. to carry out the containment and eventual destruction


-------------------------------------------------------------------------------------

Interested in online marketing care services | online marketing | complete graphics | can contact us anytime | brand building | online marketing | online marketing plan | brand building | Facebook fan page care | Take care of LINE OA. You can contact us 24 hours a day.

Details of online marketing services

Examples of various brands that we take care of online marketing

---------------------------------------------------------------------------------------


💙 Consult our team 💙

📱Tel : 0840104252 📱0947805680

Office Hotline : 034-900-165 , 02-297-0811 (Monday-Friday)

┏━━━━━━━━━┓

📲 LINE: @chatstick

┗━━━━━━━━━┛

4 views
CS_Redesign_คอนเทนต์เดิม2_2.png
CS_Redesign_คอนเทนต์เดิม3.png
Recent Posts
c24f0332fa3b87f8a304140403b893510_64100212_210625.jpg
244712625_300456528129611_2152723951836713111_n.jpg
5.png
4.png
Button Event สติกเกอร์.png
2.png
Button ChatStick Market.png
bottom of page