Menu

Protect your PC from viruses


Symptoms of infection

We can detect that our computer is infected by a virus and other malicious software, observing certain unusual behaviors:

  • Slowness
  • When trying to open a program this does not run
  • Disappearance of files and / or folders
  • Unable to access the contents of files
  • Unexpected and unexpected error messages
  • Decreased memory space and hard disk
  • Defective sectors
  • Alteration in the properties of the files
  • Operating system errors
  • Duplicate files
  • Renowned files
  • Problems in starting the computer
  • Computer lock
  • The computer shuts down (or restarts)
  • The program closes
  • The CD-ROM tray opens and closes
  • The keyboard and / or mouse do not work correctly
  • Window sections disappear and / or new ones appear
  • Etc

Entry ways

Removable disk drives: Pendrives, Floppy disks and CD-ROMs

In the past they were the only way to access a personal computer (as long as it was not connected to a network). Viruses can be in the files as well as in the boot sector of these media that today are the most common way of infection, due to the widespread use of pendrives to share files.

Shared resources

Currently, in almost all places where there are several computers there is a network that connects them. The fundamental objective of this is the sharing of information and resources. This implies that all viruses that can circulate through this network are also shared.

Internet

Although the Internet has been in existence for several years, until relatively recently it was not a mass medium of communication, however, today its presence is very frequent in all areas. The primary function of the Internet is to facilitate, and enable, the exchange of information. Therefore, the Internet also facilitates the exchange of files that are the vehicle for the transmission of viruses.

The situation is more complex than in the case of a network. Let’s see why.

Internet has different services, these are:

Email

So far, we could find viruses only in the attachments of an email, but these can also be in the body of the message when it comes in HTML format, web page type.

Websites

In principle, web pages (HTML pages) were only text and graphics, so they did not present a virus risk. However, more and more web pages have other types of components such as Java Applets or ActiveX controls. This type of objects can be contaminated by a virus and affect a computer only by accessing the Web page in question.

Java Applets

These are small programs that run when a browser loads some Web pages. The operation is similar to that of a document with a macro. Therefore, Java applets are also susceptible to being infected by viruses.

ActiveX controls

ActiveX controls have the same function as Java applets. Therefore, and since they also run, they can be infected by viruses.

File transfer (FTP)

This file transfer protocol allows the exchange of information (files) between a server and a client. In this way, the client can either request or transmit files to said server. If we remember that a file is a virus transmission vehicle, this file transmission system constitutes another way of virus entry.

Downloads

This service allows you to download files from the Internet. These files may be infected by viruses. There are many websites that offer the possibility of downloading all types of programs, if this download is made from unsafe places, we will not have the security that these programs are free of viruses.

News Groups

Through this service, you can access newsgroups to consult and / or debate. You can also download files and even subscriptions to periodically receive emails with the new news. All these files are susceptible to being infected.

Tips to prevent virus entry

15 Tips to avoid viruses – Download File

Protective measures of the University of Granada

Antivirus Estafeta

The emails that you enter and leave the UGR, via Internet, do it through the primary mail couriers (mail1, mail2, mail3). These are the most suitable place for the installation of an Estafeta Antivirus.

This Estafeta Antivirus will ensure that the mail is sent and received free of viruses. In the case of finding an infected email, it will try to disinfect the attached file first, and if it is not possible, it will be erased. In this way, the user to whom the message was addressed will receive it. In this message the subject and the sender are kept but in the body of the message you will find a warning of the type:

Virus Warning Message (UGR Antivirus Service in mail)

“file name” is removed from here because it contains a virus.

Currently, this virus scanner detects viruses in 90% (approximately) of the mails that circulate through the post office, so it is an important source of additional security for our teams.

Antivirus Panda Platinum 7

The Center for Computer Services and Communications Networks of the UGR has acquired the Campus Panda Antivirus Platinum license, which has many advantages:

  • It is licensed for all Teaching, Research and Administration and Services staff of the University of Granada
  • The license may be used in the equipment installed in the premises of the University of Granada
  • The license may be used in the private homes of all Teaching, Research and Administration and Services staff of the University of Granada
  • The search engine can be updated automatically (upgrade) to new versions
  • The virus database can be updated automatically (upgrade) with new virus files
  • Panda Antivirus Platinum includes protection for systems: Windows XP / 2000 Pro / NT WS 4.0 / Me / 98/95 (for Windows 2000 Pro and NT Workstation, you must have administrator rights)
  • The license has technical support 24 hours and 365 days maintained by Panda Software
  • The license has support for unknown viruses in 24 hours maintained by Panda Software

Antivirus on-line

If you suspect that your computer may be infected, before proceeding with the installation of Panda Antivirus, we recommend that you perform an On-Line disinfection. All you need to do is connect to the Internet from the suspicious computer and click on this Panda On-Line link to proceed with the disinfection.

Requirements for the installation of Panda Antivirus

  • Processor: Pentium 300 Mhz or higher
  • Ram Memory: 128 MB or higher
  • Hard Disk: at least 50 MB free
  • Operating System: Windows XP / 2000 Pro / NT WS 4.0 / Me / 98/95
  • Graphics card: work with at least 16 bits of color depth (high density color)

Features

Integration with the mail management program.

Panda Antivirus 7.0 integrates with the mail assistant facilitating the execution of the antivirus at the most convenient times.

So for example, when we send an email using Outlook Express and it looks like the following image we will know that this email is being analyzed by Panda, to ensure that we send it free of viruses.

Immediate analysis

The immediate analysis allows analyzing any part of the computer in search of viruses at a certain time. They offer the possibility of choosing which area or areas they wish to analyze. The analysis is carried out at that moment. These characteristics make the immediate analysis especially indicated to verify the non-existence of viruses in new files that have been received by any means such as diskette, email or have been downloaded from the Internet.

Scheduled analysis

The programmed analyzes allow analyzing any part of the computer in search of viruses in a series of moments indicated in advance.

The great utility of these analyzes is the possibility of indicating to the program that it must be activated and analyzed in search of viruses at a certain moment. In this way, an analysis agenda is created that makes it easier for the user to keep his computer clean of viruses.

Scheduled analyzes work in the same way as immediate analyzes. It can be said that a scheduled analysis is, in reality, a set of immediate analyzes that are executed at specific moments.

Since the scheduled analyzes are the same as the immediate ones, both have the same options and configuration possibilities. The programmed analyzes offer the possibility of choosing which area or areas to be analyzed. The analysis is carried out at the time indicated. These characteristics make the programmed analysis specially indicated to analyze the computer in a regular way, thus keeping it free of viruses.

If you are in basic mode, to specify a scheduled analysis you must choose one of the predetermined scheduled analyzes that accompany the program. The purpose of these predetermined analyzes is to provide already defined the most common analyzes in order to facilitate the analysis tasks as much as possible.

If you are in advanced mode, a series of predetermined scheduled scans are also available. You can choose any of these analyzes or you can create a new analysis depending on the needs you have. There is also the possibility of varying the analysis options to adapt them to your own needs.

Analysis at the beginning

The analysis at the beginning is intended to protect your computer from the first moment. Panda Antivirus 7.0 offers two types of analysis at the beginning: analysis when starting the ordendor and analysis when starting Windows.

These types of analysis at startup have different configuration options. Being in advanced mode, you can choose the areas that will be analyzed at the start of the system. In addition, the advanced mode allows programming so that the analysis at the beginning of the system is carried out only at certain times.

Permanent analysis

The permanent analysis of files / Internet has as its mission to monitor all operations that run on the computer in search of viruses. In this way, every time you try to execute, copy, … etc a file or access, send, download contents of the Internet, the permanent analysis will analyze it to determine that it is free of viruses.

The permanent analysis minimally affects the performance of the system and offers the highest levels of protection. Therefore, it is always advisable to have it activated. Once it has been activated and until it is deactivated, the permanent file / Internet analysis will start every time the computer is started.

Leave a Reply

Your email address will not be published. Required fields are marked *