- Computer skills and programs at the level of "confident user»
- understanding of the principles of malicious structures
Unfortunately, perfection is notonly computer technology, but also "virusopisanie".Activation of the malicious program launches a process.Of course, it is disguised, but if it happens, it means that it is possible to try to detect.For example, viruses have multiplication and propagation mechanism;Trojans and spyware steal any computer user information and send them to his "master".There are also other activities for which the manifestation may be suspected malicious activity.Now look at the "behavior" of the computer.In this article, we will not cover those cases where the action of malware obviously (completely disabled by the operating system is activated «SMS-virus", destroyed or damaged the structure of the user files (corrupted images, text documents, audio files, etc.).The phenomenon of "phishing" is also omitted, since it is rat
performance of the computer. this is a reduction of the speed. Usually the user gets used to with a "speed" operations are performed on itmachine. If you notice that the rate has fallen, it is an occasion guard. at the same time, it should be remembered that this phenomenon may be other reasons. For example, if you have installed anti-virus program, your computer can be a little "slow down". A fragmented hard drive toomay adversely affect the performance. In any case, it is necessary to perform a complete antivirus scan.
operability.There is reason to worry about viruses when the computer "freezes" or spontaneously reboots.These "symptoms" may also be "non-viral" reasons (for example, a problem with the cooling system), but, nevertheless, it is necessary to perform an antivirus scan (eg, anti-virus "avast!" Can scan when the computer is turned on before starting the operating system).
«inadequacy."This occasion to think about the presence of the virus, when applications start to close themselves.Even more reason to - when they are run (especially if you run unknown applications).
Advertising.Most often, the virus activity through advertisements shown at work on the Internet.That is, when you visit the "proven" site, the browser suddenly begins to display pop-up advertising (or other, not related to the site's content) information.By "trusted" site, we understand the resource administration which is not intended to pop-up ads and other "annoying" action with respect to the visitor.
hard disk work.Winchester is working when it is no need to work, and long lasting.Usually, the hard drive has a LED indicator works on the outside of the system unit.For example, the Internet is disabled, not running any applications, and the hard drive is something "loads" - such an event could be a sign of the virus.However, again, the reason may be in another;but if it is a permanent phenomenon, the computer needs to be scanned for viruses.
traffic.If you connect to the Internet you might find "extra" traffic.For example, if you disable automatic software updates, operating system, disable automatic downloading of antivirus database updates installed, but traffic still is - a reason to suspect the presence of the virus: need a full anti-virus scan.
So we called some of the main ways of their own to suspect the presence of the virus.If a virus penetrated "through" one anti-virus, use an alternative (and this does not mean that we must urgently change the antivirus).Most major manufacturers of antivirus software have a utility "one-time" use, which can be used without removing the resident antivirus.It is best to set anti-virus and anti-virus utility are from different manufacturers.These tools can be downloaded from the official websites of antivirus software vendors.Be careful and cautious!