Types of computer viruses and how to overcome them

Almost all computer users would already know about viruses that can damage their data to make the computer operating system slow / crash / hang, etc. to deal with viruses that usually arise from the internet and external storage devices, by default Windows has completed the system with Windows Defender antivirus, it’s just that when users trust other brands of antivirus more automatically Windows Defender will be disabled to prevent conflicts I myself had time to install another antivirus namely AVG, because it makes the performance of the laptop so hard I finally uninstalled it and returned to using Windows Defender. It makes no difference that the virus database must always be up-to-date in order to recognize new virus variants

Computer viruses are interpreted as malicious programs that can spread, copy themselves, change some important settings, damage hiding data, steal personal data to make the windows system run unstable. Besides the purpose of people to make a virus that is diverse, some are just fun to damage the operating system, damage user data, lock the computer and encrypt data, to do system testing, just for fun etc.
Computer viruses generally damage digital data such as work files, but it turns out computer viruses can also damage hardware. How to insert a virus command to make the hardware work so hard that it is over process. For example a virus gives an order for the dvd device to open and close continuously 95% of viruses created for electronic devices focus on Windows operating system users while the rest attack Linux / GNU, Mac, FreeBSD, OS / 2 IBM, and Sun Operating System users.

Most computer viruses also do not cause damage but the process behind the screen is what takes up a lot of memory resources, such as mining viruses that force victims’ computers to screen for digital currencies or adware viruses that insert advertisements of all programs connected to the internet All users assume that the malicious program is a virus, even though the virus is identical to spreading and infecting while other types of malicious programs steal user keyboard record data, it does not damage the data nor disturb the stability of windows

Here are the types of computer viruses and how to easily get rid of them:

1. Wanna Cry Ransomware

Ransomware is malware that has the ability to lock a computer or encrypt files so that it cannot be accessed by the user / owner of the computer itself. Usually the goal is to make the user ransom so that the “held hostage” file can be released. What is usually attacked are computers, mobile devices, and servers with Windows operating systems. Signs of a computer being infected with a ransomware virus are the appearance of a pop-up window that contains a message that the computer owner’s data has been encrypted. The window also displays information on how to restore data and how to pay ransoms for the makers of WannaCry. There is also a countdown on the ransom payment deadline and the deadline for deletion of documents if the ransom is not paid. How to Overcome: Using an antivirus, if it still can’t then do a data restore or reinstall the operating system and let go of the data that has been lost. Some antiviruses like nod32 already have data descriptions for ransomware

2. Trojan

Trojan horse or Trojan horse or better known as Trojan in computer security refers to a malicious software that can damage a system or network. The purpose of the Trojan is to obtain information from the target (passwords, user habits recorded in the system log, data, etc.), and control the target (obtain access rights to the target). This virus can enter the victim’s device via the internet such as e-mail, or when downloading files / programs that are not known, so you must be careful when downloading files / software from the internet. Usually trojans are also inserted into popular installation software such as Windows Maker, so make sure to only download software on trusted sites

Solution: Install an antivirus or trojan remover program.

3. Worm

This type of virus has the ability to multiply or multiply very quickly in storage media such as hard disks. If this virus is left then the memory capacity or hard disk that holds this virus will be met by junk files.
Worms utilize networks that are connected to devices, both LAN and WAN. It exploits weaknesses in security holes called vulnerabilities to enter computers.

Solution: Update the service pack or operating system path installed on the computer to close the security hole, and remove it using a regular antivirus that can be downloaded for free on the internet. Usually, Smadav is enough to eradicate this virus

4. Backdoor

This type of virus is almost the same as a trojan. However, Backdoor usually resembles ordinary files, such as games. This virus is used to access systems, applications, or networks. This virus is able to hack a system that had been hacked without repeating the hacking process. If generally a visitor or user enters into a system must pass authentication, another case with a “Back Door” backdoor.
Solution: Reinstall the infected system, application or network. Or you can restore from backups that have not been hit by a backdoor. You can also do a windows update to close the gap

5. Spyware

Spyware is a kind of software whose presence is often not realized and is used to spy on infected computers. Spyware is able to send data from the user’s computer to other parties and vice versa when connected to the internet network. Spyware can also cause a computer to run slowly or crash.

How to fix it :

• Use trusted software that is specifically used to eliminate and prevent this virus. Usually the antivirus gives a warning if there are programs that could threaten the security of the computer.
• Install a program that is useful for hunting advertising and spyware hunter software as well. With this program can be a deterrent to both types of programs into the computer. AVG scurity I was not able to detect the presence of spyware, finally I used adwcleaner and cleaned spyware on my computer
• Disabling or disabling Cookie storage in computer browser settings, such as mozilla, google chrome, and so on.

about author

Author

hooddewodota@gmail.com

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.