Hardware and software setup

Antivirus protection for your home computer. Protection against network attacks

Computer viruses cause a lot of trouble and problems for many users. And all of them in the vast majority of cases have antivirus installed. There is only one conclusion - the antivirus does not provide the necessary level of protection. This problem must be solved by complex computer settings and the study of the basics of security.

1. What you need to know about viruses

A virus is a malicious program created by an attacker. The purpose of the first viruses was the self-affirmation of their creators, and their action was to harm the computer. Today, the vast majority of viruses are aimed at illegally obtaining funds in one way or another.

In order to effectively protect yourself from viruses, you need to know how they work. The main tasks of viruses are to penetrate the user's computer, ensure their launch, protect themselves from detection and removal, and perform destructive actions.

2. Types of viruses

Viruses infect a computer in various ways and, depending on this, are divided into different types.

File virus

It infects other programs and files by adding its code to them. Thus, when an infected program or file is launched, malicious code. If system files are infected with a virus, then the malicious code is launched automatically every time the computer boots.

Worm

The worm is a self-replicating virus. Having penetrated the user's computer, the worm duplicates itself many times, placing many copies of itself in different folders with different names, which makes it difficult to remove. Worms can also replicate over a local network to public folders on other computers, spread themselves through email, messaging programs, and network attacks.

twin virus

Some viruses remove or hide user files and folders and replace them with malicious files with the same icons and names. The user tries to open them and runs malicious code. Such viruses are now found on flash drives.

Trojan

Trojans are viruses that do not infect other files, but place their own files on the user's computer. Often these files are located in the folders of the operating system, disguised as system files, registered in startup and launched every time the computer boots. Trojans are more difficult to identify because they act like other programs that also add their files to the system and run with the computer.

False Program

Some viruses disguise themselves as useful programs for the user, designed to download files from the Internet, watch videos on websites, improve computer performance and even protect against viruses. The user installs the program himself, uses it and is not even aware of its “undocumented capabilities”.

Also, such programs often try to get money from the user. For example, a false antivirus or a program for fixing errors in the system detects several dozen non-existent viruses or problems on your computer, some of them offer to fix it for free, and the rest after purchase full version or sending SMS. This is a classic scam.

3. Actions of viruses

Regardless of the method of infecting a computer, viruses can perform different actions and, on this basis, are also divided into different types.

Display intrusive ads in Internet browsers, change the home page address, redirect users to different sites. Installed as additional program, plug-in or browser panel with other free programs or under the guise of something useful from the Internet.

Spies and Keyloggers

Designed to steal confidential information and passwords. They monitor user actions, look for confidential information on the computer, collect data entered from the keyboard, from the clipboard, take screenshots of the screen and send them to the attacker. The purpose of such programs is a variety of data. Bank card numbers allow you to steal funds from your bank account. Hacked social media and Skype accounts can send messages to your friends asking them to download a file or visit a website. Mail can be used to send spam. Software license keys, account and property from online games can be sold.

Ransomware blockers

They block the operation of the operating system and display a message with a request to send an SMS or pay a certain amount to some account. After that, it promises to unlock the computer. But in the vast majority of cases, unlocking does not occur. In order to remove such a virus and restore the normal operation of the computer, you need to have some experience.

Ransomware blockers may report that you allegedly violated the Windows license agreement, pose as law enforcement(Ministry of Internal Affairs), show shocking pictures and obscene text.

Ransomware ransomware

They quietly encrypt all user files on the computer - documents, photos, videos, etc. When all files are encrypted, a message appears on the screen asking you to send an SMS or pay a certain amount to some account. After that, it is promised to decrypt the files. But in the vast majority of cases, decryption does not occur.

Restoring encrypted files is only possible from a backup. I recommend storing valuable files (documents, photos, etc.) on an external drive.


Botnets

They spread to a large number of computers and provide access to them to an attacker. The virus does not manifest itself until it receives a special command. Infected computers (zombies) are used to organize large-scale attacks on the servers of enterprises, government agencies and send spam.

Backdoors

Provide access to the computer. Using them, an attacker can download various malware. These programs may be removed or replaced as needed.

4. Ways of penetration of viruses

Viruses can enter a computer in several ways - from an infected flash drive, CD / DVD, from the Internet and local computer network. In this case, various vulnerabilities in the operating system, programs, social engineering and phishing can be used.

Flash drives

Many viruses spread using files on flash drives and external drives. It is enough to insert a USB flash drive into an infected computer and the virus will immediately appear on it. Then, when you insert a USB flash drive into a healthy computer, the virus is transferred to it. After that, the newly infected computer starts to infect other flash drives.

CD/ DVD-discs

Viruses can be carried through CD/DVDs. These can be both infected user files and viruses that have penetrated through the disc burning program.

Internet

There are many infected files and programs on the Internet, after downloading and opening them, the computer becomes infected with a virus. In addition, modern sites use scripts and other technologies based on program code to increase interactivity. Attackers create scripts designed to spread viruses. It is enough to go to the site with such a script and the virus is already on your computer, even if you have not downloaded or installed anything.

The local network

If one of the computers connected to a local network with other computers becomes infected, then viruses from it can be transmitted to other computers through public folders or through network attacks. If your provider, in addition to the Internet service, also has a local network, then the intensity of network attacks and the likelihood of infection will be high.

Vulnerabilities in the system

Network attacks are constantly being made on users' computers, which are possible both from local network as well as from the Internet. They exploit various vulnerabilities in the operating system, network services, and drivers. Special network packets are sent to the user's computer, which lead to failures in the operation of software components in order to take control over them. Then a loophole is created in them through which the virus enters the computer. To infect, it is enough to connect the computer to a local network or the Internet, no user action is required.

Vulnerabilities in programs

Viruses can also enter a computer through various vulnerabilities in programs. These can be both network attacks on programs using the Internet, and various infected files. For example, malicious code can be embedded in a Word, Excel, PDF, or any other file. When an infected file is opened, control over the program is intercepted and the virus is further introduced into the system.

social engineering

Many viruses are spread by Email and Internet sites by convincing the user that he will get something useful, valuable or interesting if he opens a certain file or goes to a certain site. If the user believes this and takes the proposed action, then his computer will be infected with a virus.

Users are also sent emails, messages on social networks, Skype, SMS, and even receive calls asking them to provide some personal data. In this case, the attacker may present himself as an employee of a bank, a support service of some site, and even a friend or relative.

Phishing

Phishing is a substitution of the address of some popular site in order to infect a computer with a virus or obtain confidential information.

Users receive messages allegedly on behalf of the administration of the site or social network where they are actually registered, with an offer to go to the site to resolve some issue, and they are offered a link very similar to the official site address. If a user follows this link, then his computer becomes infected with a virus.

Also, attackers create special sites that exactly repeat the authorization pages of the official websites of banks, mail services, social networks, online games, etc. The site address can also be very similar. Users are then sent an email, ostensibly on behalf of the site, with some kind of notification and a link to go to the site. By clicking on the link, the user is taken to a fake authorization page, where they are prompted to enter a username and password. After entering the password, it is sent to the attacker and the account is hacked, and the user is redirected to the real site and does not notice the substitution.

After the virus has penetrated the computer, it is written to startup to run every time the computer is turned on. Here are the main ways to autoload viruses:

  • Task Manager
  • Windows Registry
  • Windows Services
  • Internet browser plugins and panels
  • Windows Explorer plugins
  • Infected system files
  • Boot sector or disk partition
  • Alternate NTFS streams
  • network stack
  • Print pool
  • In addition, there are hundreds of so-called autorun points. The same virus can use several of them at once. This makes it much more difficult to detect and remove malware.

    6. Self-defense of viruses

    Almost any virus, having penetrated a computer and registered in startup, tries to protect itself from detection and removal in various ways.

    Automatic restart

    The easiest way to protect a virus is to run several independent processes that monitor each other. If one of the processes terminates, the remaining one restarts it. This makes it difficult to disable the virus to remove it.

    Deletion Protection

    Virus processes in the computer's memory monitor the virus files on the disk and autorun points. If the user or the antivirus deletes the virus file or its autostart point, then the virus processes in memory immediately restore them. Also, the self-healing of the virus can occur every time you boot your computer.

    Disguise

    More advanced modern viruses use various ways disguise.

    Encryption is often used to protect virus files from detection, which prevents antivirus programs from detecting malicious code. When downloaded, the virus code is extracted from the encrypted file and placed in the computer's memory.

    Polymorphic (mutating) viruses change their code every time they infect a new computer, and sometimes every time the computer is restarted. This prevents the antivirus from identifying malicious code using already known signatures.

    Rootkits are special components included in the protection complex of modern viruses. They penetrate the core of the operating system and have the highest powers. Rootkits are designed to hide a virus from an antivirus program. For example, they can intercept the antivirus's disk and registry calls, remove the names of virus files and registry settings from the data stream, and send already cleaned data to the antivirus.

    Also, the virus itself can run in kernel mode, where only the most important system components, such as device drivers, have access. From there they can even fight antivirus programs.

    Neutralization of antiviruses

    Some high-tech viruses can successfully resist anti-virus programs, completely or partially neutralize their algorithms.

    The most dangerous virus is the one that does not allow itself to be detected, does not lead to problems in the operating system and lives on the computer for a long time in order to steal confidential information and user funds.

    7. Basic ways to protect against viruses

    I decided to divide the ways to protect against viruses and security threats into the main ones - mandatory for everyone, and additional ones - at the request of the user. In this section we will look at the main methods of protection, and in the next we will talk about additional ones.

    Modern viruses are high-tech programs with a complex of masking and self-defense that are difficult to detect and neutralize. Therefore, complex measures must also be taken to protect against them. This is an antivirus program, overlapping all possible ways penetration of viruses and adherence to the principles of security when working on a computer. All this is not so difficult, it is enough to set up the computer well once and not violate certain rules.

    7.1. File virus protection

    In order to protect yourself from viruses infecting files, it is enough to install any antivirus.

    Paid antiviruses provide a high level of protection against other security threats as well. It makes sense to acquire them if you deal with valuable confidential information or carry out serious financial transactions. The best for Russian-speaking countries is Kaspersky Internet Security. If the computer is weak, then you can purchase a faster and lighter Dr.Web Security Space.

    Of the free ones, for the Windows 7,8.1,10 operating system, I recommend Avast. For Windows XP - 360 Total Security or Avira. Both programs are fast, easy and well suited for weak computers. 360 Total Security has various additional features - disk cleanup, monitoring Windows updates, webcam protection and is more suitable for those who like to understand everything. Avira contains all the necessary security elements and is more suitable for lovers of minimalism who do not want to delve into the settings.

    Never turn off your antivirus or open suspicious files, no matter how much you want to. In the vast majority of cases, you will not get what you want and only hurt yourself.

    7.2. Protection against false and infected programs

    Use only popular well-known programs. Download programs only from developer sites and popular well-known sites. Check all downloaded files at VirusTotal.com.

    Refrain from installing dubious programs, especially those that have been checked by VirusTotal.com as unwanted. Always select custom installation and uncheck optional features.

    7.3. Flash drive virus protection

    It is easiest to protect yourself from computer infection through a USB flash drive. To do this, you need to disable autorun flash drives in the Windows registry. I did special file, which sets the necessary parameters in the registry automatically and works with all versions of Windows. You just need to run it and agree to make changes to the registry.

    You must restart your computer for the changes to take effect. After that, autorun viruses from flash drives will not be possible. Please note that the autorun window will not appear when inserting flash drives. You can access the flash drive through windows explorer(My computer).

    You can download the file to disable autorun of flash drives in the "" section.

    7.4. Virus protection on CD/DVDs

    CD/DVD autorun could also be disabled in the registry. But the spread of viruses on disks is already rare and antiviruses can easily block them. And disabling autorun disks will cause a lot of inconvenience, since you will have to manually look for the autorun program on them. So I recommend not to bother with it.

    7.5. Browser script protection

    There is a very good NoScript plugin for the Firefox browser. After installing it, some sites may lose some functionality. But it is enough to add them to the allowed list with a simple mouse click and their functionality will be restored.

    But you do not need to add everything in a row, but only those sites that you absolutely trust. Then the security on the Internet will be at a sufficiently high level.

    There is a similar ScriptBlock plugin for the Chrome browser. The principle of its operation is the same. On allowed sites, scripts are not blocked, but on the rest you will be safe.

    7.6. Password protection in the browser

    All browsers allow you to remember passwords for sites the first time you enter them.

    This is convenient because you do not need to enter a password the next time you access this site. But this is not safe, as the password from the browser can be stolen.

    For Firefox and Chrome browsers, there is a great LastPass plugin that also offers to save passwords when entering them on sites, but stores them in secure storage. When entering the sites, it substitutes the username and password in the required fields, which is very convenient.

    Do not enter your passwords on other people's computers, as they may be infected with a spyware or keylogger.

    You can download the LastPass plugin in the "" section.

    7.7. Protection against social engineering

    Don't click on questionable online ads, especially flashing pictures with unbelievable promises. At best, you will end up on a site where they will try to convince you to buy something by fraudulent means, at worst, on a site infected with a virus.

    Never download files or follow links from emails that come from people you don't know. No matter how tempting or harmless this message is, in 99% of cases they want to deceive you!

    Also, don't open attachments or follow links from strange messages that came from someone you know (like look at my photo or download a cool program). Most likely, this indicates that your friend's account has been hacked and is being used to send malicious messages. Contact your friend, ask if he sent you this message and warn about a possible problem.

    If the message you think might be of high importance (for example, from your bank), then call them. Do not share your passwords with anyone banking operations, e-mail, etc. Official representatives have no right to ask about it.

    Be selective in social networks, do not add everyone who asks you as a friend. These people may try to get your personal data, send you messages to infected, fraudulent sites, or simply bombard you with ads. If suspicious activity appears, remove these people from your friends.

    Recently, attackers also often use SMS and even calls to deceive. Do not send response SMS and do not call the indicated numbers, as money will be withdrawn from your account for this. Do not follow links in SMS, they are now used to spread viruses on smartphones. Specify all the information by official phones and official websites, and not by the contact information that was sent to you.

    Recently, there have been reports that something happened to your relative or you won some very valuable prize (car, house, apartment, etc.) and you are asked for money to settle some issues. Never trust such messages and check information through reliable channels. The main thing is the understanding that no one ever gives anything to anyone just like that. If you did not buy anything and did not register for the promotion, then this is a 99% scam.

    7.8. Phishing Protection

    To protect yourself from site spoofing through phishing, never click on links sent in emails. Open a new browser page and go to the desired site from your bookmarks or enter the address manually.

    In all modern browsers There is a built-in protection against phishing. If a site is identified as phishing, then access to it is blocked.

    Similar blocking windows may be displayed when malware is found on the site.

    But browsers can only detect fakes of the most popular sites or those sites that are blacklisted.

    Comprehensive paid antiviruses such as Kaspersky Internet Security and Dr.Web Security Space fight against phishing most effectively. Most popular free antiviruses also have phishing protection.

    7.9. Protection against vulnerabilities in the system

    To protect against vulnerabilities in the operating system, you need to regularly install important updates, as these are mainly security updates. Go to "Control Panel\System and Security\Windows Update\Settings" and check your update settings. I advise you to enable the installation of updates in automatic mode.

    Although official support for Windows XP has ended, for some older computers this the only system, which provides sufficient performance and functionality. There is a way to extend the receipt of security updates for Windows XP until April 2019. To do this, I made a special file that makes a small change to the Windows registry. It is enough to run it and agree with making changes to the registry.

    After that, installation of security updates in Windows XP will last until April 2019.

    You can download this file in the "" section.

    7.10. Disabling unnecessary services

    Another generally recognized method of protection is to disable unnecessary functionality. If potentially vulnerable components are disabled, then an attack on them is impossible. First of all, this concerns Windows services that run on every computer and are most often targeted for attacks. Many of them are not needed for the normal operation of the computer, and disabling them also has a nice bonus in the form of an increase in system performance.

    A-Data Ultimate SU650 120GB Hard Drive

    In order to disable unnecessary services, you need to go to the computer's management console. To do this, click right click mouse on the icon "My Computer" or "Windows" (in Windows 8.10) and select "Manage ...".

    We go to the Services section.

    Now you need to right-click on the service that you want to disable and select "Properties".

    After that, set "Startup Type: Disabled" and click "OK".

    Now, when you turn on the computer, the service will not start.

    It is painless to disable some services that are not network services. Also, if you do not have a local computer network, you can disable some network services. I have prepared a description of the most important services and recommendations for setting them up. You can download them in the "" section.

    7.11. Protection against vulnerabilities in applications

    To protect against vulnerabilities in programs, it is advisable to regularly update them to new versions. Most programs have a feature to check for updates. As soon as an update for the program is found, the user is prompted to install it. Do not neglect updating programs, especially those that work with the Internet (browser, Skype, torrent client, etc.).

    7.12. Protection against network attacks

    The best way to protect against network attacks is to disable unnecessary services, regularly update the operating system and programs in order to eliminate the vulnerabilities that are used in attacks.

    But there are also programs specifically for protecting against network attacks, which are called firewalls. The firewall principle is that it does not allow Internet packets to reach the computer that contain data not requested by the user. For example, if you enter a website address in a browser, you will receive Internet packets with the content of the website in response, and the firewall will let them through. Infected Internet packets arrive at the computer without the user's request and the firewall blocks them.

    Windows operating systems have their own built-in firewall called the Firewall. With proper system security settings, it is usually sufficient. But there are also third-party solutions that are more advanced and reliable. If you have valuable confidential information on your computer or you are actively working with payment systems, then additional protection in the form of a good firewall will not hurt.

    The firewall is part of paid antiviruses, the best of which are Kaspersky Internet Security and Dr.Web Security Space. If you have such an antivirus, then your computer is reliably protected from network attacks and you do not need a separate firewall. In addition, such a solution will be the best in terms of antivirus compatibility with the firewall.

    Of the free ones, the most popular firewall is Outpost Firewall Free, which can be installed from the Outpost Security Suite FREE and used in addition to any free antivirus. The disadvantage of this solution is the possible conflicts between the antivirus and the firewall.

    The best way to protect yourself from attacks from the Internet or the provider's local network is to connect your computer through a router. The router has the functionality of a hardware firewall. It hides your computer from hackers and securely blocks all unsolicited internet packets before they reach your computer. In addition, the router to some extent protects motherboard from electrical breakdowns by the provider, which happens quite often.

    However, a router does not protect against attacks from infected computers connected via it to a home or office local network, but only from those that come from the Internet. Therefore, a software firewall should still be running on every computer.

    7.13. System backup

    Even high-quality computer settings and adherence to security principles do not give a 100% guarantee that some kind of cunning virus will not penetrate the computer. But there is a tool that will reliably protect you from the consequences of infection. This is a creation.

    The built-in Windows recovery tool is not effective enough. Firstly, it protects only the most important system files, and the virus can be in another place. Secondly, viruses often infiltrate the backup storage and are restored along with the system restore, which nullifies the entire backup system.

    In order to create a reliable copy of the system, you need to set up your computer from scratch and make a complete image of the C drive using a third-party program. Additionally, this will protect you from any failures in the system or software.

    One of the best programs backup is Acronis True Image, it is paid. But there is a great free alternative - Paragon Rescue Kit Free.

    For a successful backup of the system, followed by a quick restore, you need to follow a few simple conditions.

    User files should not be stored on the C drive, otherwise they will be lost during system restore. Please note that the files on the "Desktop" and in the "My Documents" folder are physically located on the "C" drive. Therefore, store all your files on another partition, such as the "D" drive.

    Do not install games on the "C" drive, as they take up a very large amount of space, which will make it difficult to backup and restore the system. Install games on another partition, for example, on the "D" drive.

    A-Data Ultimate SU650 240GB Hard Drive

    Detailed instructions for using backup programs are available on the developers' websites from the "" section.

    7.14. File backup

    A backup copy of the operating system is designed to quickly restore the computer's performance and completely eliminate viruses. But this will not protect your files if they are deleted or encrypted by a virus.

    To protect your personal files, you should regularly back them up. You can simply copy files to a USB flash drive or external drive standard means, but this is not so convenient and can take a lot of time. It is better to use efficient synchronization algorithms for this.

    For example, in the popular file manager Total Commander has a directory synchronization feature. Open the folder with your files on the computer disk in the left panel, and the folder on the flash drive in the right panel.
    Transcend JetFlash 790 8Gb

    Go to the menu "Tools \ Synchronize directories".

    Set all the parameters as in the screenshot above and click the "Compare" button. After the comparison is completed, click the "Synchronize" button that has become active.

    One of the best free programs designed specifically for file synchronization is . The principle of operation is similar, but it works even better.

    The left pane specifies the folders that you want to synchronize on your computer's disk, and the right pane specifies the folders on the flash drive or elsewhere where the backups will be stored. After that, the “Compare” button is first pressed, and then “Synchronize”. For example, I synchronize my folders with a drive on another computer over a local network.

    Synchronization takes significantly less time than copying files because only new and changed files are copied. In addition, files that you deleted on your computer are removed from the backup.

    Remember! The question is not if you will lose your files if you don't back them up, but when it will happen...

    8. Additional ways to protect against viruses

    In this section, we will look at additional less popular protection methods that you can apply at will. However, some of them can greatly enhance the protection of your computer.

    8.1. Protection against spyware and keyloggers

    Exists special programs to protect against spyware and keyloggers. The most popular ones are Ad-Aware Free Antivirus+, Malwarebytes Anti-Malware Free, Spyware Terminator. But all modern antiviruses already have protection against spyware and keyloggers, and the use of several antivirus programs at the same time can lead to various problems.

    8.2. Anti-Phishing Plugin

    If you work with a large number of social and payment services and want to have an additional free protection, then you can install an anti-phishing plugin. One of the most popular is McAfee SiteAdvisor, which supports Firefox browsers and Chrome. It does not require any configuration, but simply blocks phishing and some other malicious sites.

    Such plugins add some antiviruses to browsers, such as Avast. The link to the McAfee SiteAdvisor plugin is in the "" section.

    8.3. Security with DNS servers

    There are special secure DNS servers to protect against malicious sites. One of the most popular free DNS servers in Runet belongs to Yandex (dns.yandex.ru).

    It is enough to register the address of a secure DNS server in the settings network card and all sites, before they are loaded into your browser, will pass a security check on the Yandex server. Several DNS servers are offered: no protection, protection against malicious sites, and additional protection against adult content (can be used on a child's computer).

    In Windows XP, go to Start/Control Panel/Network and Internet Connections/Network Connections.

    In Windows 7, go to Start/Control Panel/Network and Internet/Network and Sharing Center/Change adapter settings.

    In Windows 8.10, right-click on the "Start" button and select "Network Connections".

    Select Internet Protocol Version 4 and click the Properties button.

    Enter the addresses of Yandex DNS servers.

    After that, only verified safe sites will be loaded in your browser.

    8.4. Working from a limited account

    If you are seriously concerned about the security of working on a computer, then it is a good idea to create a limited user account and work from under it. This is done easily through the "Control Panel / User Accounts ...".

    After that, a password is set on the Administrator account and it is used mainly for installing new programs and configuring the computer.

    The fact is that a virus, having got on a computer or just launched in a browser, receives the authority of the user who is currently working on the computer. If the user works with administrator rights, then the virus will run with administrator rights and will be able to change any system files and registry settings. If you work under a limited account, then if the virus still seeps through a well-tuned protection system, it will not be able to infect system files and register at startup, and it will be easier for the antivirus program to neutralize it.

    8.5. Cleaning the system

    Keep your operating system clean and tidy, then viruses will not be so comfortable in it. Use one of the popular programs to clean the system of garbage. They delete files from the temporary folders of the system, programs and browsers. Viruses and malicious scripts often like to sit in these folders. In addition, you will save disk space.

    Such functionality has, for example, antivirus 360 Total Security. I can recommend an excellent popular program. It keeps the system clean and deletes temporary files every time you boot your computer, a link to it is also below.

    9. Links

    Here you can download all the files that were mentioned in the article and will greatly help you in protecting your computer from viruses.

    Transcend StoreJet 25H3 2TB Hard Drive
    Hard Drive Transcend StoreJet 25M3 1TB
    Transcend StoreJet 25M TS500GSJ25M 500GB Hard Drive

    In the era of information technology, the question of how to protect data on a computer is acute. Passwords and logins from social networks, bank account management systems, data account, private photos and other files - all this may be of interest to attackers.
    Not only government agencies, banks or popular websites become targets of hacker attacks. Personal information of ordinary users may also be of interest to hackers. Stolen accounts in Odnoklassniki or Facebook are used by criminals for fraudulent purposes, stolen photos become the subject of blackmail, and obtaining data from payment systems gives attackers the opportunity to leave their owners without a penny in their account.
    In order not to become a victim of hackers, it is necessary to pay attention to the security of storing personal data. This article will tell you how you can protect personal information on your computer.

    Method 1: strong passwords

    The easiest way to protect data on your computer is to use strong passwords. The fact that security experts do not recommend using simple combinations of numbers and letters as a key (qwerty, 12345, 00000) is known to most users. But the advent of "smart" cracking programs has led to the fact that even more complex passwords can be calculated by brute force. If the attacker knows the potential victim personally, an atypical but simple key (date of birth, address, pet name) is also easily selected.
    To save accounts on social networks and other resources, as well as a user account on a PC, it is recommended to use complex combinations that consist of large and small Latin letters, numbers and service symbols. It is desirable that the password be easy to remember, but does not contain an explicit semantic load. For example, a key of the form 22DecmebeR1991 is recognized by sites as reliable, but contains a date of birth and therefore can be easily cracked.



    Method 2: Data Encryption

    To protect personal information on a computer in the event an attacker attempts to access it, we recommend that you use data encryption. Enterprise and professional versions of Windows come with the BitLocker tool. The system mechanism allows you to encrypt information on one or more partitions hard drive. Access to files becomes possible only when using a special key.
    If you need to secure individual files and folders, most in a simple way protect personal data on your computer is to use encrypted archives. By moving documents, photos or other data to a password-protected archive, an attacker will not be able to open them even after gaining full access to the PC. To open ZIP or RAR content, you need to dial an access code. Most modern archivers are equipped with similar functionality.
    There is also a large number of free software that allows you to encrypt data. Among such programs are Free Hide Folder, Folder Lock, TrueCrypt and others.



    Method 3: Using an antivirus program

    To gain access to someone else's PC, hackers use an auxiliary software installed on the victim's computer. Trojan viruses intercept information entered from the keyboard, replace websites with copies created by scammers, and send personal data. To protect personal data, it is advisable to install current version anti-virus software and keep it updated. It is also recommended to restrict access to drives by prohibiting reading information from them over the network.



    Method 4: Setting a Password on the BIOS and/or Hard Drive

    Basic OS password protection does not allow quick hacking of the system, but is vulnerable if the computer falls into the hands of a criminal for a long time. By reinstalling Windows, you can access unencrypted files. Setting a BIOS (UEFI)* password to be entered when the computer is turned on prevents the PC from booting from either built-in or external media.
    *BIOS (Basic Input / Output System) or UEFI (Unified Extensible Firmware Interface) is a part of the computer system software that is responsible for organizing the operation of the hardware components of the system and controlling its boot. The BIOS / UEFI setup menu is entered at an early stage of PC boot (the first seconds after turning on) by pressing the Del, F1 or F2 buttons (see the instructions for the PC or laptop). For different computer models, the names of the settings sub-items may differ, but, as a rule, the necessary options are located in the section whose name contains the word Security.
    An even greater degree of protection of personal information is provided by password protection of the hard drive. By setting the access code for the drive through the BIOS / UEFI, the user makes it useless in the hands of an attacker. Even after removing the hard drive from the PC case and connecting it to another device, data cannot be accessed. Attempting to unlock the drive with a "master key" will destroy the data.



    Method 5: Using the HTTPS protocol

    The use of the HTTPS secure data transfer protocol eliminates the risk of intercepting information that is sent to the server in encrypted form. This standard is not a separate technology, but is an add-on to standard HTTP. When using it, data encryption is carried out using the SSL protocol.
    Unfortunately, in order to keep this method data protection, it is necessary that the server be equipped with support for this technology. It cannot be used unilaterally.
    If the server supports HTTPS, then when the client connects, the system assigns it a unique certificate and all transmitted data is encrypted with a 40, 56, 128, or 256-bit key. Thus, decryption is carried out only on end devices, and the interception of someone else's signal will not give the attacker anything.
    If the service involves working with confidential information or conducting financial transactions, it is recommended to be wary of resources that do not support HTTPS.
    Websites of online stores, banks, and payment systems (Yandex.Money, Webmoney) use the HTTPS protocol by default. Facebook, Google, Twitter, Vkontakte services provide the ability to enable it in the account settings. Other sites work with it.


    Method 6: Secure your wireless networks

    If the computer's security settings do not restrict access to it over the network, an unsecured Wi-Fi network allows an attacker to get into the contents of the drives. To avoid this, it is recommended to set the WPA/WPA2 data encryption method on the router and set a complex password (see Method 1).
    To eliminate the risk of hacking your Wi-Fi network, you can turn off broadcasting the connection name (SSID). In this case, only users who know the network name will be able to connect to the router.

    Method 7: Parental Control Systems

    If children use the computer, the risk of catching malware increases significantly. To protect personal data on a PC, you can create an account with limited access rights for a child. Windows (version 7 and later) contains built-in tools parental control. With their help, you can limit the time your child spends at the computer, prohibit access to certain programs, and block the ability to install third-party software.
    There is also third-party software that has the same (or more) functionality. On the Internet, you can find both paid and free parental control tools. In addition, some providers support this feature. In this case, in your personal account on the website of the telecom operator, you can set restrictions on visiting individual resources.



    How to protect information on your computer most reliably

    Each of the above methods of protecting personal data on a computer is reliable in one situation, but it also has vulnerabilities. To achieve a high level of security, it is recommended to combine methods.
    Unfortunately, there is no universal way to protect data that would be 100% effective. Even the servers of banks and law enforcement agencies are vulnerable to hacker attacks, as evidenced by large-scale leaks of documents from the Pentagon, US governments and other countries published by Wikileaks.
    Nevertheless, given that ordinary users rarely become victims of hackers of this level, it is possible to secure personal data. For this it is recommended:
    install the latest version of the anti-virus program (preferably with firewall and firewall functions);
    protect the user account with a strong password;
    do not use the same access codes for all accounts;
    protect wifi, disable general access to files on a PC over a local network, first of all, to the system partition (if this is not possible, restrict access, allowing it only to trusted network members who really need it);
    do not store keys and passwords in TXT files, DOC, RTF and other documents on the PC itself;
    the most valuable files and folders should be placed in a password-protected archive or encrypted.

    You can protect personal information on your computer in other ways. The main thing is to find a compromise between the level of security and the convenience of using a PC. Radical measures (for example, full data encryption, access to a PC using a physical key, and limiting the list of allowed resources) can be redundant on a home PC and cause unnecessary inconvenience. Practice shows that the use of overly complex protective equipment leads to a gradual refusal of users to use them.

    Undoubtedly, one of the most important programs on a computer is an antivirus. Even one "accidentally" virus on a PC can make work unbearable! In addition, it's "good" if the virus just shows ads, but there are viruses that can destroy dozens of files on a disk (which may have been worked on for more than one month).

    About 10-15 years ago, the number of antiviruses was relatively small and the choice was limited to some dozen. Now there are hundreds of them!

    In this article I want to focus on the most popular today (in my opinion). I think that for many this information will be useful for cleaning and protecting their home PCs. And so let's get started...

    Keys for antiviruses at affordable prices below market prices you can buy at …

    10 best antivirus programs to protect your computer

    Malwarebytes Anti-Malware

    Malwarebytes Anti-Malware is not quite the antivirus that most users are used to. This program (in my opinion) is more suitable as an addition to the main antivirus, but nevertheless, it will help to do one important job!

    Malwarebytes 3.0 is equipped with a number of specialized modules:

    • Anti-Malware
    • Ransomware Protection
    • Exploit Protection
    • Malicious website protection

    Most antiviruses are bad (at least for now) at finding and removing various adware that are often embedded in browsers (for example). Because of this, various advertising windows, teasers, banners (sometimes from adult sites), etc. begin to appear. Malwarebytes Anti-Malware will quickly and easily clean your PC from such “garbage”.

    Features of Malwarebytes Free (free version)

    • Ability to scan all drives for a complete system check.
    • Signature database updated daily to protect against the latest malware.
    • Intelligent heuristic detection of even the most persistent threats without significant impact on system resources.
    • Adding detected threats to Quarantine and the ability to restore them at a convenient time.
    • Black list of exclusions for scanning and protection modules.
    • List of additional utilities for manual malware removal (Malwarebytes Anti-Rootkit, Malwarebytes FileASSASSIN, StartupLite, Chameleon).
    • Malwarebytes Chameleon dynamic technology that allows Malwarebytes Anti-Malware to run when it is blocked by malware.
    • Multilingual support.
    • Context menu integration for checking files on demand.

    Features of Malwarebytes Premium

    Malwarebytes- free program, however, you can upgrade to the Premium version, which provides real-time protection, scans, and scheduled updates.

    • Real-time protection works in conjunction with leading antivirus programs to make your computer more secure.
    • Real-time protection detects and blocks threats as they attempt to execute.
    • Real-time exploit protection: Eliminates zero-day exploits and malware vulnerabilities
    • Real-time ransomware protection: Prevents ransomware from encrypting your files.
    • Malicious website blocking prevents access to malicious and infected web resources.
    • The presence of the “Quick scan” mode for checking critical areas of the system - RAM and startup objects.
    • Extra options. Customize Malwarebytes Premium Protection Behavior for Advanced Users.
    • Scheduled updates to automatically use the latest protection.
    • Scheduled scans for regular checks at your convenience.
    • Password protection of settings to prevent unauthorized changes to Malwarebytes Premium security components.

    It should be borne in mind that not everything written will be available or work in the free version of the program. In order for the software to work at the proper level, you need to install the Premium version

    Advanced SystemCare Ultimate

    It seems to me that many users are often dissatisfied with one “quality” of most antiviruses - they slow down the computer ... So, in this regard, Advanced SystemCare Ultimate is a very interesting product - an antivirus with built-in programs for optimizing, cleaning and speeding up Windows.

    The antivirus, I must tell you, is quite reliable (BitDefender technologies are used) + the program's own algorithms. Protects PC from: spyware, trojans, dangerous scripts, ensures safe work with payment systems on the Internet (relevant, especially recently with the development of Internet banking).

    By the way, the program is compatible with many antiviruses (that is, it can be installed in addition to provide additional protection). Moreover, it will not greatly affect the speed and performance of your PC. We have described how to maximize speed and performance using Advanced SystemCare Ultimate.

    Maximum protection and maximum performance

    • Virus Protection, spyware, hackers, phishing, botnets, etc.
    • Online payment and banking security
    • Optimizes, cleans and fixes all PC problems in 1 click
    • Works fast, compatible with other antiviruses

    New in IObit Malware Fighter

    • Added antivirus engine Bitdefender;
    • Improved IObit engine;
    • The database of signatures has been updated and significantly expanded;
    • Improved scanning speed by adapting the caching mechanism;
    • Minimized resource consumption during scanning and cleaning;
    • Improved real-time protection;
    • New quarantine method;
    • New simplified and convenient user interface;
    • Improved web protection;
    • Full support for Windows 10.

    Main components of IObit Malware Fighter

    Safety

    Startup Protection
    · Network protection
    · File protection
    Checking files in the cloud
    ・Cookie Protection
    Browser ad blocker
    Antivirus engine Bitdefender Pro
    Process Protection Pro
    USB drive protection Pro
    Tracking malicious activities Pro

    Browser protection

    · Homepage Defender protects your homepage and search engine from malicious modification.
    · DNS Protection: Prevent changes to system DNS settings malware.
    · Surf Protection: Block various online threats to ensure you surf the web safely.
    · Browser protection from malicious plugins / toolbars.
    · Anti-Spying: Auto-clean your browser data from malicious tracking as soon as it closes. Pro

    One of the best free antivirus. Every year it is gaining more and more popularity. The advantages of antivirus are obvious:

    1. some of the best algorithms for searching and detecting viruses (even those that are not yet known to the antivirus and are not included in the update databases);
    2. support for all popular Windows operating systems (including Windows 10);
    3. low system requirements to a PC (works fast enough even on older machines);
    4. fully functional free version of the antivirus.

    Main components of Avast Free Antivirus

    (1) The component is available for an additional fee (1500 RUB/year)
    (2) The component is available for an additional fee (from 650 rubles / year)

    Version comparison

    Functions / VersionsFreeProIS*Premier
    Antivirus
    Spy protection
    Stream updates
    Power Mode
    cybercapture
    Do Not Track, SiteCorrect
    Phishing and malware protection
    Safety home network
    HTTPS scanning
    Smart Scan
    Passwords
    SafeZone Browser
    Software Updater**
    Sandbox
    SecureDNS
    Antispam
    Firewall
    file shredder
    Cleanup***
    SecureLine VPN***

    * IS is the version of Internet Security.
    ** Software Updater is installed automatically in Premier, manually in other versions.
    ***Cleanup, SecureLine VPN - paid add-ons for all versions

    New in Avast Free Antivirus Nitro Update

    New features and technologies

    New features: CyberCapture, SafeZone browser.

    Improvements: Home network security, Antivirus and malware protection.

    Key features of Avast Free Antivirus

    New! cybercapture

    This proprietary technology developed by AVAST Software allows you to automatically submit unknown files to the Avast Online Threat Lab. Potentially dangerous files are carefully checked by our analysts in real time, which eliminates the slightest risk of infection on your PC.

    New! SafeZone Browser

    Designed for a safer and more comfortable browsing experience, SafeZone is also the most secure browser in the world. The secure payment mode ensures complete privacy when shopping and banking online, the Ad Blocker ensures that you are not bothered by ads, and the Video Downloader allows you to watch videos offline at your convenience.

    Improved! Home network security

    Even more advanced protection for your home network and all devices connected to it. Thanks to the new Nitro technology, Avast Free Antivirus is able to detect more types of router vulnerabilities, which will provide even more reliable protection for Wi-Fi cameras, SMART TVs, printers, network drives and routers.

    Avast Passwords

    It's time to break the bad habit of storing your passwords in your browser or using the same password for multiple services. The new Avast Password Manager lets you store all your passwords in a secure, easy-to-use vault that only requires you to remember one master password to access.

    HTTPS scanning

    The improved Web Shield allows Avast Free Antivirus to thoroughly scan HTTPS sites for malware and other threats. You can whitelist the websites and certificates of your online banking so that scanning does not slow down access to services.

    Browser cleaning

    Don't let outsiders change your search engine without your permission. Cleaning up your browser will remove any questionable plugins and toolbars so you can return to initial configuration browser.

    Unique! 230 million users

    Avast is the choice of 230 million users around the world, which allows the antivirus to detect malware much faster than others, regardless of where it appears. The combination of the state-of-the-art AI engine at the heart of the antivirus program and millions of virus sensors around the world allows Avast Free Antivirus to continuously detect and eliminate the latest cyber threats, keeping you 100% safe.

    Improved! Antivirus and malware protection

    The developers are constantly working on improving the innovative anti-virus engine to provide you with reliable protection against all types of cyber threats. Through continuous updates no larger than a text message, Avast distributes new threat intelligence several times an hour to keep your antivirus up to date.

    Smart Scan technology

    Comprehensive intelligent scanning for all types of problems. Scan your PC for performance status, check for online threats, malware or viruses, and find outdated programs with just one click. The easiest way to stay completely safe.

    Software Updater

    Hackers love to exploit vulnerabilities in outdated software to get into a system. Software Updater notifies you when updates are available for your software so you can fix any vulnerabilities before attackers can exploit them.

    Integration with MyAvast

    Smartphone, PC and tablet protected by Avast? Wonderful! You can control and manage devices through your personal account right in user interface programs

    AVG

    A very, very good antivirus, which, by the way, has won many awards. There is a free version available that can cover the needs of most users. Judge for yourself, the free version includes: an antivirus (which protects in real time from viruses, spyware, etc.), a complex for protecting against dangerous links on the Internet, as well as a complex for protecting e-mail.

    By the way, the antivirus can be installed not only on a laptop (computer), but also on a phone! In general, the antivirus is very worthy, protecting the PC well (while working fast enough)!

    Bitdefender Antivirus

    A very well-known antivirus that provides comprehensive computer protection: antivirus, firewall, complex for enhanced protection of personal data. By the way, in many independent ratings, this antivirus is on the top lines.

    Among the features of this antivirus, I can highlight the following:

    • protection of everything and everything (the user, in practice, can not be distracted by thoughts about protecting the PC - the program itself knows everything: what, where and when to block ...);
    • low consumption of system resources (for example, 100-200 MB of RAM when working in Windows 10 with documents);
    • convenient and intuitive interface.

    Key features of Bitdefender Antivirus Free Edition

    real time protection– Real-time screen provides protection during access. All files are checked at the moment they are launched or copied. For example, files that you have just downloaded from the Internet are scanned immediately.

    Cloud technologies - Bitdefender Antivirus Free Edition uses cloud-based scanning to speed up detection and identify new or unknown threats that other antiviruses miss.

    Active virus control is an innovative proactive detection technology that uses advanced heuristics to identify new potential threats in real time. Bitdefender's free antivirus heuristic provides a high level of protection against new threats that have not yet been added to virus signatures. Active Virus Control in Bitdefender Antivirus Free Edition monitors every program running on your computer and detects malware based on their actions.

    HTTP scanning- Bitdefender free antivirus analyzes and blocks fraudulent and phishing websites.

    Antirootkit The technology is used to search for hidden malware, also known as rootkits. Rootkits are a hidden type of software, often malicious, designed to hide certain processes or programs from conventional detection methods, while rootkits allow you to gain privileged access to the computer.

    Periodic update– Bitdefender Antivirus Free Edition is updated periodically without user intervention, providing an optimal level of protection against new threats.

    Early Scan at System Boot- This technology ensures that the system is checked at boot time, once all important services have been started. It allows you to improve virus detection at system startup, as well as speed up system boot time.

    Scan while idle- Free antivirus Bitdefender detects when the use of computer resources is minimal in order to scan the system without affecting the user's activities. System resource usage is calculated based on the processor (CPU) and hard disk drive (HDD) usage.

    Smart Scan Technology- Files that were previously scanned by Bitdefender Antivirus Free Edition will not be scanned again using the smart file scan skip engine.

    Avira Free 2015

    The most famous German-made antivirus (“umbrella”, “red umbrella”, as many in our country called it). It provides a good degree of PC protection (by the way, virus search and detection algorithms are among the best among programs of this kind), high performance (I remember recommending installing this antivirus even on budget laptops 5-6 years ago),

    1. Russian language support;
    2. support for all popular Windows OS: XP, 7, 8, 10 (32/64 bits);
    3. low system requirements;
    4. excellent algorithms for searching and detecting viruses and potential threats for PCs;
    5. user-friendly interface (everything unnecessary is hidden from beginners, but nevertheless accessible to experienced users).

    Main features of Avira Free Antivirus

    Antivirus and antispyware

    Effective real-time and on-demand protection against various types of malware: viruses, trojans, worms, spyware and adware. Constant automatic updates and AHeAD heuristic technology reliably protect against known and new threats.

    Cloud protection

    Avira Protection Cloud - real-time threat classification and fast system scan.

    Rootkit protection

    Avira's anti-rootkit protects against difficult-to-detect threats - rootkits.

    Windows Firewall Management

    Avira Free Antivirus allows you to edit network rules for applications, change network profiles (Private, Public) and manage advanced settings for Windows Firewall with Advanced Security.

    Internet protection **

    Safe search, blocking of phishing and malicious websites, tracking protection.

    ** This feature is part of the toolbar Avira Browser Safety for Chrome browsers, Firefox and Opera (installed separately from Avira Free Antivirus).

    Parental control

    Not available in the Russian version. For use, you can use the link to the service in the description.

    With the function of social networks based on technology Avira Free Social Shield you can monitor your children's online activities: check their social media accounts for comments, photos, etc. that may affect your child in a negative way.

    Protecting Android Devices

    Antivirus solution Avira Free Antivirus, in addition to protecting your computer from various threats, offers to install the application Avira Antivirus Security for Android, which will protect your smartphone or tablet from loss and theft, and also allow you to block unwanted calls and SMS messages.

    Kaspersky Anti-Virus

    I'm not afraid to say that Kaspersky Anti-Virus is the most famous and popular anti-virus in the post-Soviet space. The anti-virus database of Kaspersky is really huge. It easily catches all possible viruses available on the network. But, as the developers did not declare about acceleration and, most importantly, about a radical decrease in computer resources, they did not complete this task to the end.

    Kaspersky Anti-Virus, as it slowed down the PC earlier, so it continues to do so now. Moreover, using it on a fairly powerful machine does not save you from slowdowns - Kaspersky's gluttony is unlimited, this can only be fixed by very careful tuning of the program.

    New in Antivirus Kaspersky Free 2017

    V Kaspersky Free Anti-Virus 2017 has the following new features:

    • Improved program update in the background. Now, when upgrading, you do not need to re-accept the terms of the License Agreement if it has not changed.
    • Improved Mail Anti-Virus. The default heuristic analysis depth has been increased to medium.

    Version comparison

    Comparison of the functions and capabilities of the free antivirus Kaspersky Free with paid solutions Kaspersky Anti-Virus(K.A.V.), internet security(KIS) and Total Security(KTS).

    Functions / VersionsFreeKAVKISKTS
    File Anti-Virus
    Web Anti-Virus
    IM Antivirus
    Mail antivirus
    Anti-Phishing
    Screen keyboard
    Kaspersky Security Network
    Kaspersky Secure Connection*
    Network monitoring
    Activity monitoring
    Internet management
    Application Control (HIPS)
    OS change control
    Webcam access
    Firewall
    Protection against network attacks
    Anti-Spam
    Anti-Banner
    Data collection protection
    Secure payments
    Secure data entry
    Trusted Applications Mode
    Software update
    Uninstalling programs
    Parental control
    Backup
    Virtual safes
    Password Manager

    Main features of Kaspersky Free Anti-Virus

    File Anti-Virus

    file Kaspersky antivirus Free Anti-Virus allows you to avoid infecting your computer's file system. The component starts at the start of the operating system, resides permanently in the computer's RAM, and checks all opened, saved, and run files on your computer and on all attached drives.

    Mail Antivirus

    Mail Anti-Virus scans incoming and outgoing mail messages on your computer. The letter will be available to the addressee only if it does not contain dangerous objects.

    Web Anti-Virus

    Web Anti-Virus intercepts and blocks the execution of scripts located on websites if these scripts pose a threat to the computer's security. Web Anti-Virus in Kaspersky Free Anti-Virus also monitors all web traffic and blocks access to dangerous websites.

    IM Antivirus

    IM Anti-Virus ensures the security of working with IM clients. The component protects information received on your computer via IM client protocols. IM Anti-Virus ensures safe work with many instant messaging programs.

    Secure connection

    The VPN client Kaspersky Secure Connection, which is installed with the antivirus, is designed for a secure connection. The application protects your data when using public Wi-Fi networks, provides anonymity on the Internet and allows you to visit blocked sites.

    * The Kaspersky Secure Connection component has a traffic limit of 200 MB per day. Removing the restriction and the ability to select VPN servers are available with an additional subscription.

    Participation in Kaspersky Security Network

    To improve the protection of your computer, Kaspersky Free Anti-Virus uses protection from the cloud. Protection from the cloud is implemented using the infrastructure Kaspersky Security Network using data received from users around the world.

    Benefits of Kaspersky Free Anti-Virus

    One of best antiviruses in terms of searching for and detecting unknown viruses (that is, the heuristic analysis in the program is so advanced that thanks to it this antivirus finds dangerous files, even if the anti-virus databases do not yet have this threat).

    After installing Dr.Web, access to the Internet is often blocked, which can only be corrected by proper configuration and making exceptions to the program. So before installing this software, do not be lazy and read the setup instructions and help on the developers' website.

    Main features of Dr.Web Anti-virus for Windows

    · Dr.Web Scanner for Windowsvirus scanner with a graphical interface that runs at the user's request or according to a schedule and performs an anti-virus scan of the computer.

    · Anti-rootkit Dr.Web (Anti-rootkit API, arkapi)- background scanning for rootkits and the new arkapi. A subsystem for background scanning and neutralization of active threats has been implemented. The implementation of the subsystem required significant reworking of the Dr.Web software libraries.

    · Preventive protection– advanced features of preventive protection of Dr.Web Anti-virus user's computer from infection by blocking automatic modification of critical Windows objects, as well as control of some unsafe actions.

    Dr.Web anti-virus, using preventive protection, provides control over the following objects:

    HOSTS file;
    – Possibility of low-level disk access;
    - the ability to download drivers;
    – access to Image File Execution Options;
    – access to User Drivers;
    – parameters of the Winlogon shell;
    – Winlogon notifiers;
    – Windows shell autorun;
    – associations executable files;
    – Program Restriction Policies (SRP);
    – plugins Internet Explorer(BHO);
    - autostart programs;
    – autostart policies;
    – configuration safe mode;
    – Session Manager parameters;
    - system services.

    The improved Dr.Web ShellGuard technology of the Dr.Web Process Heuristic non-signature (behavioral) blocking in the Dr.Web Preventive Protection system will protect against attacks using zero-day vulnerabilities.

    · Dr.Web HyperVisor is a component that made it possible to improve the system for detecting and curing threats, as well as to strengthen Dr.Web self-defense by using the capabilities of modern processors. The component starts and runs below the operating system level, which ensures control of all programs, processes, and operation of the OS itself, as well as the impossibility of malicious programs intercepting control over the protected Dr.Web system.

    · SpIDer Guard– anti-virus watchman, which is constantly in the RAM, checking files and memory on the fly, as well as detecting manifestations of virus activity;

    · SpIDer Mail– a mail anti-virus guard that intercepts requests from any computer mail clients to mail servers via the POP3/SMTP/IMAP4/NNTP protocols (IMAP4 means IMAPv4rev1), detects and neutralizes mail viruses before receiving messages email client from the server or before sending the email to mail server. The mail watchman can also check correspondence for spam using Dr.Web Antispam;

    · Dr. Web Firewall– a personal firewall of Dr.Web Anti-virus designed to protect your computer from unauthorized access from the outside and prevent leakage of important data over the network;

    · Update module, which allows registered users to receive updates of virus databases and other files of the complex, and also makes them automatic installation; allows unregistered users to register or receive a demo key.

    · SpIDer Agent– a module used to configure and manage the operation of Dr.Web Anti-virus components.

    Dr.Web CureIt! is a free anti-virus scanner based on the core of the Dr.Web anti-virus program that will quickly and efficiently scan and cure your computer without installing Dr.Web anti-virus itself.

    Antivirus Dr.Web CureIt! detects and removes mail and network worms, file viruses, Trojans, stealth viruses, polymorphic, incorporeal and macro viruses, viruses that infect MS Office documents, script viruses, spyware (Spyware), password stealers, dialers, adware, hack tools, potentially dangerous software and any other unwanted code.

    Using the utility, you can check the computer's BIOS for infection with "bios kits" - malware that infects the PC BIOS, and a new rootkit search subsystem allows you to detect complex hidden threats.

    Free payment:

    1. Does not provide real-time protection.

    2. The program does not include a module for automatically updating anti-virus databases, so in order to scan your computer next time with the most latest updates anti-virus databases, you will need to download again Dr.Web CureIt!

    – The use of a special free version of the software is only legal on your personal computer. If you are using a special free version Software, you are fully subject to the terms License Agreement, with the exception of paragraphs 6.1-6.3.

    Dr.Web also has one wonderful utility - Dr.Web Cureit (which does not need to be installed)! The portable utility can be run even from a flash drive, it is absolutely free and does not require any activation. Finds all viruses available and paid versions of Dr.Web. It often helps to detect both and when on a computer.

    But be careful before treatment, carefully read the detected Dr.Web Cureit threats. All processes that monitor the computer in real time, such as CCleaner or Advanced SystemCare Ultimate, are determined by the utility to be unsafe. During treatment, the software is not completely removed, but only some files, but the program no longer starts after that, and is also not subject to standard removal - you will have to clean it manually.

    The utility is available on the developers website https://free.drweb.com/cureit

    Comodo Antivirus

    Website: https://antivirus.comodo.com/

    What captivates in this antivirus is that, in addition to the “normal” antivirus databases, it has built-in databases for searching and detecting various adware (which is very popular lately). If you want to protect your browsers and programs for working with the Internet from all sorts of banners (which often appear so intrusively on the floor of the screen ...) - I recommend trying Comodo Antivirus (especially since the program is free).

    Some antivirus software vendors offer free products where some features are not available and are reserved for paid versions. The free Comodo Antivirus includes absolutely everything in the company's paid solution, with just one major exception. The antivirus does a great job at basic protection tasks, but some advanced features are quite complicated and more suitable for geeks than ordinary users.

    Advantages

    • high scores in tests of independent laboratories;
    • good results in our own malware blocking tests;
    • contains secure browser, virtual desktop, virtualization system.

    Flaws

    • Comodo participates in tests from a limited number of labs;
    • weak blocking of malicious links based on test results;
    • nominal phishing protection;
    • recognized some trusted PC Magazine utilities as malware;
    • the HIPS system (disabled by default) in the active state displays a large number of notifications that mislead the user.

    Overall score

    Comodo Antivirus offers reliable antivirus protection and a rich collection of additional security tools. However, the implementation of auxiliary components is more for advanced users.

    360 Internet Security

    Website: https://www.360totalsecurity.com/


    A very interesting free antivirus that is rapidly gaining popularity. In addition to the built-in antivirus, there are functions for eliminating some vulnerabilities in Windows, functions for installing patches and fixes, optimizing and speeding up the system, cleaning the PC of “garbage” (unnecessary and temporary files).

    Key features of 360 Total Security

    The new version of 360 Total Security adds the Avira antivirus engine and System Repair for system recovery to the existing Bitdefender engines, the proactive QVM II and the cloud-based 360 Cloud.

    Also added are the functions of acceleration and cleaning “in one click” to optimize the performance of the computer.

    Total Security solves the vulnerability problems of the Windows operating system by checking the system for uninstalled patches and updates, allowing you to download and install them.

    System check
    – One-click quick check of the general health and security of your computer

    Antivirus scanning
    – Use of 5 engines, including antivirus 360 Cloud Engine / QVMII / Avira and Bitdefender for comprehensive protection and better detection, as well as System Repair for system recovery.

    System acceleration
    – Allows you to manage and optimize the startup of applications, plugins and services. Reduce your PC boot time.

    Cleaning the system
    – Helps free up hard drive space by cleaning up necessary files from your computer and make your work more efficient.

    Real time protection
    – Protect your computer from malware, hidden threats and the latest threats using fast and intelligent cloud technology.

    Fixing vulnerabilities
    – 360 Total Security detects vulnerabilities in the Windows system and allows you to download and install all the necessary security updates.

    Security in a sandbox environment
    – The Sandbox allows you to run selected applications (for example, a browser) in an isolated environment and work with them without the risk of harming the main system. It is possible to launch applications in the sandbox from the context menu and add to the list for automatic launch in the sandbox.

    Firewall (firewall)
    – Includes stand-alone tool GlassWire- network security monitor and firewall to control your network. The program protects your computer by visualizing network activity on a convenient graph and helping you to detect unusual behavior of malware on the Internet.

    remote assistance
    360 Connect is a mobile application for Android that allows you to manage protection remotely using your smartphone and receive notifications about the status of your computer from installed antivirus 360 Total Security.

    Installation and use rights

    – 360 Total Security is a free product for personal use. Qihoo 360 Software only grants a limited license to download, install, use and copy the software on a single device for non-commercial use with no limit on the number of uses.

    The best antivirus is a backup copy of important documents to third-party media…

    When creating the article, materials were used http://www.comss.ru/

    V modern world, where it is difficult to do without the Internet, which has become a part of everyday life for most people, and where home and office computers store a huge part of the user's confidential information, we become targets of attacks by intruders. Computer protection, as a necessary minimum of installed security software and user behavior rules, is a means of countering illegal actions from outside.

    If you do not take any steps to protect your device and confidential data, consider that by this action or inaction you voluntarily open all possible loopholes for malware and hackers who can not only steal this data, but also damage your computer. The latter may consist not only in the infection of the operating system itself with viruses, but also in the incapacitation of expensive PC components.

    Although viruses and malware are different types, one thing is for sure, you won't want them inside your operating system. To counter this, Windows 10 users have many tools to deal with all kinds of malware.

    As many people know, most of these security tools are already built into the OS by default. Additionally, you need to know that protecting your computer and your personal files is not only about installing security applications, but also in combination with knowing how to avoid potential threats.

    COMPUTER PROTECTION

    Let's take a closer look at the issue of securing a computer, laptop or tablet, as well as protecting the user's confidential data. Our tips will help you minimize the possibility of infiltrating your PC with almost all types of malware, including viruses, ransomware, spyware, adware, and more.

    UPDATE WINDOWS 10

    Updating the Windows 10 operating system and related software is the most important step you need to take to keep your device and data safe. Microsoft periodically releases packages to fix potential vulnerabilities that could be exploited by hackers.

    With default settings, updates are downloaded and installed automatically, under certain conditions and within a certain period of time. Even in this case, it will not be superfluous to make sure that all the necessary patches are installed on your system. To do this, in the "Parameters" of the OS in the "Update and security" section, you must click on the "Check for updates" button.

    In addition, it is important to periodically check and install updates for any software you have installed. Apps downloaded from the Windows Store will be updated automatically as soon as a new version is available. And about classic desktop programs, in most cases, you need to take care of the user himself. Always check the official software website to download and update them.

    Next, decide on the relevance of the OS itself. Even if a computer is running one version, it does not necessarily mean that it is running the latest one. The new operating system was introduced in 2015, and since then the corporation has released several big updates. Added new features, improved performance and significantly improved security.

    To find out which version is currently running on your PC, use the Win + R key combination on your keyboard and “winver” in the input field that appears. Version 1709 is the latest version at the time of this writing.

    WINDOWS DEFENDER

    Use an antivirus, which is a required component on every computer. Help detect and remove malware before it can compromise your files, affect performance, or crash your device.

    Windows Defender, included in the System Security Center by default, offers excellent real-time computer protection. If you want even more protection, you can level it up. This built-in solution should be more than enough for most users. However, there are many third-party security solutions that you can use. Some of them are free and some are not. You can also add a popular solution called "Malwarebytes" as a second layer of protection.

    ACCESS TO CONTROLLED FOLDERS

    Ransomware is another type of malware that can lock your device by encrypting all your files and require you to pay a certain amount to unlock it. Starting with the Fall Creators Update, Windows 10 includes a feature known as Controlled Folder Access. It not only prevents capture, but also blocks unwanted changes to your files.

    FIREWALL

    Firewall - blocks access to your computer from the Internet and local network. You'll find plenty of third-party tools that provide network security protection, but the new version 10 of the OS already includes a very effective firewall.

    To make sure it works correctly, find it there in the "Security Center" and make sure that every network connection is marked "Firewall enabled". Enable it otherwise.

    PROVEN PROGRAMS

    By all means, avoid downloading and installing applications from unknown sources, always try to download software from official websites. A great solution is to install apps from the Microsoft Store that are already verified by Microsoft. To increase your security level, enable the non-store installation prevention feature using the SmartScreen filter settings.

    BACKUP

    One of the best ways to keep your files safe is to make regular backups. You should always think about making at least 2 backups. One can be saved to a removable drive, and the other in the cloud storage.

    If you're using Windows 10, you don't need to get third party program for backup, as you can use the built-in tool. Alternatively, if you don't have a lot of files, you can copy your documents to a USB stick regularly.

    Online backup is probably one of the best ways. The best option is to create an account in OneDrive or. In their functionality, you can use the version history of files.

    NETWORK SECURITY

    The best tool to protect your computer and data is yourself. As a rule, a computer can be infected with viruses and data is compromised as a result of the user clicking on an unverified link in an email or a website pop-up window, or installing an application (game) from an untrusted source.

    Use only modern web browsers such as Google Chrome, Microsoft Edge and Mozilla Firefox. They are always up to date, have great built-in security, alert you to potential problem, filter out unsafe websites. If you get a warning, don't try to find a way around it, there's probably a good reason for it.

    If any type of malware does infiltrate the operating system, the first thing to do is disconnect the computer from the network by unplugging the Ethernet cable or turning off the router. Then open Antivirus and run a full hard drive scan. Remove detected malware.

    There are also many other ways in which you can return the OS to a working state. But, before that, it is necessary to establish the cause of the failure or infection, and only then eliminate the consequences. In the absence of the necessary technical knowledge and experience, entrust this matter to a specialist.

    Our others computer tips, as a list, placed in . We recommend that you familiarize yourself with them.

    Unlike protection and technical support of corporate networks, protection and technical support computers owned by home users and small businesses, it seems a simple task, but only at first glance. The problem is that next to the home user (as well as next to the user of the only computer of a small company) there is usually neither a system administrator nor a specialist in information security- their functions are forced to be performed by the user himself, not generally being either one or the other, and it is good if he is at least aware of the need to protect and maintain his computer.
    Naturally, this situation implies certain requirements for products and services designed to protect and maintain personal computers. Such products should have a simple interface that does not overload the user with unnecessary details and questions, the answers to which he does not know, convenient (preferably automatic) means of updating themselves, combine many different functions (for example, not just an antivirus, but an antivirus plus antispyware plus anti-phishing and anti-spam tools…), remind the user that it is time to take certain actions (for example, perform a virus scan of disks), perform some procedures without the user noticing (for example, perform online anti-virus scanning of incoming e-mail messages, documents opened and installed applications).

    More recently, Symantec, McAfee, and Trend Micro have led the end-user security market. However, despite the rather convenient interfaces of the listed companies' personal protection tools, according to Microsoft, about 70% of users either do not use anti-virus programs at all or update anti-virus databases rarely. According to Microsoft representatives, it is for such users that the new service, which will be discussed in this article, will be intended. According to Bill Gates at the RSA Conference 2006 in February, this service is being developed primarily to improve computer security in general, and not to solve individual problems in this area.

    The corporation's plans to release a personal anti-virus product and organize a corresponding service have been discussed since its purchase of the Romanian anti-virus company GeCAD in June 2003. This year they are planned to be implemented: Microsoft intends to enter the personal protective equipment market this summer with its paid personal computer maintenance service OneCare Live, available by subscription.

    According to employees of the corporation, the OneCare Live service will be put into operation in June. The subscription will cost about $50 per year (with a discount of up to $20 for the first year for beta testers), and up to three PCs will be serviced for this fee. OneCare Live is currently available for beta testing to owners of the English version of Windows XP with SP2 installed - running this version of Windows, the Windows OneCare application, updated with OneCare Live, performs actions on the user's computer to protect and improve performance. A beta version of Windows OneCare is available at http://www.windowsonecare.com.

    Below we will look at the main features of this product. Please note that this article is a beta release, so there may be some changes to the functionality of the Windows OneCare app and OneCare Live service before the final launch of OneCare Live.

    Key features

    Like most personal Microsoft products, Windows OneCare is marketed as an easy-to-use yet feature-packed product for those Windows XP SP2 users who don't have time to set up security and take care of their computer on a daily basis. This product integrates with the Windows Security Center in Windows XP and allows you to perform anti-virus protection, hard drive defragmentation, data backup and recovery using CD or DVD media, and personal firewall management. OneCare users can also use the Windows Defender anti-spyware app.

    The Windows OneCare user interface is extremely simple: system area the taskbar is an icon, the color of which (green, yellow or red) shows how urgently you need to take some measures to improve the security of your computer (Fig. 1).

    Clicking on the icon brings up the main window of the application, allowing the user to determine what actions need to be taken and, if desired, initiate their execution (Fig. 2).

    Rice. 2. The main window of the Windows OneCare application

    If necessary, you can perform several actions in turn: anti-virus scanning, removal junk files, defragmentation.

    Antivirus

    Antivirus is one of the most important components of Windows OneCare, which allows you to scan memory and disks and constantly monitor the system for antiviruses.

    The anti-virus scanner is launched by clicking on the Scan for Viruses link in the main application window, after which you need to select the drive or folder that you want to scan. The anti-virus scan process is carried out automatically, and infected objects found are automatically quarantined (Fig. 3).

    The antivirus settings allow you to enable or disable constant anti-virus monitoring of the system, configure the list of anti-virus exclusions, and manage the contents of the quarantine (Fig. 4).

    Note that at the moment, independent tests of the effectiveness of this antivirus and the speed of response of the OneCare service itself to new threats are not available, so it is not yet possible to compare it with competing products. For this comparison to work properly, at a minimum, wait for the final product release and the launch of OneCare Live in commercial mode.

    Data backup and recovery tools

    The backup and restore tools, which you can launch by clicking the Back up files link, scan your computer's hard drive for new or changed files since the last backup and offer to write those files to external hard disc, CD or DVD. Before backup, the user can select the types of files he is interested in and view the resulting list (Fig. 5).

    Rice. 5. Select files for backup

    Before starting a backup, the user is informed about how many disks he will need to create a backup and how long it will take.

    To restore files from a backup, select the Restore Files link. OneCare allows you to recover all your lost files, determine which ones you need to recover, and find the files you need inside the backup.

    Performance Tools

    Windows OneCare performance optimization tools provide the ability to sequentially perform five operations: deleting unnecessary files, defragmenting the hard drive, antivirus scanning; checking for the presence of files that need to be backed up, checking for all necessary operating system updates (Fig. 6).

    At the end of the optimization, you can get a report on its results (Fig. 7).

    Configuring optimization tools allows you to set a schedule according to which the listed actions are performed and indicate whether unnecessary files should be deleted during their execution.

    ***

    So, this year, users will receive from Microsoft a product that can simplify the care of computers and provide them with relatively little effort, as well as a service that maintains anti-virus databases and the product itself in proper condition. It's hard to predict now how much this product will out-compete competing solutions from Symantec, McAfee and Trend Micro, especially given that Symantec plans to launch a similar service this fall (this project is codenamed Genesis). For now, we only note that often a platform manufacturer that has just entered the market for tools or other applications for this platform is in a much more advantageous position than companies that have already settled in this market, but do not produce the platforms themselves, and the development of the market for development tools for Windows and .NET in the last five years is a clear proof of this. True, unlike the market for development tools, the market for personal protective equipment is still far from saturation.

    At the end of February, in a report by Bill Gates at the RSA Conference, the company's immediate and long-term plans to create a more secure environment for using digital technologies were revealed. Thus, in order to support the Identity Metasystem ideology, which allows private users and websites to exchange personal identification information more securely and securely over the Internet, Microsoft plans to introduce a number of new technologies, including InfoCard technology, which simplifies this process and at the same time improves the security of access to resources and personal data on the Internet. Microsoft also has plans to further reduce user costs associated with identity and access control. Starting with the next server version of Windows, Microsoft will be expanding the Active Directory role to include Rights Management Services, Certificate Services, Metadirectory Services, and Federation Services to create a unified identity and access control infrastructure. Gates also unveiled the first beta version of Microsoft Certificate Lifecycle Manager, a policy enforcement solution that accelerates planning, configuration, and management digital certificates and smart cards, and enhances security with multi-factor authentication technology.

    A few words about products for corporate users

    Note that Microsoft's soon-to-be-anticipated entry into the security market is by no means limited to products and services for home users.

    In addition to OneCare, Microsoft plans to release a similar Microsoft Client Protection product for corporate workstations and laptops. Client Protection will allow system administrator perform anti-virus protection of workstations. The corporation plans to release a beta version for the general public in the third quarter of 2006. The launch of Microsoft Client Protection in production is scheduled for the end of this year.

    In addition to client-side protection, anti-virus and anti-spam software for Microsoft Exchange email and SMTP servers is expected to be released - for this purpose, Microsoft recently acquired one of its partners, Sybari Software, which specialized in such tools. Named Antigen for Exchange, Antigen for SMTP Gateways, Antigen Spam Manager and Antigen Enterprise Manager, these products protect against viruses, worms, spam and inappropriate content using split multi-engine scanning and will be available for the next 6 months. In addition, a beta version of Internet Security & Acceleration Server (ISA Server) 2006 is now available, which combines a firewall, virtual private networking (VPN), and Web caching.

    Microsoft also announced the acquisition of FutureSoft, Inc. DynaComm i:filter Web filtering technology, which allows companies to manage Internet access in their environment.

    We will talk about the products and technologies listed above as they become available.

    Liked the article? Share with friends!
    Was this article helpful?
    Yes
    Not
    Thanks for your feedback!
    Something went wrong and your vote was not counted.
    Thank you. Your message has been sent
    Did you find an error in the text?
    Select it, click Ctrl+Enter and we'll fix it!