Saturday, 15 February 2014
On
12:04
by
Unknown
No comments
The reason why most computer malware are so deadly is because many users fail to recognize whether they have been infected or not. Had they detected the infection at an earlier stage, the damage caused could have been greatly reduced. As each virus is programmed differently, it becomes difficult to identify a virus outbreak. However, there are some general symptoms that make it easy to detect an infected computer. Here are some of them:-
1) Programs won't start or crash suddenly: If some system programs like the task manager or registry editor have suddenly stopped working or crash randomly without any visible reason, it is more than likely that your computer has got some form of worm that is attaching itself to various programs and thus, corrupting their code. A virus modifying registry entries to prevent these programs from running could also cause this.
2) Unusual Network Traffic: If even after closing your browser and other applications that may use the internet, you see that your computer is still downloading or uploading anything, then your computer is possibly infected with some form of spyware that is either downloading other viruses to your computer or is uploading your private information to a remote computer. In case you use a wifi connection, it is also possible that your neighbors are using your network. If that indeed is the case, you need to make sure that wireless network is properly secured.
3) Internet Connection not available or is slow: If suddenly, your internet connection has stopped working or has become extermely slow, it is possible that a malware is the cause. However, problems with your internet service provider could also be the cause of such issues.
4) Annoying Popups or Redirection to Strange Websites: If there has been an increase in the number of annoying popups while browsing the internet or your web browser redirects you to a different website from the one you wanted to visit, a virus or adware might be the cause.
5) Computer won't boot: If your computer has suddenly stopped booting, it is possible that some malware has modified your computer's system files. In such a situation, re-installing or repairing your operating system might be the only solution.
6) Slow Computer: Some viruses are designed specifically for this purpose. Malware programmers achieve this by designing viruses that increase your CPU's usage level to 100%. If on running the Task Manager, you find that your CPU's usage is constantly at 100% level, a malware might be the cause.
7) Programs start automatically: Some viruses and adware automatically start strange programs on your computer in order to show unwanted advertisements or simply to frustrate users.
8) Unusual File Associations: Some viruses change .exe or other file associations which prevents these files from opening. Some viruses also do this to automatically start themselves when a file of a particular type is started.
9) Security Software Disabled: Most malware disable antiviruses and firewalls to prevent themselves from being detected. If only a single software stops working, it might be a specific software failure issue. If it is a general trend and almost every security software is facing this issue, a virus infection is most likely.
10) Weird Behaviour: If your computer automatically starts sending emails or opens strange applications randomly or does things different from its "normal" behaviour, your computer is most likely compromised by malware.
Most malware infections can however be avoided by using a powerful antivirus software and following some best security practices.
Subscribe to:
Post Comments
(
Atom
)
Search
Popular Posts
-
Embattled Bitcoin exchange Mt. Gox has resigned from the board of the Bitcoin Foundation, the organization that manages the crypto-curren...
-
Hello friends, today we have something special for pc beginners. We have some keyboard shortcut which will really help you to operate any ...
-
Ultra HD, colloquially known as "4K," is the latest buzzword, and the latest push from TV manufacturers. While your next TV mig...
-
M icrosoft has patched a critical bug in its software that had existed for 19 years. IBM researchers discovered the flaw, which affect...
-
BlackBerry CEO John Chen confirmed two new phones were on their way this year. The first, codenamed "Jakarta," but known as the...
-
Obidike, the leader of the warriors is sent out in the company of other warriors to fetch seven virgins with which to bury the king. Incid...
-
If BitTorrent has its way, you'll be paying for some torrented content before the end of the year thanks to the integration of BitTo...
-
New photos of Nokia’s upcoming Android handset, code named Normandy, have leaked — and rather oddly, it appears the standard Android UI...
-
Nick Statt/CNET A large part of Hyperlapse's cha...
-
T he gadget to answer our smartphone power problems is here - introducing Fuel the world’s smallest phone charger. This mini jer...
Recent Posts
Sample Text
Blog Archive
-
▼
2014
(
367
)
-
▼
February
(
214
)
- Apple's culture of secrecy delays security respons...
- Black market lights up with 360M stolen credential...
- Why bother to text your girl when BroApp can do it...
- MTN, Globacom, Airtel fined $4m by NCC
- Bitflux wins Nigerian spectrum licence bid
- Jumia Nigeria giving away one PS4 hourly at 50% di...
- LinkedIn testing Chinese language site
- Top Bitcoin exchange MtGox goes offline
- Samsung adds biometrics to latest Galaxy smartphone
- 'Smart' toothbrush grades your brushing habits
- Bitcoin ATMs coming to the U.S.
- Feeling glum, happy, aroused? New technology can d...
- AT&T follows Verizon, offers free global texts wit...
- Apple promises to fix OS X encryption flaw 'very s...
- Quixey's mobile search lets you dig deep into apps...
- BlackBerry CEO confirms Foxconn-made Q20 and Z3 ph...
- Freescale Semiconductor's Kinetis KL03 processor...
- T-Mobile's losses widen as the carrier promotes 'U...
- Microsoft's hardware chief changes roles
- Curved Samsung Gear Fit Review
- New Movies Anywhere app streams Disney's world
- Microsoft in talks to take stake in Dailymotion, r...
- iOS security hole reportedly exposes your screen i...
- Mozilla plans '$25 smartphone' for emerging markets
- Huawei launches 'hybrid' Talkband smart device
- Xbox One price cut to match PlayStation 4
- WhatsApp will expand to voice communications in th...
- Mt. Gox resigns from Bitcoin Foundation Board
- Intel launches new Atom processors
- Broadcom aims to double Wi-Fi speeds with new 802....
- Get Password Depot password manager (Win) for free
- HTC's Desire 610 comes glad in glossy plastic, has...
- First Ubuntu phones
- SanDisk microSD cards hit 128GB
- Android-powered Nokia X great for Microsoft
- BBM to land on Windows Phone this summer
- Trace Mobile numbers or Ip-Address
- Multi Google Talk Login without any software
- 1). Start any application, say Word. Ope...
- Top 20 Tips To Keep Your System Faster
- Brief overview of Unix and Linux commands
- Increase the speed of your internet connection wit...
- HOW TO CHECK ALL PASSWORD IN FIREFOX
- ALL DOS CODES REVEALED – EVERY CODE FOR COMMAND PR...
- SOME COOL KEYBOARD SHORTCUTS FOR PC BEGINNERS
- HOW TO ENJOY WINDOWS 8 VIEW IN WINDOWS 7
- Top 10 Windows 8 tips and tricks
- Schiit Audio's tiny, but powerful $119 tube headph...
- Samsung Galaxy Tab Pro 8.4 review:
- Lie detector on the way to test social media rumours
- Security failings in Linksys and Asus home routers...
- Wurm offer Bounty for game taken offline by DDoS a...
- Stuxnet worm 'targeted high-value Iranian assets'
- South Korea to develop Stuxnet-like cyberweapons
- Netflix speeds lag for Verizon users amid dispute
- Steve Jobs may appear on U.S. postage stamp
- New app helps you fight parking tickets
- Apple security update fixes iOS vulnerability
- Fitbit halts sale of Force fitness band, issues re...
- Samsung Galaxy Gear 2 and Gear 2 Neo spied in leak...
- Google Barge to set sail for new home within a month
- BigRep 3D printer can print whole pieces of furniture
- Google's Project Tango whips up new mapping tech
- Namecheap targeted in monumental DDoS attack
- Samsung Galaxy S5: Most likely features and specs
- 5TB hard drive is here, inside LaCie's latest Thun...
- Google's Tim Bray steps down in the name of workin...
- Leaked specs paint fuller picture for HTC Desire 8
- Muvee Action Studio lets you edit your GoPro video...
- Google acquires Spider.io to combat ad fraud
- Nvidia delivers more KitKat and an LTE-equipped Te...
- Microsoft taps gamers to test next Xbox One update
- Firefox OS taps into Cordova for easier Web-app de...
- Opera: watch an ad, get free mobile Net access
- Obama's commerce secretary to petition Silicon Val...
- Airbnb makes smoke and carbon monoxide detectors m...
- Fatwa forbids Muslims from traveling to Mars
- New Fiskers will have V-8s or batteries, Wanxiang ...
- Google embarks on smart contact lenses for diabetics
- Paul Graham steps down as Y-Combinator president
- Verizon closes Vodafone deal for total control of ...
- Sprint adds Wi-Fi calling to improve voice coverage
- Amazon reportedly prepping Web TV product for March
- Nokia's Here Maps to expand to all Windows 8.1 dev...
- LinkedIn now allows you to block other members
- Supernova secrets seen in X-rays
- 3-D printing 'ink' is way too expensive
- Speculators look to cash in on Bitcoin crisis
- Blackberry boss 'outrage' at T-Mobile iPhone offer
- Malware makers 'tailor' Android threats geographic...
- Microsoft to sell $25 Xbox One Media Remote in March
- Libon to IM friends for free, even if they don't h...
- Yandex suite of free Android tools sidesteps Google
- Microsoft relaunches Office Web Apps as Office Online
- Apple eyes smart magnets to attach accessories to ...
- Another HTC One 2 leak shows new colors for handse...
- The not-so-secret appeal of Snapchat's fleeting st...
- Radiation-free cancer scans may be on the horizon
- Kazam Thunder 2 brings lightning-fast 4G LTE
- Compact, budget Liquid Z4 phone hopes to make a bi...
-
▼
February
(
214
)
Copyright © 2014 Harry Jacks All Rights Reserved. Powered by Blogger.
About Me
Copyright Text
Copyright © 2014 Harry Jacks
All Rights Reserved
All Rights Reserved
0 comments :
Post a Comment