How Did I Get Infected??

You usually get infected because your security settings are too low or your unintentional usage supersedes your computer security .

Here are a number of recommendations that will help tighten them, and which will contribute to making you a less likely victim:

Safe Computing Practices

1.  Keep your Windows updated!

It is important always to keep current with the latest security fixes from Microsoft. This can patch many of the security holes through which attackers can infect your computer.  Either enable Automatic Updates or get into the habit of checking for Windows updates regularly.

Operating Systems

  • Windows XP:  Reached end of support April 8, 2014.
  • Windows Vista:  Go to Start > Control Panel > Security > Windows Update
  • Windows 7:  Go to Start > All Control Panel Items > Security > Windows Update
  • Windows 8:  Open the Search charm, enter “Turn automatic updating on or off”, and tap or click Settings to find it.
  • Windows RT:  Automatic updating is always on.

Alternatively, navigate to http://windowsupdate.microsoft.com, and install ALL Critical security updates listed (you will need to use Internet Explorer to do this).

Service Packs

Service packs are the means by which product updates are distributed and may contain updates for system reliability, program compatibility, security, and more. Unless you suspect your computer is infected with malware, the latest service packs can be downloaded fromMicrosoft Support.  Once you are sure you have a clean system, it is highly recommended to install the latest service pack to help prevent against future infections.

2.  Update 3rd Party Software Programs

The importance of updating third-party software is evidenced by the report by AV-TEST in which it is stated, “Adobe’s Reader and Flash and all versions of Java are together responsible for a total of 66 percent of the vulnerabilities in Windows systems exploited by malware.” (Complete article at Adobe & Java Make Windows Insecure.)

  • Third Party software programs have become targets for malware creators.  To check if your system is missing security updates or has insecure applications installed, install theSecunia Personal Software Inspector (PSI) or visit the Secunia Online Software Inspectorpage.
  • The Secunia Online Software Inspector runs through your browser with no installation or download required and does the following:
    —  Detects insecure versions of applications installed
    —  Verifies that all Microsoft patches are applied
    —  Assists you in updating your system and applications

3.  Use a Standard/Limited User Account

Although the Administrator account is needed when setting up the computer, day-to-day usage should be with a Standard User Account which has limited permissions. An Administrator account provides the highest level of access to your computer whereas using a Standard User Account makes it more difficult for the computer to be infected.

Using a Standard User Account for every day activities applies even if you are the sole user of the computer. For additional information, see Using a Standard/Limited User Account.

4.  Watch what you download!

  • Many “freeware” programs come with an enormous amount of bundled spyware that will slow down your system, spawn pop-up advertisements, or just plain crash your browser or even Windows itself.  Watch for pre-checked options such as toolbars that are not essential to the operation of the installed software.
  • Peer-to-peer (P2P) programs like Kazaa, BearShare, Imesh, Warez P2P, and others are among the most notorious. P2P programs allow the creation of a network enabling people to connect with other users and upload or download material in a fast efficient manner.
  • Note also that even if the P2P software you are using is “clean”, a large percentage of the files served on the P2P network are likely to be infected. Do not open any files without being certain of what they are!Pre-scan downloaded files for viruses and malware at one of these multi-engine single file scan sites.  Both use a dozen or more well-known anti-malware scanners in a quick, easy scan with a report of results from all.– Virus Total (10mb limit):  https://www.virustotal.com/en/
    — Jotti’s Malware Scan (15mb limit):  http://virusscan.jotti.org/en

5.  Avoid questionable web sites!

  • Many disreputable sites will attempt to install malware on your system through “drive-by” exploits just by visiting the site in your browser. Lyrics sites, free software sites (especially ones that target young children), cracked software sites, and pornography sites are some of the worst offenders.
  • Most of these drive-by attempts will be thwarted if you keep your Windows updated and your internet browser secured (see below). Nevertheless, it is very important only to visit web sites that are trustworthy and reputable.
  • In addition, never give out personal information of any sort online or click “OK” to a pop-up unless it is signed by a reputable company and you know what it is!
  • For more general information see the first section, “Educate yourself and be smart about where you visit and what you click on”, in this tutorial by Grinler of BleepingComputer.

Must-Have Software

*NOTE*: Please only run one anti-virus and one anti-spyware program (in resident mode) and one firewall on your system. Running more than one of these at a time can cause system crashes and/or conflicts with each other.

6.  Antivirus

  • An Anti-Virus product is a necessity. There are many excellent programs that you can purchase. However, we choose to advocate the use of free programs whenever possible.The following antivirus software programs are free for personal use.
    — avast! 5 Home Edition
    — Avira AntiVir PersonalEdition Classic
    — Microsoft Security Essentials (Windows Defender on Windows 8 versions)
  • Please run only one antivirus resident at a time!
  • It is recommended to set your antivirus to receive automatic updates so you are always as fully protected as possible from the newest threats.

7.  Internet Browser

Many malware infections install themselves by exploiting security holes in the Internet browser that you use.

Internet Explorer — If your operating system is Windows 7 of Windows 8 versions, you should be using Internet Explorer 11.  Windows Vista systems should be updated to Internet Explorer 9.

Mozilla Firefox — In addition to updating to the most recent version, install NoScript and only allow JavaScript, Java, Flash and other plugins to be executed only on trusted websites of your choice.

8.  Firewall

  • It is critical that you use a firewall to protect your computer from hackers.  The built-in Windows Vista, Windows 7 and Windows 8 versions firewall blocks both incoming and outbound, but is still written to the registry.Since most malware accesses the registry and can disable the Windows firewall, you may prefer to install a third party firewall. Following are a couple of the available firewall programs that are free for personal use.
    — Online Armor Free
    — Privatefirewall
  • Please only use one firewall at a time!

Other Cleaning / Protection Software

Of the below-listed programs, passive protection like that provided by WinPatrol and Hosts file programs, can be used with active resident protection programs effectively. Using right anti-malware can also help.


Only scan with one program at a time should be run with a shutdown/restart between scans.

9.  HOSTS File Programs

  • MVPS HOSTS — This little program packs a powerful punch as it blocks ads, banners, 3rd party Cookies, 3rd party page counters, web bugs, and many hijackers.  For information on how to download and install, please read this tutorial by WinHelp2002.
  • hpHosts — hpHosts is a community managed and maintained hosts file that allows an additional layer of protection against access to ad, tracking and malicious websites.  The inclusion policy can be found at http://hosts-file.net/?s=policy

10.   WinPatrol

  • The Host-based Intrusion Prevention System(HIPS) of WinPatrol takes a snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge.
  • WinPatrol will allow you to lock your HOSTS file and will monitor changes.
  • Win Patrol is a powerful system monitor.

11.   Anti-Malware

  • Malicious activities is on the rise, choose the right anti-malware to protect your pc or a regularly scan the pc if any suspicion.

 


Safe and Happy computing from CompleTechSupport!!

 

Leave a comment