What types of files can be damaged striker?
An attacker can insert malicious code into each file, including common file types that you would normally consider to be safe. These files can be created with documents word processing files, spreadsheets or image. After damaging the file, an attacker may be distributed or published on a website by email. Depending on the type of malicious code, you can use your computer by infecting simply open the file.
If corrupt files that attackers often exploit vulnerabilities they find the file in the software used to create or open. These vulnerabilities can be used forward and execute scripts or malicious code, and they are not always recognized. Sometimes weakness consists of a combination of certain files (e.g., software running on a particular operating system) or only in certain versions of a software program.
What problems can cause harmful files?
There are different types of malware, including viruses, worms and Trojan horses The range of consequences, however, varies within these categories. Malicious code can be designed to perform one or more functions, including
To treat interfere with the ability of information from your computer by consuming memory or bandwidth (the computer is much slower or "freeze")
Install, modify or delete files on your computer
give access to your computer striker
with the computer to attack other computers (see Understanding Denial of Service for more information)
How can you protect yourself?
Operate and maintain anti-virus software
anti-virus software can often detect and protect your computer against most known viruses, so you might be able to detect and remove the virus before it cause damage (see anti virus software for more information). Since the attacker constantly writing new viruses, it is important to keep the definitions up to date.
Be careful with attachments of email
Do not open attachments you were not expecting, especially if they are people you do not know. If you decide to open an attachment email, first virus scanner (see Using Caution attachments for more information). Not only is it sending an infected file without knowing the attackers "parody" of the original e-mail, but your legitimate contacts. If your email program automatically downloads and opens attachments, check the settings to see if you can disable this feature.
Be careful when downloading, visit web pages
Avoid downloading files from sites you do not trust. If you found the files in a safe place for the so-called site certificate (see Web Site Certificates for more information). If you make a file from a website, you must save it to your computer and manually scan for viruses before opening it.
Put your software up to date - Install software patches so that attackers do not use problems or vulnerabilities (Understanding Patches for more information) known. Many operating systems offer automatic updates. If this option is available, you must activate it.
Use security settings
Check the security settings of your email client and web browser.
Enter the highest level of security you still gives the functionality you need.