Remember Tom and Jerry game and their relationship referred to in the discussion of Hackers and anti-virus software. Companies create software, hackers find weaknesses of that software to take advantage, software companies fix the weaknesses, hackers find other weaknesses or new weaknesses. Like that the game continues….
Use Anti-Virus: Anti-Virus software is used to prevent, detect, and remove Computer Virus (Such as worm, Trojan horses, spyware and adware). Although Antivirus software can impair a computer's performance, it’s always good to use antivirus to prevent any such malicious actions.
Do keep your Internet browser and operating system up-to-date with the latest security patches and updates.
Most Recommended Anti-Virus list:
Turn On or Install a Firewall: Always keep inbuilt firewalls switched on.
Download and Install only Trusted Software: Always remember to download and install software that you trust, which is from a reliable source, and keep it up to date. No software is perfect. To address these issues computer companies release patches to their software to address these problems or to improve their product.
Be cautious with File Sharing Software: Peer to Peer (P2P) software that connects individual users to each other directly without need for a central point of management. Some file-sharing programs may install malware that monitors a user’s computer use and then sends that data to third parties. Make sure your security software and firewall are running whenever your computer is connected to the Internet. And before you open or play any downloaded files, scan them with your security software to become aware of malware or viruses.
Delete Unknown Emails: Many viruses arrive as executable files that are harmless until you start running them. If you have any doubts after reading the senders name and the subject of the email from unknown sources, never download or open attachments unless you are sure it’s from someone you know.
Always scan your removable storage devices before accessing it: Run a virus scan on your removable storage devices like USB/Flash drive, External Hard Drives etc. After scanning, if you want to copy the data to your PC, don't copy whole directories. The virus could potentially be one of these hidden files. Copy files manually, one by one. Always format your removable devices instead of just manually deleting all.
Secure Your Wireless Network: Secure your wireless router or access point administration interface. Don't broadcast your SSID.Enable WPA encryption instead of WEP. Unless you absolutely need remote administration, it's always best to keep it turned off.
Use a Complex Password for Login: Use a strong password, such as a combination of letters and numbers of 10 characters or more. Never send bank passwords, credit card numbers, confidential e-mail, or other sensitive data unless you are sure that you are on a secure site( URLmust begins with https).
Create separate user accounts. If more than one person uses your computer, consider setting up separate user accounts, in addition to the administrator’s account, and give those user accounts only limited rights. Also use a password to protect your firewall and security software so no one else can disable them or grant themselves rights that you don’t want them to have on your machine.
Back up sensitive documents. Back up files that you would want to keep if your computer crashes. Store them on DVDs, or removable drives that you keep in a safe place.