How to Properly Scan Your Computer for Malware

Views:
 
Category: Entertainment
     
 

Presentation Description

How to Properly Scan Your Computer for Malware

Comments

Presentation Transcript

How to properly scan your computer for malware :

How to properly scan your computer for malware

Introduction:

Introduction Desktop virtualization is a transformative platform technology that can deliver cost-effective, manageable network and desktop access to workers with diverse computing needs. Problems with Standard Antivirus Protection The VMware Solution to Antivirus Protection Vmware vshield endpoint architecture in brief Antivirus protection for the entire virtual desktop infrastructure

Problems with standard antivirus protection -:

Problems with standard antivirus protection - The typical top-down virus scanning model involves agents executing on every desktop performing antivirus scanning and signature file updates, with access to an auto-update server. During these operations, it is not uncommon for system resource usage to spike or become overly committed. Performance in the desktop environment is severely impacted by these “antivirus storms.”

The vmware solution to antivirus protection - :

The vmware solution to antivirus protection - Vmware vshield™ endpoint is the solution to the problems inherent in antivirus scanning in a large-scale virtual desktop implementation. In a horizon view environment, vshield endpoint consolidates and offloads all antivirus operations into one centralized security virtual appliance (SVA). Vmware recommends the following partners who have integrated their antivirus solutions with vshield endpoint: 1. Bitdefender 2. Kaspersky 3. Mcafee 4. Sourcefire 5. S ymantec 6. Trend micro

Vmware vshield endpoint architecture in brief - :

Vmware vshield endpoint architecture in brief - Vmware vshield endpoint is integrated with vsphere and protects virtual machines against viruses. Administrators can centrally manage vmware vshield endpoint through the included vshield manager console, which integrates with vmware vcenter™ server for unified security management in the virtual datacenter. Each virtual machine to be protected requires only a small-footprint vshield endpoint driver, which is part of the vmware tools installation for the virtual machine.

Antivirus protection for the entire virtual desktop infrastructure -:

Antivirus protection for the entire virtual desktop infrastructure - The vshield endpoint solution from vmware partners provides complete protection for virtual machines running in a production horizon view environment. For storage and other servers connected to the virtual desktop infrastructure, vmware recommends a complementary solution from a vmware antivirus software partner. The following sections provide best practices for managing antivirus protection for these three components—the virtual machines, the security server, and storage. In a horizon view environment, you have three focal points for antivirus protection: - 1. virtual machines 2. view security server 3. storage

Articles for virus countermeasures -:

Articles for virus countermeasures - 1. Vaccine software - Those who are using antivirus software must perform scan using the latest virus-scanning engine and virus definition files. Day by day, new viruses are detected one after another; even though some of them may look exactly the same as existing viruses, they are in fact subspaces of a specific virus. So the antivirus software should be kept updated so it can properly deal with such new viruses. Click here to install webroot setup http ://webroot.com--safe.com

Articles for virus countermeasures -:

Articles for virus countermeasures - 2. Email attachment files - Computer viruses are often contained in email attachments. Even if the email is from your close friend, scan the attached files for viruses before opening them. The number of incidents caused by emails containing forged sender information is increasing. In order to protect your computer from such emails, you must also be careful with emails from unknown sources and forged service providers.

2. Email attachment files -:

2. Email attachment files -

2. Email attachment files -:

2. Email attachment files -

Articles for virus countermeasures -:

Articles for virus countermeasures - 3. Downloaded files - various files such as image files, music files and video files can be downloaded from the internet, but there is a possibility of a malicious program or instruction code being embedded in those files. To avoid this, be sure to scan downloaded files before using them.

3. Downloaded files -:

3. Downloaded files -

Articles for virus countermeasures -:

Articles for virus countermeasures - 4. For applications - when using mailer software to send or receive emails, or a web browser to access web sites on the internet, utilize the security functions/ settings supplied with the application software.

Articles for virus countermeasures -:

Articles for virus countermeasures - 5. Security patches - recent viruses exploit vulnerabilities in the operating systems and application software. If there is any vulnerability, your computer can be infected with viruses only by previewing emails or accessing the internet. For example, vulnerability in mailer software allowing the automatic execution of attachment files can be exploited by viruses, which can cause a broader damage. Such vulnerabilities are detected at short intervals, so it is important to periodically visit the vender's web site and check for any related information on the application

Articles for virus countermeasures -:

Articles for virus countermeasures - 6 . Symptoms of virus infection - if you have encountered symptoms listed below, you computer may have been infected with computer viruses. Do not overlook them and scan your computer for viruses.

6 . symptoms of virus infection -:

6 . symptoms of virus infection - System or application software often gets hosed (freezes), or the system does not start. F iles disappear. Unknown files exist. Strange icons appear on the task bar. A ttempts are made to access the internet without any operation. E mails are sent without the user’s consent. C an intuitively sense that there is something wrong with the computer.

Articles for virus countermeasures -:

Articles for virus countermeasures - 7. In case of emergency - data corrupted by viruses cannot be restored by using antivirus software. Make it a rule to back up data on a regular basis so you can restore the system from any damage caused by virus infection. In addition, keep in a safe place the original CD-ROMs of application software. Should the contents of the hard drive be damaged, you can restore them using the CD-ROMs.

7. In case of emergency -:

7. In case of emergency -

Articles for virus countermeasures -:

Articles for virus countermeasures - 8. Should your computer be infected with a virus - scan your computer for viruses using the latest virus definition files. If you have been able to identify the name of the virus but do not know how to eliminate it, visit the web site of your antivirus software manufacture and look for information related to the virus, and then follow the instructions presented on the web page. If you have no antivirus software at hand but can access the internet, you can still use free-online scan services provided by some venders to identify the name of the virus. If identified, look for the information on the virus and follow the instructions presented on that web page.

authorStream Live Help