{"id":107,"date":"2014-12-02T08:55:20","date_gmt":"2014-12-02T13:55:20","guid":{"rendered":"http:\/\/townehouse.net\/?p=107"},"modified":"2014-12-02T07:49:59","modified_gmt":"2014-12-02T12:49:59","slug":"are-you-using-protection","status":"publish","type":"post","link":"https:\/\/townehouse.net\/?p=107","title":{"rendered":"Are You Using Protection?"},"content":{"rendered":"<p><a href=\"https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2014\/12\/cartoon-images-computer-virussick-cartoon-speckled-computer-with-a-virus-1071-by-ron-leishman-b3ffaxgu.jpg\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"108\" data-permalink=\"https:\/\/townehouse.net\/?attachment_id=108\" data-orig-file=\"https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2014\/12\/cartoon-images-computer-virussick-cartoon-speckled-computer-with-a-virus-1071-by-ron-leishman-b3ffaxgu.jpg?fit=145%2C150&amp;ssl=1\" data-orig-size=\"145,150\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"cartoon-images-computer-virussick-cartoon-speckled-computer-with-a-virus&amp;#8211;1071-by-ron-leishman-b3ffaxgu\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2014\/12\/cartoon-images-computer-virussick-cartoon-speckled-computer-with-a-virus-1071-by-ron-leishman-b3ffaxgu.jpg?fit=145%2C150&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2014\/12\/cartoon-images-computer-virussick-cartoon-speckled-computer-with-a-virus-1071-by-ron-leishman-b3ffaxgu.jpg?fit=145%2C150&amp;ssl=1\" class=\"alignleft size-full wp-image-108\" src=\"https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2014\/12\/cartoon-images-computer-virussick-cartoon-speckled-computer-with-a-virus-1071-by-ron-leishman-b3ffaxgu.jpg?resize=145%2C150\" alt=\"cartoon-images-computer-virussick-cartoon-speckled-computer-with-a-virus--1071-by-ron-leishman-b3ffaxgu\" width=\"145\" height=\"150\" \/><\/a>Computer viruses have been around almost as long as computers. Computer viruses numbered in the one hundreds in the early 1990&#8217;s are now numbering over one million. So the question is, are you susceptible to a computer virus? Is your tablet susceptible? Is your smart-phone susceptible? The answer to all these questions is yes. The only difference is the degree of susceptibility. And that degree is a moving target. Today you you are\u00a0\u00a0relatively safe using your <a title=\"IPAD\" href=\"https:\/\/www.apple.com\/ipad\/\" target=\"_blank\">IPAD<\/a> or <a title=\"IPHONE\" href=\"https:\/\/www.apple.com\/iphone\/\" target=\"_blank\">IPHONE<\/a>. However, as the popularity of the device continues to grow, the hacks may suddenly become interested in attacking the various IOS devices such as <a title=\"IPAD\" href=\"https:\/\/www.apple.com\/ipad\/\" target=\"_blank\">IPAD<\/a> and <a title=\"IPHONE\" href=\"https:\/\/www.apple.com\/iphone\/\" target=\"_blank\">IPHONE<\/a>. At present, the most lucrative target is Window&#8217;s based devices. This is because Windows is, and has been since the beginning of the digital age, been distributed amongst the largest user base. In simple terms, as a virus writer, you will get more bang for your buck attacking windows based systems. At least for now.<\/p>\n<p><!--more--><\/p>\n<p>What exactly is a computer virus and what are the types of virus that I need to worry about? A computer virus is a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. Computer viruses come in various shapes and sizes. The most common forms of computer viruses are:<\/p>\n<ul>\n<li><strong>Trojan Horse<\/strong> \u2013 is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk.<\/li>\n<li><strong>Worm<\/strong> &#8211; A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a most computer virus, it does not need to attach itself to an existing program.<\/li>\n<li><strong>Malware<\/strong> \u2013 software that is intended to damage or disable computers and computer systems. The term is short for malicious software.<\/li>\n<li><strong>Spyware<\/strong> \u2013 software that enables a user to obtain covert information about another\u2019s computer activities by transmitting data covertly from their hard drive.<\/li>\n<li><strong>Ransomware<\/strong> &#8211; a type of malicious software designed to block access to a computer system until a sum of money is paid.<\/li>\n<li><strong>Adware<\/strong> \u2013 a software that automatically displays or downloads advertising material (often unwanted) when a user is online. This is considered a type of virus because it can install to your device without your permission, is difficult to remove, and can have a detrimental effect on the performance of the infected device.<\/li>\n<li><strong>Rootkit<\/strong> &#8211; a set of software tools that enable an unauthorized user to gain control of a computer system without being detected.<\/li>\n<\/ul>\n<p>Computer virus are spread when the virus copies itself from one location or computer to another. The most common forms today are through email attachments, infected or malicious websites, within an application, such as a browser add-on, and media devices such as portable hard drives, USB sticks, etc.<br \/>\nSo, are you using protection against computer virus? Are you sure? Often an individual will purchase a new computer and it will come with a trial subscription to one of the popular anti-virus PROGRAMS, such as <a href=\"http:\/\/www.mcafee.com\/us\/\" target=\"_blank\">McAfee&#8217;s <\/a>or <a href=\"http:\/\/www.symantec.com\/endpoint-protection\/\" target=\"_blank\">Symantec<\/a>. These programs are subscription based. This means that the software will continue to reside on your computer, but unless you pay for a subscription, the software will not be updated with current virus definition files. Since new viruses are being written all the time, it is important that your anti-virus software be kept up to date. The \u201cbig boys\u201d in the game, such as <a href=\"http:\/\/www.mcafee.com\/us\/\" target=\"_blank\">McAfee<\/a>, <a href=\"http:\/\/www.symantec.com\/endpoint-protection\/\" target=\"_blank\">Symantec<\/a>, and <a href=\"http:\/\/www.trendmicro.com\/us\/home\/\" target=\"_blank\">Trend-Micro<\/a> require a paid for subscriptions but thee are a number of free anti-virus software as well. <a href=\"http:\/\/www.microsoft.com\/en-us\/default.aspx\" target=\"_blank\">Microsoft <\/a>has a free anti-virus software called <a href=\"http:\/\/windows.microsoft.com\/en-US\/windows\/security-essentials-download\" target=\"_blank\">Microsoft Security Essentials. <\/a>Windows 7 users can download and install it for free. Windows 8 includes it as part of the operating system. It never hurts to supplement your anti-virus program with a target specific software such as <a href=\"https:\/\/www.malwarebytes.org\/bf2\/\" target=\"_blank\">MalWareBytes <\/a>or <a href=\"http:\/\/www.lavasoft.com\/index_ac.php?utm_expid=5078582-18.eSsVy__uRoOiST8Z15n7-w.1&amp;utm_referrer=https%3A%2F%2Fwww.google.com%2F\" target=\"_blank\">Adaware<\/a>.<\/p>\n<p>No matter what you decide, decide to do something. Running your computer with outdated virus definitions is the same as having no protection at all. Additionally, if you are still using an outdated operating system, such as Windows XP or earlier, you are a disaster waiting to happen. If you have been doing any of the above, then you are probably already infected. Sometimes obtaining current anti-virus software and scanning is all you need to do. Other times, it may prove simpler to reinstall Windows and start from scratch. But when you start from scratch, install anti-virus and keep it up to date. One other warning, do not trust any website that offers to scan your computer for free. If you think about it, the only way a website can truly scan your computer for a virus is if that website has full access to your system, something you do not want to happen.<\/p>\n<p>I have seen some programs whereby it is recommended that you turnoff your anti-virus software when installing. It doesn&#8217;t say much for the software writers if this is a requirement. However, if you feel you must, then I recommend you only do this with software that is installed locally, and not installed over the web. While installing, and while your computer is unprotected, you should unplug your computer&#8217;s network cable or disconnect from the Wi-Fi network. Keep it unplugged until the software is completely installed and your anti-virus software is functional again. But before you do that, think how badly you need any software that the anti-virus software tags as a virus during install.<\/p>\n<p>I hope you have found this information useful. If you have any questions or seek additional clarity on this topic, feel free to use the comment form below or send a private comment via the<a title=\"Feedback\" href=\"http:\/\/townehouse.net\/?page_id=26\" target=\"_blank\"> feedback form.<\/a> Thanks for reading Townehouse Technologies and please consider liking, sharing, and subscribing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer viruses have been around almost as long as computers. Computer viruses numbered in the one hundreds in the early 1990&#8217;s are now numbering over one million. So the question is, are you susceptible to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":108,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_daextrevo_audio_file_creation_date":"","_daextrevo_text_to_speech":"","_daextrevo_document_type":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9],"tags":[],"class_list":["post-107","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2014\/12\/cartoon-images-computer-virussick-cartoon-speckled-computer-with-a-virus-1071-by-ron-leishman-b3ffaxgu.jpg?fit=145%2C150&ssl=1","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":104,"url":"https:\/\/townehouse.net\/?p=104","url_meta":{"origin":107,"position":0},"title":"Bits and Bytes and More","author":"Tom Lind","date":"November 25, 2014","format":false,"excerpt":"If you have used your computer or smart phone or tablet for any time you may have noticed the use of such terms as kb or mb. What does it all mean, how important is it, and should I be afraid. For the most part, it is not all that\u2026","rel":"","context":"In &quot;Tech Tips&quot;","block_context":{"text":"Tech Tips","link":"https:\/\/townehouse.net\/?cat=7"},"img":{"alt_text":"j247373","src":"https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2014\/11\/j247373.gif?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":849,"url":"https:\/\/townehouse.net\/?p=849","url_meta":{"origin":107,"position":1},"title":"Are You Ready?","author":"Tom Lind","date":"March 8, 2014","format":false,"excerpt":"This blog article is being presented as a public service to anyone who is still using Windows XP on their computer. If you are one of those persons (and there are many) please do your self a favor and read the rest of this article. Windows XP will soon be\u2026","rel":"","context":"In &quot;Technical&quot;","block_context":{"text":"Technical","link":"https:\/\/townehouse.net\/?cat=25"},"img":{"alt_text":"dumpxp","src":"https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2014\/03\/dumpxp-150x150.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":36,"url":"https:\/\/townehouse.net\/?p=36","url_meta":{"origin":107,"position":2},"title":"Do It In The Cloud","author":"Tom Lind","date":"August 17, 2017","format":false,"excerpt":"We have all been hearing about \"the cloud\". Some have wondered just what in the cloud means? One person\u2019s attempt to describe the cloud was \"A cloud is that fluffy white thing floating in the sky!\". Although this is a nice image to put in your head, it is not\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/townehouse.net\/?cat=2"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2013\/08\/What-is-cloud-computing.png?fit=744%2C555&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2013\/08\/What-is-cloud-computing.png?fit=744%2C555&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2013\/08\/What-is-cloud-computing.png?fit=744%2C555&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2013\/08\/What-is-cloud-computing.png?fit=744%2C555&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":46,"url":"https:\/\/townehouse.net\/?p=46","url_meta":{"origin":107,"position":3},"title":"Have A Mint!","author":"Tom Lind","date":"September 2, 2013","format":false,"excerpt":"Today I want to make a recommendation that will help release you from the chains of Windows. I want to suggest that your try Linux. For those who do not know, Linux is an alternate operating system that can be used in lieu of Windows. Why would I want to\u2026","rel":"","context":"In &quot;Computers&quot;","block_context":{"text":"Computers","link":"https:\/\/townehouse.net\/?cat=3"},"img":{"alt_text":"download","src":"https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2013\/09\/download-150x150.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":73,"url":"https:\/\/townehouse.net\/?p=73","url_meta":{"origin":107,"position":4},"title":"Get Free Software","author":"Tom Lind","date":"October 21, 2014","format":false,"excerpt":"So, you have your new windows 8 computer and are ready to start being\u00a0productive. The problem is, you pretty much broke the bank buying the computer with all the cool bells and whistles that there is little left in your budget to buy software. Now you want to start being\u00a0productive\u2026","rel":"","context":"In &quot;Software&quot;","block_context":{"text":"Software","link":"https:\/\/townehouse.net\/?cat=9"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2014\/10\/man-free-sign.jpg?fit=650%2C720&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2014\/10\/man-free-sign.jpg?fit=650%2C720&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2014\/10\/man-free-sign.jpg?fit=650%2C720&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":134,"url":"https:\/\/townehouse.net\/?p=134","url_meta":{"origin":107,"position":5},"title":"May I Offer You A Mint?","author":"Tom Lind","date":"November 20, 2010","format":false,"excerpt":"Today I want to make a recommendation that will help release you from the chains of Windows. I want to suggest that your try Linux. For those who do not know, Linux is an alternate operating system that can be used in lieu of Windows. Why would I want to\u2026","rel":"","context":"In &quot;Technical&quot;","block_context":{"text":"Technical","link":"https:\/\/townehouse.net\/?cat=25"},"img":{"alt_text":"Linux_Mint_12_On_ASUS_Eee_PC","src":"https:\/\/i0.wp.com\/townehouse.net\/wp-content\/uploads\/2010\/11\/Linux_Mint_12_On_ASUS_Eee_PC-150x150.png?resize=350%2C200","width":350,"height":200},"classes":[]}],"jetpack_shortlink":"https:\/\/wp.me\/p38YRh-1J","_links":{"self":[{"href":"https:\/\/townehouse.net\/index.php?rest_route=\/wp\/v2\/posts\/107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/townehouse.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/townehouse.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/townehouse.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/townehouse.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=107"}],"version-history":[{"count":0,"href":"https:\/\/townehouse.net\/index.php?rest_route=\/wp\/v2\/posts\/107\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/townehouse.net\/index.php?rest_route=\/wp\/v2\/media\/108"}],"wp:attachment":[{"href":"https:\/\/townehouse.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/townehouse.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/townehouse.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}