26.12.2014 Views

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

It would be irresponsible to deny that the threat of viruses exists. It does. But the fact remains<br />

that most computer users don’t get infected by most viruses. Which means you should be<br />

cautious about contracting a virus, but not paranoid about it.<br />

You see, while you can engage in totally safe computing, the reduction of risk probably isn’t<br />

worth the functionality you’d have to give up. As with all things in life, you have to make<br />

some compromises in order to realize any benefits—<strong>and</strong> the benefits of personal computing<br />

require you to accept some level of risk.<br />

This concept isn’t unique to computing. For example, suppose you use a credit card at a<br />

restaurant. To realize the benefit of using the charge card (not having to carry cash around,<br />

not having to pay for thirty days, etc.), you have to accept a degree of risk. You have to accept<br />

that the waiter could steal your card, or write down your card number <strong>and</strong> use it later. You<br />

have to accept that a bum or a thief could go through the restaurant’s trash <strong>and</strong> obtain your<br />

card number. You have to accept that your credit card company may be using your personal<br />

information in some very disturbing ways. But nearly all of us accept those risks, because the<br />

benefits of using the charge card make for an acceptable compromise.<br />

It’s the same thing with computers <strong>and</strong> viruses. You accept some risk of infection in order to<br />

realize all the benefits of using your computer. Yes, you could receive a virus attached to an<br />

e-mail message, but it’s worth the risk in order to receive e-mail from your friends <strong>and</strong> family.<br />

Yes, you could inadvertently download a virus-infected file from the Internet, but it’s worth<br />

the risk in order to download all those MP3 files to play on your <strong>PC</strong>. Yes, you could open a<br />

Word file that contains a macro virus, but it’s worth the risk in order to collaborate on all<br />

those reports <strong>and</strong> memos with your teammates at work.<br />

So be cautious, but don’t overdo it. Being smart is better than being paranoid—<strong>and</strong> much<br />

better than actually contracting a virus.<br />

Summing Up<br />

Most viruses spread when an infected program or document is opened. You run the risk of<br />

infection whenever you copy or download unknown files to your computer, by any number of<br />

methods—sharing floppy disks, downloading files from the Internet, opening e-mail<br />

attachments, <strong>and</strong> so on.<br />

You can protect your system against virus infection by avoiding contact with other computers.<br />

That means not downloading files, or opening e-mail, or surfing the Web. More practically,<br />

you can engage in all these activities with only moderate risk by taking the appropriate<br />

precautions—chief of which is rejecting any files sent to you from untrusted sources. Even<br />

then, you only risk infection if you actually open the file.<br />

Starting with the next chapter, we’ll examine specific types of viruses—how they work, <strong>and</strong><br />

how to deal with them. In Chapter 3 you’ll learn about two of the earliest types of malicious<br />

programs—boot sector <strong>and</strong> file infector viruses.<br />

Chapter 3: Boot Sector <strong>and</strong> File Infector<br />

Viruses

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!