26.12.2014 Views

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

Absolute PC Security and Privacy.pdf

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

program files from the Internet, don’t open e-mail attachments, <strong>and</strong> don’t accept program files<br />

from other computer users, you lower your risk of infection. If you engage in any or all of<br />

these activities, you increase your risk.<br />

Detecting a File Infector Virus<br />

The easiest way to detect a file infector virus is through file size. Since these viruses insert<br />

themselves into the code of the host file, comparing the current size of the host file against a<br />

historical file size will alert you to any potential infection. You typically do this by comparing<br />

the current version of the file against a version made during an earlier backup operation. If an<br />

executable file suddenly increases in size—even by just a few bits—something had to cause<br />

the change in file size, <strong>and</strong> that something was probably a file infector virus.<br />

Antivirus programs also have other ways to identify file infector viruses. Some of these<br />

programs search the source code looking for telltale text strings contained within the more<br />

common viruses. Other programs monitor access to executable files; EXE <strong>and</strong> COM files<br />

typically are read-only, so any writing done to any of these programs is suspicious behavior.<br />

How to Remove a File Infector Virus<br />

If an executable file is infected by a well-written file infector virus, it’s fairly easy to separate<br />

the virus code from the original program code. When the virus code is extracted, the original<br />

file is restored to a pristine state. A poorly written virus, however, can damage the host file<br />

during infection, making it harder to restore the file to its original condition.<br />

The procedure to remove a file infector virus is as follows:<br />

1. Turn off your computer.<br />

2. Boot your computer from an uninfected, write-protected, bootable floppy disk.<br />

3. Use a floppy-based version of your antivirus program to scan <strong>and</strong> clean the files on<br />

your hard disk.<br />

4. Remove the floppy <strong>and</strong> reboot your machine as normal, from the hard disk.<br />

To be safe, you can perform a second scan with the full version of your antivirus program<br />

after you’ve rebooted from your hard disk.<br />

How to Protect Against a File Infector Attack<br />

You can protect against file infector viruses by not downloading or transferring executable<br />

files to your computer—<strong>and</strong> not running any of these files you may have previously<br />

downloaded. File infector viruses don’t activate until the host program is run, so as long as<br />

you don’t open any infected programs, your system is relatively safe from infection.<br />

It also helps to run a regular scan of your system with an antivirus software program. In<br />

particular, the antivirus program should search for known file infector viruses, <strong>and</strong> compare<br />

the size of your program files to the size of the program’s backup copies.<br />

Summing Up

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!