Cleaning Viruses from Your Computer
Authors: Vic Laurie, Ewing SeniorNet Computer Learning Center, April 2005
Revised: Joel May, Ewing SeniorNet Computer Literacy Center, October, 2007/2009, Steven Kieley January 2013
-
A False Sense of Security
- AOL and the National Cyber Security Alliance Study (Fall, 2006)
- Surveyed 829 computer users
- 85% were running antivirus software
- 71% of them thought they were updating their protection at least weekly, but barely 50% actually were
- 19% of them had infected computers
- 80% had some form of spyware on their computers
- Only 32% were running a firewall
- 74% of those with wireless networks were running them unencrypted
- But they were newbies, right?
- No. On average they had been online for nearly 7 years
- 42% described themselves as intermediate or expert users
- These are your friends, your neighbors, your co-workers - and you!
-
What are We Talking About?
- "Malware"
- A Virus is a piece of code or program that typically attaches itself to some known or trusted program on your system and is executed when the trusted program runs. See Vic Laurie's Viruses and worms
- A Worm is a program or piece of code attached to a trusted program that tries to copy itself over the network and imbed itself into other unsuspecting user’s systems. See Vic Laurie's Viruses and worms
- A Trojan horse is a program that allows a cracker a back way into your system. It has usually been planted in an innocuous place that may be hard to find. See Vic Laurie's Trojan horses and crackers
- Adware is a program that pops up ads on your computer screen. The people who put this programs on your computer get paid every time you click on an ad. See Vic Laurie's Spyware and adware
- Spyware is an analysis and tracking program that has been placed on your computer without your knowledge. It reports your activities to advertising providers' web sites for storage and analysis. The advertising providers often sell this information to others. Certain types can also record every keystroke from your keyboard (including password, bank account number, etc.) and give others access to the information. See Vic Laurie's Spyware and adware
-
Where Do They Come From?
- Viruses, Worms and Trojan Horses
- Definition: "Cracker" A person who breaks into a computer system without authorization, whose purpose is to do damage (destroy files, plant viruses, etc.)
- Crackers create virus code as a hobby; just to show that they can do it. They seldom benefit personally from the activity
- They embed the code in an e-mail attachment or a file designed to be downloaded from the Internet.
- If you open the attachment or execute the downloaded file, your system can (will?) become infected.
- Crackers may also directly infiltrate your computer system through an unprotected port and either install malware or even manipulate your system directly
- Spyware
- Spyware is most commonly found embedded in pop-ups on a web page.
- When you visit the pop-up, the spyware is automatically downloaded to your computer (much like a cookie).
- There is no way to tell, in advance, which web pages contain spyware.
- Spyware can also sneak into your machine if you use file-sharing services such as Kazaa, Morpheus or Grokster.
-
What Can They Do to You?
- Viruses and Worms
- Hijack your e-mail address book and send messages containing and (potentially) spreading the virus to people whose names are there.
- Cause your system to function erratically (reboot frequently, cause programs to open or close without your intervention, etc.)
- Lurk in your system until a certain date and then become active.
- At worst, erase your hard drive (very uncommon)
- Trojan Horses
- Surreptitiously use your computer for purposes such as relaying activity from another computer out to the Internet
- May also damage or even delete files
- Spyware
- Send any information about you that is contained in your computer to the advertising provider:
- Name
- Address
- Web Sites Visited
- Products Purchased
- Etc.
- And, by logging your keystrokes, they can accumulate information on
- Social Security Numbers
- Credit Card Numbers
- Bank Account Numbers
- Etc.
- In other words, Identity Theft.
- Hijack your home page, add sites to your Favorites list, launch unwanted browser windows
-
How Do They Get Into the Computer?
- Not using and regularly updating an anti-virus program
- Not using and regularly updating at least one anti-spyware program
- Not using at least one firewall
- Maintaining unsafe program configurations
- Failure to put security settings in Outlook Express and Internet Explorer
- Failure to download security patches
- Carelessness in computer use
- Not reading carefully every grey notification box that appears on the screen
- Clicking on links, e-mail attachments or filenames without thinking first
- Leaving the computer open to crackers
-
What Can You Do About Them?
- You Need Seven Things (all discussed in detail below):
- A Firewall (or two)
- An Anti-virus Utility
- A Spyware Detector (or three)
- Current System Updates
- Appropriate System Configuration
- Vigilance
- Common Sense
- Security Suites
- Security suites are software programs that provide all, or nearly all the tools you need to keep your computer safe.
- PC publications routinely evaluate products such as:
- BitDefender Total Security
- CA Tech’s Internet Security
- Kaspersky Internet Security
- Norton Internet Security
- Panda Internet Security
- Norton was recently ranked highest by just a fraction over BitDefender
- The problem with security suites is that typically they are strong in one or more areas, but weak in others and their relative positions vary from one year to the next.
-
Firewalls
- Unwary or careless computer users can leave their systems open to any one on the Internet who wants to come in
- The Internet is a two-way highway
- Any computer connected to the Internet is assigned a unique address called an "IP" (Internet Protocol)
- When you click on a link, your browser broadcasts
- Your IP address
- Your browser type
- The location of the last site you visited
- Other information
- Anyone "listening" can access this information
- Your computer has many doorways, called "ports," for receiving information from the Internet
- Poorly protected computers may leave some of these ports open to unauthorized visitors
- Crackers use computer programs to look for these open doors by probing thousands of IP addresses
- A Firewall creates a barrier between your computer and the outside world
- There are two kinds
- Hardware (often built into routers used on networks)
- If you don’t have a personal network at home, you probably don’t have a hardware firewall
- Hardware firewalls work in only one direction: they can block unwanted incoming probes, but they cannot block your computer from sending information to the Internet without your knowledge or against your will
- Software
- Windows XP Service Pack 2 automatically installs a “one-way” firewall on your computer, blocking all incoming data unless instructed otherwise. It alone, however, provides inadequate protection
- Windows Vista has a two-way firewall which blocks all incoming data unless otherwise instructed and permits all out-going data unless otherwise instructed, also inadequate for many "non-techie" users
- Firewall software is included in many of the security suites
- Trend Micro ($50.00)
- Norton ($70.00)
- McAfee ($60.00)
- And there are some perfectly capable, but free, firewalls
- Zone Alarm
- Outpost
- Comodo
- A firewall worth its name provides a "wall" around your computer
- If a program on your computer wants to access the Internet (or if a site on the Internet wants to access your computer), the firewall asks your permission to perform the action
- You can grant permission for one-time only
- You can grant permanent permission
- You can refuse permission for one-time only
- You can refuse permission permanently
- If a remote computer seeks to access yours, the firewall will notify you and ask if you want to allow the access
- In other words, no information gets into or out of your computer without your express permission
- You can test to see how well your firewall is working at https://grc.com/x/ne.dll?bh0bkyd2
- The Vigilance Dimension: Be sure the firewall software is running. It will usually display an icon in your system tray (at the bottom right of your screen)
- The Common Sense Dimension: When the firewall utility notifies you that there is unexpected activity (either in-coming or out-going)
- Carefully read the message on the screen
- If the access requested is something you want to have happen, approve it
- If you don’t want the proposed activity to occur or you don’t understand the message, don’t let the activity continue
-
Anti-Virus Utilities
- Some of the most popular are:
- Norton Antivirus ($40.00)
- McAfee ViruScan ($40.00)
- Kaspersky Anti-Virus ($50.00)
- AVG 8.0 (free)
- Microsoft Security Essentials (free)
- These typically provide for free updating of the virus definitions for one year following purchase
- After that, you must renew your subscription or buy a new edition of the software
- Up-to-Date virus definitions
- These are like dictionaries of viruses
- If a new virus has been released since the last edition of the dictionary, it will not be recognized by your anti-virus software
- Thus, it is important to keep the definitions up to date
- The software can be configured to do this automatically on a pre-determined schedule, or you can do it manually
- The Anti-Virus software is typically (by default) set to scan all of your files and all incoming e-mail constantly.
- If it detects a virus, it will offer to delete the file containing it or to quarantine it
- Try deleting first.
- If that doesn’t work, try quarantining (this instructs the software to attempt to put a barrier between the virus code and the rest of your computer so that the computer cannot be further infected.
- Since most viruses enter your computer via e-mail attachments, some specific precautions are in order
- Understand and read file extensions. These are the two, three or four letter combinations following the filename and a period
- If you don’t see them on your computer you should make them visible
- In Windows 98 click on My Computer > View > Folder Options > View then find “Hide File Extensions for Known File Types” and uncheck it by clicking on it
- In Windows 2000 and Windows XP click on My Computer > Tools > Folder Options > View then find “Hide File Extensions for Known File Types” and uncheck it by clicking on it
- In Vista and Windows 7, click on Start>Control Panel>Folder Options>View then follow the steps for Windows XP
- In Windows 8 from the Charms Bar, Click on Search> Control Panel and follow the steps for Windows 7
- You should avoid opening e-mail attachments with the following file extensions (unless you are certain they are virus-free)
- .EXE .BAT .PIF .SCR .VBS .VBE .JS .JSE .WSH WSF .REG .SHS .DOC .XLS
- E-mail attachments with the following file extensions are safe to open
- .JPG .GIF .AVI .MPG .WAV .TXT .HTM .HTML .PDF
- The Vigilance Dimension
- Be sure that your anti-virus software is configured properly
- Running full-time in the background
- Automatically checking all incoming files and e-mail
- Automatically updating the virus definition dictionary AT LEAST WEEKLY,
- preferably whenever a new version is available
- The Common Sense Dimension
- Viruses always come from outside your computer, either by
- An infected e-mail (most common)
- An infected file (sometimes)
- An incursion by a cracker (rarely)
- Thus, you should be extremely careful and continually aware of the traffic between your computer and the outside world (e-mail and web browsing)
- Never open a file or an e-mail attachment unless you are ABSOLUTELY SURE it does not contain a virus (run the virus check before opening it)
-
Spyware Prevention
- There is really very little you can do to prevent your computer from being infected with spyware
- Practice safe browsing
- Use real-time spyware blockers (only partially effective)
- Free file-sharing programs (Kazaa, Grokster, Morpheus) are notorious carriers
- Many spyware programs are hidden in pop-up ads. Block them
- Using Windows XP SP-2
- Using the Google toolbar
- Any of a number of pop-up blockers
- Or use a (free) browser other than Internet Explorer which has built-in pop-up protection
- Firefox
- Opera
- Spyware Detectors
- Ad-Aware (free)
- Spybot Search and Destroy (donation)
- Windows Defender (free)
- ** Spyware Doctor ($30.00 per year)
- McAfee Antispyware ($30.00 per year)
- Norton Internet Security ($70.00) ** Highest Rated by PC Magazine
- Malwarebytes (free)
- Superantispyware (free)
- Up-to-Date Spyware definitions
- As with Anti-Virus software, theses programs can only detect spyware that they know about
- So it is important to keep the definition files up-to-date AT LEAST WEEKLY
- Deletion or Quarantine
- When a spyware program is discovered, try deleting it first. If this is not possible, try to quarantine it.
- Sometimes it is not possible.
- Some spyware programs embed themselves so deeply in your computer (files and registry) that none of the anti-spyware programs can remove them
- Or the program reports that they are removed, but when you reboot, they reappear
- Key-loggers are the most notorious in this respect
- If this happens to you, you can try CWShredder
- The Vigilance Dimension
- Most spyware detection programs, especially the free ones, cannot be configured to update their definition files automatically. You must do it on your own AT LEAST WEEKLY
- Some cannot be configured to run in the background so you must run them yourself on a regular basis
- The Common Sense Dimension
- Be aware of where you are surfing
-
Current System Updates
- Use Windows Update
- Microsoft regularly makes available software updates to the Windows operating system designed to repair or block security leaks
- You can configure your computer to download these updates automatically
- Open the Control Panel and choose System
- Click on the Automatic Updates tab and choose one of the three options
- Automatic (Recommended) – this causes any available updates to be downloaded and installed on your computer automatically
- >Download Updates for me, but let me choose when to install them
- Notify me, but don’t automatically download and install them
- Or you can perform the updates manually at http://windowsupdate.microsoft.com/
- If you use Microsoft Office, you should also check for Office Updates (http://office.microsoft.com/officeupdate/)
-
Appropriate System Configuration
- Set up Windows to display file extensions (see IV(D)9 above)
- Configure Outlook, Outlook Express and other e-mail clients to maximize security
- For Outlook and Outlook Express, follow these steps
- For other e-mail clients and AOL, check the help files for similar instructions
- Configure Internet Explorer following the instructions found here
- If you are using a different browser (Firefox, Opera, Mozilla) you don’t have to concern yourself with these settings (yet!)
-
Other Defenses
- Never open questionable e-mail attachments
- Never open e-mail attachments received from someone you know without checking for viruses first
- Never open e-mail attachments received from someone you don’t know under ANY circumstances
- Don’t give your e-mail address to anyone you don’t want to hear from again
- Use a false e-mail address when registering on web sites
- If you must give an e-mail address (e.g. to confirm a registration or order) use a temporary address such as those available from Spam Gourmet
- Don’t ever unsubscribe from spam
- Use a spam filter. Many ISPs provide spam-blocking services, but they are notorious for being too arbitrary (e.g. blocking requested information on breast cancer)
- Legislation has been proposed (and adopted in CA and UT) which uses a sort of "caller-ID" approach, requiring spammers to give their true addresses
- There are many software programs available for blocking spam at the level of the individual user
- Black-lists (create a list of addresses you don’t want to hear from and lets through addresses not on the list)
- White-lists ( create a list of addresses you do want to hear from and block all addresses not on the list)
- Challenge/Response (creates both a black-list and a white-list. When an e-mail from an address not on either list arrives, a "challenge" e-mail is returned to the sender. If he/he responds, the e-mail is passed through and the address is added to the white-list)
- Beyesian (uses a probability theory approach to analyze the address, subject and content of a message in order to classify it as good or not. Learns from experience)
- Anti-Spam software
- Spam Inspector ($20.00)
- Spam Eater ($24.95)
- CA Antispyware ($49.95)
- ChoiceMail One ($39.95)
- Spam Bully ($29.95)
- A unique approach is to view and sort out the spam before the e-mail even gets to your computer with Mailwasher ($37.00)
- A Word about Identify Theft (Phishing)
- Phishing is a high-tech scam that uses spam or pop-up messages to deceive you into disclosing your credit card numbers, bank account information, Social Security number, passwords, or other sensitive information.
- The FTC, the nation’s consumer protection agency, suggests the following to help you avoid getting hooked by a phishing scam
- If you get an email or pop-up message that asks for personal or financial information, do not reply or click on the link in the message.
- Remember that AOL, eBay, your bank or credit card company and other web sites related to your money will NEVER send out requests for passwords, PINs, or other sensitive information via e-mail
- If you are concerned about your account, contact the organization in the email using a telephone number you know to be genuine, or open a new Internet browser session and type in the company’s correct Web address.
- Don’t email personal or financial information. Email is not a secure method of transmitting personal information.
- If you initiate a transaction and want to provide your personal or financial information through an organization’s Web site, look for indicators that the site is secure, like a lock icon on the browser’s status bar or a URL for a website that begins "https:" (the "s" stands for "secure"). Unfortunately, no indicator is foolproof; some phishers have forged security icons.
- Review credit card and bank account statements as soon as you receive them to determine whether there are any unauthorized charges.
- If your statement is late by more than a couple of days, call your credit card company or bank to confirm your billing address and account balances.
- Report suspicious activity to the FTC. If you get spam that is phishing for information, forward it to .
- If you believe you’ve been scammed, file your complaint at http://www.ftc.gov/.
While the people retain their virtue and vigilance, no agent, by any extreme of wickedness or folly, can very seriously injure.
- Abraham Lincoln