Is your computer really protected?
There are many different types of antivirus software out there, some better than others. Some are free, some are not.
When it comes to buying protection for your digital devices it is not as simple as going into a shop and purchasing the first product that catches your eye, there is a lot to consider before purchasing an antivirus.
Some of these questions are:
Is it going to protect me at all, if so against what?
What type of protection is this product offering?
How many computer resources does it need to run?
Does it have good reviews from current users?
Does it update regularly?
To narrow things down one of the first things you need to consider “is it going to protect me from every type of infection out there”
*E-mail scanning: protection against infected E-mails.
*Anty-spam: Blocking spam, phishing emails
*Download protection: protection from infected files.
*Spyware, adware and malware: block any unwanted program that will give you popup adverts etc…
*Scans in real time and quick scan : is a good feature if you don’t have much time, quick scan can give you some peace of mind (not as good as a full scan)
*Compatibility: to be compatible with my operating system, tablet or phone.
*Web browsing protection: information about a particular website ( malicious or safe)
*Secures my identity: keeping personal information encrypted.
*Firewall: to stop hackers from getting into your computer.
*Resources: background process, the more processes the slower the computer will run.
Do your research on the net, what other people are using and why, ratings and so on.
Some Classes of malicious software are:
Viruses: A computer virus is a type of malware that propagates by inserting a copy of itself into and becoming part of another program.
worms: Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage, worms are standalone software and do not require a host program or human help to propagate.
Trojans: It is a harmful piece of software that looks legitimate.
Bots: is an automated process that interacts with other network services. Bots often automate tasks and provide information or services that would otherwise be conducted by a human being
back door: A back door is an undocumented way of accessing a system, bypassing the normal authentication mechanisms
exploit: An exploit is a piece of software, a command, or a methodology that attacks a particular security vulnerability
I hope this gives you a little more insight when you purchase you’re next.
Stay safe
Gian.