Computer Viruses For Dummies

Front Cover
John Wiley & Sons, May 9, 2011 - Computers - 288 pages
Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail.

Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you:

  • Understand the risks and analyze your PC’s current condition
  • Select, install, and configure antivirus software
  • Scan your computer and e-mail
  • Rid your computer of viruses it’s already caught
  • Update antivirus software and install security patches
  • Use firewalls and spyware blockers
  • Protect handheld PDAs from viruses
  • Adopt safe computing practices, especially with e-mail and when you’re surfing the Net

Written by Peter H. Gregory, coauthor of CISSP For Dummies and Security + For Dummies, Computer Viruses For Dummies goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best program(s) for your needs.

Remember, if you don’t protect your computer, not only do you risk having your computer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book! This guide will help you properly immunize your PC with antivirus software now and install updates and security patches that are like booster shots to keep your software protected against new viruses.

 

Selected pages

Contents

Title
Evaluating Your Virus Situation
Does My Computer Have a Virus?
Does Your Computer Have Antivirus Software?
Deploying Your Antivirus Defenses
Obtaining and Installing Antivirus Software
Configuring Antivirus Software
Scanning Your Computer and EMail
Installing Security Patches
Using Firewalls and Spyware Blockers
Protecting PDAs from Viruses
Incorporating Safe Computing Practices
Looking at Viruses under the Microscope
Trojan Horses Worms Spam and Hoaxes
How Viruses Function and Propagate
The Part of Tens

Ridding Your Computer of Viruses
Maintaining Your Vigilance
Ten Antivirus Programs

Other editions - View all

Common terms and phrases

About the author (2011)

Peter Gregory, CISSP, CISA, has spent 20 years developing technology solutions for those who aren t technologically oriented. He is an information security strategist for a wireless telecommunications carrier.

Bibliographic information