WHAT IS EMAIL BOMBARDMENT?
![Image](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjMTnUj593h9kyrMrKLZp-x1ys0qjWUKVwRFApo676yrtYgm5KuUraxhusJTmoXwM0ZOenNe-si_wrEDdSmShb9nHXD8EvUBzclNZnOQsjxAnm0vQEwO6jukPYlP93FsZadtl32IKJ5Ez0/w400-h184/EMAIL+BOMBARDMENT.jpg)
Any user who has used a PC for some time knows that computer viruses are one of the worst things that can happen to them, since the minimum contact with them exposes us to data loss, identity theft and many other problems, which will not only get us to waste our time trying to solve the problems that come with them, but also to lose a good amount of money in the process.
How
to Detect and Remove a Trojan Virus
Today, viruses are a true nightmare for any Internet user.
Among them, the so-called Trojans are the most frequent. Its name comes from
the mythological Trojan horse, which seemed to be a gift to Troy but hid within
it a Greek army that attacked the city and dominated it.
In computing, Trojans refer to programs that appear to be
useful software, but actually compromise security and can damage your computer.
Trojans spread when users open a program that they believe has a legitimate
origin but is not.
Some
Signs That Our Computer Is Infected By A Trojan:
§ Let
the computer restart itself
§ That
the system works very slowly
§ That
the operating system does not start
§ Some
files have disappeared
§ Windows
with advertisements or pornography being opened
Some
Tips to Keep Viruses Away From Your Computer
§ Do not
open the attachments that come with the email, unless you are absolutely sure
that they are not infected. Even emails from people you know can contain
viruses, so be vigilant.
§ Stay
away from dubious content websites.
§ Be
careful when you download things using P2P (Peer to Peer) file sharing programs.
Always scan downloaded files before opening them.
§ Keeps
Microsoft Windows updated through Windows Update.
§ Keep
your antivirus
updated and do periodic scans.
§ Install
a Firewall (or Firewall in Spanish). The Firewall is a security device that works
across networks, allowing or denying transmissions from one network to another.
§ Do not
install any program unless you know who its manufacturer is. When in doubt,
Google the name of the program.
§ Change
Internet Explorer for another more secure browser such as Google Chrome or
Mozilla Firefox
Comments
Post a Comment