logo

The Global Domain Name (url) Families.com is currently available for acquisition. Please contact by phone at 805-627-1955 or Email for Details

Which Antivirus software should I use? – Introduction

Which antivirus software should I use? Aren’t they all the same? Why should I pay for antivirus software? Over the past few weeks, we have discussed some of the security threats that loom outside our computers in cyberspace. Today, we’re going to start a blog series that reviews some of the more popular antivirus software on the market. My goal is that after reading these reviews you will be better informed as to which antivirus software is right for you. If you only take away one thing from this series, I hope it is the understanding that everyone needs some type of antivirus security software—even if your computer is not connected to the Internet.

Viruses

Virus is a broad term for a type of program that attaches itself to other programs or documents inside your computer. This is usually done without your knowledge or consent. Viruses are often attached to shareware and freeware programs, which aren’t always subject to standards that brand-name software is. Similar to viruses inside the human body, computer viruses can spread to different parts of your computer as well as transfer themselves to other computers (through the Internet, disks, email attachments, instant messenger). When infected programs and documents are run or opened, viruses are activated. Once activated viruses attach themselves to other programs and documents and may even perform actions on your computer. Some virus actions are relatively harmless and do nothing more than junk up your system with unwanted files. More deadly virus actions include corrupting and deleting important files, damaging system files so your computer won’t work, or even erasing your hard disk so you lose everything on your computer.

Important antivirus software terms
Let’s start out by familiarizing ourselves with some of the terms associated with antivirus software.

Quarantine – When files are infected with viruses, they often are quarantined, or isolated from the rest of your computer. Once in the quarantine, infected files should pose no threat to your computer. You can choose to try and repair or delete infected files in the quarantine, as well as repair the effects of what the viruses did to your computer.

Worm – Worms are types of viruses that replicate themselves in hope of spreading to other computers. Worms usually reside inside other files such as a word processing document (e.g., Word, Word Perfect) or spreadsheet file (e.g., Excel, Lotus 123).

Trojan horse – Trojan horses are programs that look like something you may want on your computer, but actually do harmful things to your computer. Trojan horses usually are downloaded from the Internet and advertise themselves as helpful software. Unfortunately, they often are not so helpful and actually may damage files and hardware on your computer. Trojan horses don’t spread or replicate themselves like viruses and worms.

A Trojan horse is a harmless-looking program designed to trick you into thinking it is something you want, but which performs harmful acts when it runs. It is typically received through downloads from the Internet. Trojan horses do not spread by themselves like viruses and worms. Most virus protection programs only detect a limited number of Trojan horses. A good way to help protect your computer from Trojan horses is to visit only Web sites you trust, and avoid downloading things unless you trust the source as well.

Downloader – Downloaders are a type of viruses that once activated will begin downloading unwanted software from the Internet. Usually, the unwanted software contains additional viruses or some type of adware and spyware.

Adware – Adware is software designed to create pop-up ads on your computer. This is done by collecting personal information from your computer and transmitting it to another computer through the Internet. Then tailor-made ads are sent to your computer based on the information collected about you.

Spyware – Spyware programs are similar to adware in that personal information is collected about you. Spyware, however, collects things such as passwords and bank account numbers and doesn’t always just use collected information to send ads. Rather, information collected can be used to steal your identity, hijack your computer, or deplete your bank accounts.

Antivirus software

Now that you are more familiar with some of the common terms used with antivirus software, you are ready to begin thinking about which product is best for you. Over the next few days I will be reviewing various antivirus programs, including a few free ones.

This entry was posted in Computer Security by Adam West. Bookmark the permalink.

About Adam West

Adam is avid computer and electronics hobbyist. He and his young family call central Texas home. His love of the application of multimedia and electronics has lead him to Families.com, where he writes for the Computers, Internet, and Electronics blog. He understands the importance of providing understandable, relevant information about computers and electronics to Familes.com readers.On another front, Adam holds a Master of Science in Social Work degree and researches reasons for commitment and commitment-related decisions in dating and romantic relationships. He and his colleagues have developed an online educational tool for educating individuals about commitment-related decisions.