Today computers are not only used as ancillary tools in our lives, but as an effective means of obtaining and distributing information. Computing is present today in all fields of modern life, greatly facilitating our performance, systematizing tasks that we previously performed manually.
This computer spread has not only brought us advantages but also problems of great importance in the security of information systems in businesses, homes, government, in short, in all aspects related to society. And among the problems are computer viruses whose purpose is to cause harm to the computer user. They can cause minor disorders such as the appearance of on-screen messages up to the formatting of your computer’s hard drives, and effectively this may be one of the biggest damage a virus can do to a computer.
Some viruses are simply annoying, but most are destructive and are designed to infect and take control of your device. A virus can spread across computers or networks by making copies of itself, just as a biological virus is transmitted from person to person.
What is a computer virus?
It is a general term that includes many different types of viruses, delivery mechanisms and impacts. As for their exact operation, computer viruses can be divided into two categories: those that start infecting and replicating as soon as they reach the computer and those that remain inactive, waiting for you to activate them by clicking or running a program that reached them by mail or on a removable storage medium running inadvertently.
How are computer viruses spread?
Computer viruses can spread over the Internet through various infection mechanisms. Viruses can reach your computer in the following ways:
Email, the favorite method of cybercriminals, can carry harmful attachments (in the form of executable files like .EXE or .ZIP) and malicious links, or even contain an infection directly in the body of the message, in the form of HTML.
Hackers can hide viruses in applications, in documents sent through file-sharing services, in add-ons, and almost anywhere you can think of where there are files to download.
Viruses can be spread via SMS or messaging services like Facebook Messenger, WhatsApp and Instagram.
If you haven’t updated applications or the operating system in a while, you’re almost certain to experience vulnerabilities that cybercriminals can exploit to sneak viruses into you.
There may be viruses hidden in online advertisements like “banners” ads. Malvertising is very insidious because criminals can hide their malicious code even on legitimate and trusted websites.
What is a computer antivirus?
Computer antivirus is a piece of application software that aims to detect and remove computer viruses from a computerized system. That is, it is a program that seeks to remedy the damage caused by these invasive forms of software, whose presence in the system is not usually detectable until its symptoms, such as biological viruses, are evident.
During the 1980s, with the emergence of digital information exchange technologies such as floppy disks and later the Internet, it became possible to successively contact numerous computers. This led to the emergence of computer viruses, and then spyware, malware and other forms of harmful software that enter without the user’s consent to the machine and cause various types of damage: a configure key sequences, delete personal files, hijack private information, etc.
Classification of antivirus
Standalone antivirus software
Standalone antivirus software is a specialized tool, designed to detect and eliminate certain viruses. It is commonly referred to as portable antivirus software because it can also be installed on a USB and administrators can use them to perform emergency scans of an infected system.
Security software packages
As indicated in the title, security software packages are more than antivirus programs. In addition to being able to detect and remove viruses, they are also equipped to fight all other malware and provide absolute protection at all times for your computer and files.
Cloud antivirus software
Cloud Anti-Virus Software is a new type of antivirus technology that scans your files in the cloud rather than on your computer. In order to free up your computational resources and enable faster response. These programs are usually composed of two parts; the client that is installed on your computer and performs periodic virus and malware scanners, without taking up too much memory and the web service that processes the data collected by the client and inspects it for virus and malware matching from its database.
Techniques used by antivirus
The main purpose of antivirus is to detect and remove malware programs from your computer. As the first step is to detect, there are some techniques for that.
Detection techniques included:
Signature verification technique
Signature Verification determines the characteristics that a file leads to whether or not it is considered malware. It is verifies features such as: file size, sequence of binary statements, among others. When a file is recognized as malware, it receives its own identity, with its respective signature. These signatures determine each malware that is part of the antivirus definition list.
Heuristic Verification Technique
Heuristic Verification is the ability of an antivirus to detect malware, without possessing a vaccine specific to it. That is, the idea of heuristics is to anticipate the discovery of malware. There are anti-spam software that work with the same philosophy. The big problem with this type of detection method is the possibility of generating a very high number of false positives. False positives are files that possess some features that may make it look like malware, although in reality they are not.
Behavioral Blocking Technique
Behavior Blocking is the technique that analyzes the actions executed by the programs (suspicious actions), in order to identify possible attempts at invasions or infections. In accordance with the actions performed by some software, it may be considered a malware and not allowed to run it.
How to fight viruses?
Some of the tasks that we can perform to combat computer viruses are: regularly perform backups, defragment the hard drive periodically, try to use original software, use the anti-virus options of the computer BIOS, keep antivirus programs up to date and finally have a list with your computer’s settings, including the parameters of all cards, disks and other devices.
How to set reminders with a sound notification in Google Keep
On account of the changes made to notices in Android in the course of recent years, increasingly more fast usefulness has been added to assist with saving time and exertion. It seems as though that has extended as you can set updates inside Google Keep from warnings.
At the point when you get a notice that contains data that your framework considers being outstanding — for example, purchase milk — you’ll get a Google Keep “Set update” trigger inside the message notification. It’s significant that this appears to possibly seem when select informing applications are utilized.
In the wake of tapping a warning, your gadget will open Google Keep where you can set an update with pre-populated data. As a result of the linkage between Google Keep, Google Assistant, and Calendar, you’ll see an update in every one of the three places at the same time.
A few messages seem to give you the choice yet others with just somewhat unique phrasing eliminate the capacity to set and update.
Messages like “remember x” or “kindly purchase x” appear to give actuate the Set update trigger for Google Keep/Tasks that piece all the more reliably. It doesn’t look like the choices are showing up inside the stock Google application either — which appears to be somewhat odd yet is normal of these new highlights.
It’s not satisfactory why the capacity to set updates from select application warnings is showing up on mainstream outsider informing applications and not Google’s own Messages. The component could be connected to the new security fix, a Google Play Services beta, or even Device Personalization Services — the last of which is liable for keen activities inside warnings.
Instructions to set an update on Android by means of Google Keep