AT modern world where it is difficult to do without the Internet, which has become part of Everyday life for most people, and home and office computers store a huge part of the user's confidential information, we become the targets of attacks by intruders. How to protect your computer necessary minimum installed security software and rules of user behavior, is a means of countering illegal actions from outside.

If you do not take any steps to protect your device and confidential data, consider that by this action or inaction you voluntarily open all possible loopholes for malware and hackers who can not only steal this data, but also damage your computer. The latter may consist not only in the infection of the operating system itself with viruses, but also in the incapacitation of expensive PC components.

Although viruses and malware there are different types, one thing is for sure, you won't want them inside your operating system. To counter this, Windows users 10 there are many tools to fight all kinds of malware.

As many people know, most of these security tools are already built into the OS by default. Additionally, you need to know that protecting your computer and your personal files is not only about installing security applications, but also in combination with knowing how to avoid potential threats.

COMPUTER PROTECTION

Let's take a closer look at the issue of securing a computer, laptop or tablet, as well as protecting the user's confidential data. Our tips will help you minimize the possibility of infiltrating your PC with almost all types of malware, including viruses, ransomware, spyware, adware. software etc.

UPDATE WINDOWS 10

Updating the Windows 10 operating system and related software is the most important step you need to take to keep your device and data safe. Microsoft periodically releases packages to fix potential vulnerabilities that could be exploited by hackers.

With default settings, updates are downloaded and installed automatically, under certain conditions and within a certain period of time. Even in this case, it will not be superfluous to make sure that all the necessary patches are installed on your system. To do this, in the "Parameters" of the OS in the "Update and security" section, you must click on the "Check for updates" button.

In addition, it is important to periodically check and install updates for any software you have installed. Apps downloaded from the Windows Store will be updated automatically as soon as a new version is available. And about classic desktop programs, in most cases, you need to take care of the user himself. Always check the official software website to download and update them.

Next, decide on the relevance of the OS itself. Even if a computer is running one version, it does not necessarily mean that it is running the latest one. The new operating system was introduced in 2015, and since then the corporation has released several big updates. Added new features, improved performance and significantly improved security.

To find out which version is running on your PC in this moment, use a combination Win keys+ R on the keyboard and "winver" in the input field that appears. Version 1709 is the latest version at the time of this writing.

WINDOWS DEFENDER

Use an antivirus, which is a required component on every computer. Help detect and remove malware before it can compromise your files, affect performance, or crash your device.

Windows Defender Defender, included in the System Security Center by default, offers excellent real-time computer protection. If you want even more protection, you can level it up. This built-in solution should be more than enough for most users. However, there are many third-party security solutions that you can use. Some of them are free and some are not. You can also add a popular solution called "Malwarebytes" as a second layer of protection.

ACCESS TO CONTROLLED FOLDERS

Ransomware is another type of malware that can lock your device by encrypting all your files and require you to pay a certain amount to unlock it. Starting with the Fall Creators Update, Windows 10 includes a feature known as Controlled Folder Access. It not only prevents capture, but also blocks unwanted changes to your files.

FIREWALL

Firewall - blocks access to your computer from the Internet and local network. You will find many third-party tools that provide network security protection, but the new tenth version of the OS already includes a very effective firewall.

To make sure it works correctly, find it there in the "Security Center" and make sure that each network connection is labeled "Firewall Enabled". Enable it otherwise.

PROVEN PROGRAMS

By all means, avoid downloading and installing apps from unknown sources, always try to download software from official websites. A great solution is to install apps from the Microsoft Store that are already verified by Microsoft. To increase your security level, enable the non-store installation prevention feature using the SmartScreen filter settings.

BACKUP

One of the best ways to keep your files safe is to regularly backup. You should always think about making at least 2 backups. One can be saved to a removable drive, and the other in the cloud storage.

If you're using Windows 10, you don't need to get third party program for backup, as you can use the built-in tool. Alternatively, if you don't have a lot of files, you can copy your documents to a USB stick regularly.

Online backup is probably one of the best ways. The best option is to create account in OneDrive or . In their functionality, you can use the version history of files.

NETWORK SECURITY

The best tool to protect your computer and data is yourself. As a rule, a computer can be infected with viruses and data is compromised as a result of the user clicking on an unverified link in an email or on a website pop-up window, or installing an application (game) from an untrusted source.

Use only modern web browsers such as Google Chrome, Microsoft Edge and Mozilla Firefox. They are always up to date, have great built-in security, alert you to a potential problem, and filter out unsafe websites. If you get a warning, don't try to find a way around it, there's probably a good reason for it.

If any type of malware does infiltrate operating system, the first thing to do is disconnect your computer from the network by unplugging the Ethernet cable or turning off the router. Then open Antivirus and do a full scan hard disk. Remove detected malware.

There are also many other ways in which you can return the OS to working condition. But, before that, it is necessary to establish the cause of the failure or infection, and only then eliminate the consequences. In the absence of the necessary technical knowledge and experience, entrust this matter to a specialist.

Our other computer tips are listed in . We recommend that you familiarize yourself with them.

Antivirus must be installed on every Windows PC. For a long time this was considered the golden rule, but today IT security experts argue about the effectiveness of security software. Critics argue that antiviruses do not always protect, and sometimes even vice versa - due to careless implementation, they can create security holes in the system. The developers of such solutions counter this opinion with impressive numbers of blocked attacks, and marketing departments continue to assure the comprehensive protection that their products provide.

The truth lies somewhere in the middle. Antiviruses do not work flawlessly, but all of them cannot be called useless. They warn of many threats, but they are not enough to protect Windows as much as possible. For you as a user, this means the following: you can either throw the antivirus in the trash, or blindly trust it. But one way or another, it is just one of the blocks (albeit a large one) in the security strategy. We will supply you with nine more such "bricks".

Security Threat: Antiviruses

> What the critics are saying The current virus scanner controversy has been fueled by former Firefox developer Robert O'Callahan. He claims that antiviruses threaten the security of Windows and should be removed. The only exception is Microsoft's Windows Defender.

> What developers say Antivirus creators, including Kaspersky Lab, impressive figures are given as an argument. So, in 2016, software from this laboratory registered and prevented about 760 million Internet attacks on users' computers.

> What CHIP thinks Antiviruses should not be considered a relic or a panacea. They're just bricks in the security building. We recommend using compact antiviruses. But don't worry too much: Windows Defender is fine. You can even use simple third party scanners.

1 Choose the right antivirus

We, as before, are convinced that Windows is unthinkable without anti-virus protection. You only need to choose the right product. For Windows 10 users, it can even be the built-in Windows Defender. Despite the fact that during our tests it showed not the best degree of recognition, it is perfectly and, most importantly, without any problems for security, built into the system. In addition, Microsoft has improved its product in the Creators Update for Windows 10 and made it easier to manage.

Anti-virus packages from other developers often have a higher degree of recognition than Defender. We advocate a compact solution. The leader of our rating at the moment is Kaspersky Internet Security 2017. Those who can refuse such additional options as parental control and password manager should turn their attention to more a budget option from Kaspersky Lab.

2 Follow updates

If only one measure had to be chosen to keep Windows secure, we would definitely choose updates. In this case, of course, we are talking primarily about updates for Windows, but not only. Installed software, including Office, Firefox, and iTunes, should also be updated regularly. On Windows, getting system updates is relatively easy. Both in the "seven" and in the "ten" patches are installed automatically at the default settings.

In the case of programs, the situation is more difficult, since not all of them are as easy to update as Firefox and Chrome, which have a built-in automatic update function. The SUMo (Software Update Monitor) utility will support you in this task and notify you when updates are available. The sister program DUMo (Driver Update Monitor) will do the same job for drivers. Both free assistants, however, only inform you about new versions - you will have to download and install them yourself.

3 Set up firewall


The built-in firewall in Windows does a good job and reliably blocks all incoming requests. However, it is capable of more - its potential is not limited to the default configuration: all installed programs have the right to open ports in the firewall without asking. Free utility Windows Firewall Control will put more features in your hands.

Run it and in the "Profiles" menu, set the filter to "Medium Filtering". Thanks to this, the firewall will also control outgoing traffic according to a given set of rules. What measures will be included there, you set yourself. To do this, in the lower left corner of the program screen, click on the note icon. So you can view the rules and, with one click, grant permission to a particular program or block it.

4 Use special protection


Updates, antivirus and firewall - you have already taken care of this great trinity of security measures. Now is the time fine tuning. The problem with additional programs for Windows often lies in the fact that they do not use all the offered protective functions systems. An exploit tool such as EMET (Enhanced Mitigation Experience Toolkit) further enhances installed software. To do this, click on "Use Recommended Settings" and let the program run automatically.

5 Strengthen Encryption


You can significantly enhance the protection of personal data by encrypting it. Even if your information falls into the wrong hands, a hacker will not be able to remove good coding, at least not immediately. Professional versions of Windows already have the BitLocker utility configured through the Control Panel.

VeraCrypt will become an alternative for all users. This program with open source is the unofficial successor to TrueCrypt, which was discontinued a couple of years ago. If it is only about protecting personal information, you can create an encrypted container through the "Create Volume" item. Select the "Create an encrypted file container" option and follow the wizard's instructions. Access to a ready-made data safe is carried out through Windows Explorer, like a regular disk.

6 Protect user accounts


Many vulnerabilities remain unexploited by hackers only because the work on the computer is carried out under a standard account with limited rights. So for everyday tasks you should also set up such an account. In Windows 7, this is done through the Control Panel and the Add or Remove User Accounts item. In the "ten" click on "Settings" and "Accounts", and then select "Family and other people".

7 Activate VPN when away from home


Home in wireless network your level of security is high, because only you control who has access to the local network, and are also responsible for encryption and access codes. Everything is different in the case of hotspots, for example,
in hotels. Here, Wi-Fi is distributed among outsiders, and you are not able to exert any influence on the security of network access. For protection, we recommend using a VPN (Virtual Private Network). If you just need to browse sites through a hotspot, the built-in VPN will suffice. latest version Opera browser. Install the browser and in "Settings" click on "Security". In the "VPN" section, check the box for "Enable VPN".

8 Cut off unused wireless connections


Even the details can decide the outcome of a situation. If you are not using connections such as Wi-Fi and Bluetooth, simply turn them off and thus close potential loopholes. In Windows 10, the easiest way to do this is through the Action Center. "Seven" offers for this purpose the "Network Connections" section on the Control Panel.

9 Manage passwords


Each password must be used only once and must contain special characters, numbers, uppercase and lowercase letters. And also be as long as possible - ten or more characters is best. The concept of password security has reached its limits today because users have too much to remember. Therefore, where possible, such protection should be replaced by other methods. Take Windows sign-in as an example: if you have a Windows Hello-enabled camera, use facial recognition to sign in. For other codes, we recommend that you turn to password managers such as KeePass, which should be protected with a strong master password.

10 Protect privacy in the browser

There are many ways to protect your privacy online. For Firefox, the Privacy Settings extension is ideal. Install it and set it to "Full Privacy". After that, the browser will not give out any information about your behavior on the Internet.

Lifebuoy: backup

> Backups are essential
themselves not only after contracting the virus. It also proved to be excellent in case of problems with the hardware. Our advice: make a copy of the entire Windows once, and then additionally and regularly backup all important data.

> Full archiving of Windows Windows 10 inherited from the "seven" module "Archive and restore". With it, you will create a backup copy of the system. You can also use special utilities, for example, true image or Macrium Reflect.

> True Image File Protection and the paid version of Macrium Reflect can make copies of certain files and folders. Free alternative for archiving important information will become Personal Backup.

PHOTO: manufacturing companies; NicoElNino/Fotolia.com

Undoubtedly, one of the most important programs on a computer is an antivirus. Even one "accidentally" virus on a PC can make work unbearable! In addition, it's "good" if the virus just shows ads, but there are viruses that can destroy dozens of files on a disk (which may have been worked on for more than one month).

About 10-15 years ago, the number of antiviruses was relatively small and the choice was limited to some dozen. Now there are hundreds of them!

In this article I want to focus on the most popular today (in my opinion). I think that for many this information will be useful for cleaning and protecting their home PCs. And so let's get started...

Keys for antiviruses at affordable prices below market prices you can buy at …

10 best antivirus programs to protect your computer

Malwarebytes Anti-Malware

Malwarebytes Anti-Malware is not quite the antivirus that most users are used to. This program (in my opinion) is more suitable as an addition to the main antivirus, but nevertheless, it will help to do one important job!

Malwarebytes 3.0 is equipped with a number of specialized modules:

  • Anti-Malware
  • Ransomware Protection
  • Exploit Protection
  • Malicious website protection

Most antiviruses are bad (at least for now) at finding and removing various adware that are often embedded in browsers (for example). Because of this, various advertising windows, teasers, banners (sometimes from adult sites), etc. begin to appear. Malwarebytes Anti-Malware will quickly and easily clean your PC from such “garbage”.

Features of Malwarebytes Free (free version)

  • Ability to scan all drives for a complete system check.
  • Signature database updated daily to protect against the latest malware.
  • Intelligent heuristic detection of even the most persistent threats without significant impact on system resources.
  • Adding detected threats to Quarantine and the ability to restore them at a convenient time.
  • Black list of exclusions for scanning and protection modules.
  • List of additional utilities for manual malware removal (Malwarebytes Anti-Rootkit, Malwarebytes FileASSASSIN, StartupLite, Chameleon).
  • Malwarebytes Chameleon dynamic technology that allows Malwarebytes Anti-Malware to run when it is blocked by malware.
  • Multilingual support.
  • Integration into context menu to check files on demand.

Features of Malwarebytes Premium

Malwarebytes is free, but you can upgrade to a Premium version that provides protection in real mode time, scan and update on schedule.

  • Real-time protection works in conjunction with leading antivirus programs to make your computer more secure.
  • Real-time protection detects and blocks threats as they attempt to execute.
  • Real-time exploit protection: Eliminates zero-day exploits and malware vulnerabilities
  • Real-time ransomware protection: Prevents ransomware from encrypting your files.
  • Malicious website blocking prevents access to malicious and infected web resources.
  • The presence of the "Quick Scan" mode to check critical areas of the system - random access memory and startup objects.
  • Extra options. Customize Malwarebytes Premium Protection Behavior for Advanced Users.
  • Scheduled updates to automatically use the latest protection.
  • Scheduled scans for regular checks at your convenience.
  • Password protection of settings to prevent unauthorized changes to Malwarebytes Premium security components.

It should be borne in mind that not everything written will be available or work in the free version of the program. In order for the software to work at the proper level, you need to install the Premium version

Advanced SystemCare Ultimate

It seems to me that many users are often dissatisfied with one “quality” of most antiviruses - they slow down the computer ... So, in this regard, a very interesting product Advanced System Care Ultimate is an antivirus with built-in programs for optimizing, cleaning and speeding up Windows.

The antivirus, I must tell you, is quite reliable (BitDefender technologies are used) + the program's own algorithms. Protects PC from: spyware, Trojans, dangerous scripts, ensures safe work with payment systems on the Internet (relevant, especially recently with the development of Internet banks).

By the way, the program is compatible with many antiviruses (that is, it can be installed in addition to provide additional protection). Moreover, it will not greatly affect the speed and performance of your PC. We have described how to maximize speed and performance using Advanced SystemCare Ultimate.

Maximum protection and maximum performance

  • Protection against viruses, spyware, hackers, phishing, botnets, etc.
  • Online payment and banking security
  • Optimizes, cleans and fixes all PC problems in 1 click
  • Works fast, compatible with other antiviruses

New in IObit Malware Fighter

  • Added antivirus engine Bitdefender;
  • Improved IObit engine;
  • The database of signatures has been updated and significantly expanded;
  • Improved scanning speed by adapting the caching mechanism;
  • Minimized resource consumption during scanning and cleaning;
  • Improved real-time protection;
  • New quarantine method;
  • New simplified and convenient user interface;
  • Improved web protection;
  • Full support for Windows 10.

Main components of IObit Malware Fighter

Safety

Startup Protection
· Network protection
· File protection
Checking files in the cloud
・Cookie Protection
Browser ad blocker
Antivirus engine Bitdefender Pro
Process Protection Pro
USB drive protection Pro
Tracking malicious activities Pro

Browser protection

· Homepage Defender protects your homepage and search engine from malicious modification.
· DNS Protection: Prevent malware from modifying DNS system settings.
· Surf Protection: Block various online threats to ensure you surf the web safely.
· Browser protection from malicious plugins / toolbars.
· Anti-Spying: Auto-clean your browser data from malicious tracking as soon as it closes. Pro

One of the best bes paid antiviruses. Every year it is gaining more and more popularity. The advantages of antivirus are obvious:

  1. some of the best algorithms for searching and detecting viruses (even those that are not yet known to the antivirus and are not included in the update databases);
  2. support for all popular Windows operating systems (including Windows 10);
  3. low system requirements to a PC (works fast enough even on older machines);
  4. fully functional free version of the antivirus.

Main components of Avast Free Antivirus

(1) The component is available for an additional fee (1500 RUB/year)
(2) The component is available for an additional fee (from 650 rubles / year)

Version comparison

Functions / VersionsFreeProIS*Premier
Antivirus
Spy protection
Stream updates
Power Mode
cybercapture
Do Not Track, SiteCorrect
Phishing and malware protection
Safety home network
HTTPS scanning
Smart Scan
Passwords
SafeZone Browser
Software Updater**
Sandbox
SecureDNS
Antispam
Firewall
file shredder
Cleanup***
SecureLine VPN***

*IS- Internet version security.
** Software Updater is installed automatically in Premier, manually in other versions.
***Cleanup, SecureLine VPN - paid add-ons for all versions

New in Avast Free Antivirus Nitro Update

New features and technologies

New features: CyberCapture, SafeZone browser.

Improvements: Home network security, Antivirus and malware protection.

Key features of Avast Free Antivirus

New! cybercapture

This proprietary technology developed by AVAST Software allows you to automatically submit unknown files to the Avast Online Threat Lab. Potentially dangerous files are carefully checked by our analysts in real time, which eliminates the slightest risk of infection on your PC.

New! SafeZone Browser

Designed for a safer and more comfortable browsing experience, SafeZone is also the most secure browser in the world. The secure payment mode ensures complete privacy when shopping and banking online, the Ad Blocker ensures that you are not bothered by ads, and the Video Downloader allows you to watch videos offline at your convenience.

Improved! Home network security

Even more advanced protection for your home network and all devices connected to it. Thanks to new technology Nitro free antivirus Avast Free Antivirus is able to detect more types of router vulnerabilities, which will provide even more reliable protection. wifi cameras, SMART TV, printers, network drives and routers.

Avast Passwords

It's time to break the bad habit of storing your passwords in your browser or using the same password for multiple services. New manager Avast passwords allows you to store all passwords in a secure and convenient storage, to access which you only need to remember one master password.

HTTPS scanning

The improved Web Shield allows Avast Free Antivirus to thoroughly scan HTTPS sites for malware and other threats. You can whitelist the websites and certificates of your online banking so that scanning does not slow down access to services.

Browser cleaning

Don't let outsiders change your search engine without your permission. Cleaning your browser will remove all questionable plugins and toolbars so you can return to your original browser configuration.

Unique! 230 million users

Avast is the choice of 230 million users around the world, which allows the antivirus to detect malware much faster than others, regardless of where it appears. The combination of the state-of-the-art AI engine at the heart of the antivirus program and millions of virus sensors around the world allows Avast Free Antivirus to continuously detect and eliminate the latest cyber threats, keeping you 100% secure.

Improved! Antivirus and malware protection

The developers are constantly working on improving the innovative anti-virus engine to provide you with reliable protection against all types of cyber threats. Through continuous updates no larger than a text message, Avast distributes new threat intelligence several times an hour to keep your antivirus up to date.

Smart Scan technology

Comprehensive intelligent scanning for all types of problems. Scan your PC for performance status, check for online threats, malware or viruses, and find outdated programs with just one click. The easiest way to stay completely safe.

Software Updater

Hackers love to exploit vulnerabilities in outdated software to get into a system. Software Updater notifies you when updates are available for your software so you can fix any vulnerabilities before attackers can exploit them.

Integration with MyAvast

Smartphone, PC and tablet protected by Avast? Wonderful! You can control and manage devices through your personal account right in user interface programs

AVG

A very, very good antivirus, which, by the way, has won many awards. There is a free version available that can cover the needs of most users. Judge for yourself, the free version includes: an antivirus (which protects in real time from viruses, spyware, etc.), a complex for protecting against dangerous links on the Internet, as well as a complex for protecting e-mail.

By the way, the antivirus can be installed not only on a laptop (computer), but also on a phone! In general, the antivirus is very worthy, protecting the PC well (while working fast enough)!

Bitdefender Antivirus

A very well-known antivirus that provides comprehensive computer protection: antivirus, firewall, software package enhanced protection personal data. By the way, in many independent ratings this antivirus is on the top lines.

Among the features of this antivirus, I can highlight the following:

  • protection of everything and everything (the user, in practice, can not be distracted by thoughts about protecting the PC - the program itself knows everything: what, where and when to block ...);
  • low consumption of system resources (for example, 100-200 MB of RAM when working in Windows 10 with documents);
  • convenient and intuitive interface.

Key features of Bitdefender Antivirus Free Edition

real time protection– Real-time screen provides protection during access. All files are checked at the moment they are launched or copied. For example, files that you have just downloaded from the Internet are scanned immediately.

Cloud technologies- Bitdefender Antivirus Free Edition uses cloud-based scanning to speed up detection and detect new or unknown threats that other antiviruses miss.

Active virus control is an innovative proactive detection technology that uses advanced heuristics to identify new potential threats in real time. Bitdefender's free antivirus heuristic provides a high level of protection against new threats that have not yet been added to virus signatures. Active Virus Control in Bitdefender Antivirus Free Edition monitors every program running on your computer and detects malware based on their actions.

HTTP scanning- Bitdefender free antivirus analyzes and blocks fraudulent and phishing websites.

Antirootkit The technology is used to search for hidden malware, also known as rootkits. Rootkits are a hidden type of software, often malicious, aimed at hiding certain processes or programs from conventional detection methods, while rootkits allow you to gain privileged access to a computer.

Periodic update– Bitdefender Antivirus Free Edition is updated periodically without user intervention, providing an optimal level of protection against new threats.

Early Scan at System Boot- This technology ensures that the system is checked at boot time, once all important services have been started. It allows you to improve virus detection at system startup, as well as speed up system boot time.

Scan while idle- Free antivirus Bitdefender detects when the use of computer resources is minimal in order to scan the system without affecting the user's activities. System resource usage is calculated based on the processor (CPU) and hard disk drive (HDD) usage.

Smart Scan Technology- Files that were previously scanned by Bitdefender Antivirus Free Edition will not be scanned again using the smart file scan skip engine.

Avira Free 2015

The most famous German-made antivirus (“umbrella”, “red umbrella”, as many in our country called it). It provides a good degree of PC protection (by the way, virus search and detection algorithms are among the best among programs of this kind), high performance (I remember recommending installing this antivirus even on budget laptops 5-6 years ago),

  1. Russian language support;
  2. support for all popular Windows OS: XP, 7, 8, 10 (32/64 bits);
  3. low system requirements;
  4. excellent algorithms for searching and detecting viruses and potential threats for PCs;
  5. user-friendly interface (everything unnecessary is hidden from beginners, but nevertheless accessible to experienced users).

Main features of Avira Free Antivirus

Antivirus and antispyware

Effective real-time and on-demand protection against various types of malware: viruses, trojans, worms, spyware and adware. Constant automatic updates and AHeAD heuristic technology reliably protect against known and new threats.

Cloud protection

Avira Protection Cloud - real-time threat classification and fast system scan.

Rootkit protection

Avira's anti-rootkit protects against difficult-to-detect threats - rootkits.

Windows Firewall Management

Avira Free Antivirus allows you to edit network rules for applications, change network profiles (Private, Public) and manage advanced settings Windows Firewall in enhanced security mode.

Internet protection **

Safe search, blocking of phishing and malicious websites, tracking protection.

** This feature is part of the toolbar Avira Browser Safety for Chrome, Firefox and Opera browsers (installed separately from Avira Free Antivirus).

Parental control

Not available in the Russian version. For use, you can use the link to the service in the description.

With the function of social networks based on technology Avira Free Social Shield you can monitor your children's online activities: check their online accounts in social networks for comments, photos, etc. that may affect your child in a negative way.

Protecting Android Devices

Antivirus solution Avira Free Antivirus, in addition to protecting your computer from various threats, offers to install the application Avira Antivirus Security for android, which will protect your smartphone or tablet from loss and theft, as well as block unwanted calls and SMS messages.

Kaspersky Anti-Virus

I'm not afraid to say that Kaspersky Anti-Virus is the most famous and popular anti-virus in the post-Soviet space. The anti-virus database of Kaspersky is really huge. It easily catches all possible viruses available on the network. But, as the developers did not declare about acceleration and, most importantly, about a radical decrease in computer resources, they did not complete this task to the end.

Kaspersky Anti-Virus, as it slowed down the PC earlier, so it continues to do so now. Moreover, using it on a fairly powerful machine does not save you from slowdowns - Kaspersky's gluttony is unlimited, this can only be fixed by very careful tuning of the program.

New in Antivirus Kaspersky Free 2017

Kaspersky Free Anti-Virus 2017 has the following new features:

  • Improved program update in the background. Now, when upgrading, you do not need to re-accept the terms of the License Agreement if it has not changed.
  • Improved Mail Anti-Virus. The default heuristic analysis depth has been increased to medium.

Version comparison

Comparison of the functions and capabilities of the free antivirus Kaspersky Free with paid solutions Kaspersky Anti-Virus(K.A.V.), internet security (KIS) and Total Security(KTS).

Functions / VersionsFreeKAVKISKTS
File Anti-Virus
Web Anti-Virus
IM Antivirus
Mail antivirus
Anti-Phishing
Screen keyboard
kaspersky security network
Kaspersky Secure Connection*
Network monitoring
Activity monitoring
Internet management
Application Control (HIPS)
OS change control
Webcam access
Firewall
Protection against network attacks
Anti-Spam
Anti-Banner
Data collection protection
Secure payments
Secure data entry
Trusted Applications Mode
Software update
Uninstalling programs
Parental control
Backup
Virtual safes
Password manager

Main features of Kaspersky Free Anti-Virus

File Anti-Virus

File Anti-Virus Kaspersky Free Anti-Virus allows you to avoid infection of the computer's file system. The component starts at the start of the operating system, resides permanently in the computer's RAM, and checks all opened, saved, and run files on your computer and on all attached drives.

Mail Antivirus

Mail Anti-Virus scans incoming and outgoing mail messages on your computer. The letter will be available to the addressee only if it does not contain dangerous objects.

Web Anti-Virus

Web Anti-Virus intercepts and blocks the execution of scripts located on websites if these scripts pose a threat to the computer's security. Web Anti-Virus in Kaspersky Free Anti-Virus also monitors all web traffic and blocks access to dangerous websites.

IM Antivirus

IM Anti-Virus ensures the security of working with IM clients. The component protects information received on your computer via IM client protocols. IM Anti-Virus ensures safe work with many instant messaging programs.

Secure connection

The VPN client Kaspersky Secure Connection, which is installed with the antivirus, is designed for a secure connection. The application protects your data when working in public WiFi networks, provides anonymity on the Internet and makes it possible to visit blocked sites.

* The Kaspersky Secure Connection component has a traffic limit of 200 MB per day. Removing the restriction and the ability to select VPN servers are available with an additional subscription.

Participation in Kaspersky Security Network

To improve the protection of your computer, Kaspersky Free Anti-Virus uses protection from the cloud. Protection from the cloud is implemented using the infrastructure Kaspersky Security Network using data received from users around the world.

Benefits of Kaspersky Free Anti-Virus

One of best antiviruses in terms of searching for and detecting unknown viruses (i.e. heuristic analysis in the program is so advanced - that thanks to it, this antivirus finds dangerous files, even if the anti-virus databases do not yet have this threat).

After installing Dr.Web, access to the Internet is often blocked, which can only be fixed correct setting and making exceptions to the program. So before installing this software, do not be lazy and read the setup instructions and help on the developers' website.

Main features of Dr.Web Anti-virus for Windows

· Dr.Web Scanner for Windowsvirus scanner With GUI, which runs at the user's request or according to a schedule and performs an anti-virus scan of the computer.

· Anti-rootkit Dr.Web (Anti-rootkit API, arkapi)- background scanning for rootkits and the new arkapi. A subsystem for background scanning and neutralization of active threats has been implemented. The implementation of the subsystem required significant reworking of the Dr.Web software libraries.

· Preventive protection– advanced features of preventive protection of Dr.Web Anti-virus user's computer from infection by blocking automatic modification of critical Windows objects, as well as control of some unsafe actions.

Dr.Web anti-virus provides control over the following objects using preventive protection:

HOSTS file;
– Possibility of low-level disk access;
- the ability to download drivers;
– access to Image File Execution Options;
– access to User Drivers;
– parameters of the Winlogon shell;
– Winlogon notifiers;
– Windows shell autorun;
– associations of executable files;
– Program Restriction Policies (SRP);
– Internet Explorer plug-ins (BHO);
- autostart programs;
– autostart policies;
– configuration safe mode;
– Session Manager parameters;
- system services.

The improved Dr.Web ShellGuard technology of the Dr.Web Process Heuristic non-signature (behavioral) blocking in the Dr.Web Preventive Protection system will protect against attacks using zero-day vulnerabilities.

· Dr.Web HyperVisor is a component that allowed us to improve the system for detecting and curing threats, as well as to strengthen Dr.Web self-defense by using the capabilities modern processors. The component starts and runs below the operating system level, which ensures control of all programs, processes, and operation of the OS itself, as well as the impossibility of malicious programs intercepting control over the protected Dr.Web system.

· SpIDer Guard– anti-virus watchman, which is constantly in the RAM, checking files and memory on the fly, as well as detecting manifestations of virus activity;

· SpIDer Mail– a mail anti-virus guard that intercepts requests from any computer mail clients to mail servers via the POP3/SMTP/IMAP4/NNTP protocols (by IMAP4 we mean IMAPv4rev1), detects and neutralizes mail viruses before receiving letters email client from the server or before the email is sent to the mail server. The mail watchman can also check correspondence for spam using Dr.Web Antispam;

· Dr. Web Firewall– a personal firewall of Dr.Web Anti-virus designed to protect your computer from unauthorized access from the outside and prevent leakage of important data over the network;

· Update module, which allows registered users to receive updates of virus databases and other files of the complex, and also installs them automatically; allows unregistered users to register or receive a demo key.

· SpIDer Agent– a module used to configure and manage the operation of Dr.Web Anti-virus components.

Dr.Web CureIt! is a free anti-virus scanner based on the core of the Dr.Web anti-virus program that will quickly and efficiently scan and cure your computer without installing Dr.Web anti-virus itself.

Antivirus Dr.Web CureIt! detects and removes mail and network worms, file viruses, Trojans, stealth viruses, polymorphic, incorporeal and macro viruses, viruses that infect MS Office documents, script viruses, spyware (Spyware), password stealers, dialers, adware (adware), Hack tools, potentially dangerous software and any other unwanted codes.

The utility can be used to check Computer BIOS to infection with "bios-kits" - malware that infects the BIOS of a PC, and a new rootkit search subsystem allows you to detect complex hidden threats.

Free payment:

1. Does not provide real-time protection.

2. The program does not include a module for automatically updating anti-virus databases, so in order to scan your computer next time with the most latest updates anti-virus databases, you will need to download again Dr.Web CureIt!

– The use of a special free version of the software is only legal on your personal computer. If you are using a special free version Software, you are fully subject to the terms License Agreement, with the exception of paragraphs 6.1-6.3.

Dr.Web also has one wonderful utility - Dr.Web Cureit (which does not need to be installed)! The portable utility can be run even from a flash drive, it is absolutely free and does not require any activation. Finds all viruses available and paid versions of Dr.Web. It often helps to detect both and when on a computer.

But be careful before treatment, carefully read the detected Dr.Web Cureit threats. All processes that monitor the computer in real time, such as CCleaner or Advanced SystemCare Ultimate, are determined by the utility to be unsafe. During treatment, the software is not completely removed, but only some files, but the program no longer starts after that, and is also not subject to standard deletion- must be cleaned manually.

The utility is available on the developers website https://free.drweb.com/cureit

Comodo Antivirus

Website: https://antivirus.comodo.com/

What captivates in this antivirus is that, in addition to the “normal” antivirus databases, it has built-in databases for searching and detecting various adware (which is very popular lately). If you want to protect your browsers and programs for working with the Internet from all sorts of banners (which often appear so intrusively on the floor of the screen ...) - I recommend trying Comodo Antivirus (especially since the program is free).

Some antivirus software vendors offer free products where some features are not available and are reserved for paid versions. The free Comodo Antivirus includes absolutely everything in the company's paid solution, with just one major exception. The antivirus does a great job at basic protection tasks, but some advanced features are quite complicated and more suitable for geeks than ordinary users.

Advantages

  • high scores in tests of independent laboratories;
  • good results in our own malware blocking tests;
  • contains secure browser, virtual desktop, virtualization system.

Flaws

  • Comodo participates in tests from a limited number of labs;
  • weak blocking of malicious links based on test results;
  • nominal phishing protection;
  • recognized some trusted PC Magazine utilities as malware;
  • the HIPS system (disabled by default) in the active state displays a large number of notifications that mislead the user.

Overall rating

Comodo Antivirus offers reliable antivirus protection and a rich collection of additional security tools. However, the implementation of auxiliary components is more for advanced users.

360 Internet Security

Website: https://www.360totalsecurity.com/


A very interesting free antivirus that is rapidly gaining popularity. In addition to the built-in antivirus, there are functions for eliminating some vulnerabilities in Windows, functions for installing patches and fixes, optimizing and speeding up the system, cleaning the PC of “garbage” (unnecessary and temporary files).

Key features of 360 Total Security

AT new version 360 Total Security added the Avira antivirus engine and System Repair for system recovery to the existing Bitdefender engines, the proactive QVM II and the cloud-based 360 Cloud.

Also added are the functions of acceleration and cleaning “in one click” to optimize the performance of the computer.

Total Security solves the vulnerability problems of the Windows operating system by checking the system for uninstalled patches and updates, allowing you to download and install them.

System check
– One-click quick check of the general health and security of your computer

Antivirus scanning
– Use of 5 engines, including antivirus 360 Cloud Engine / QVMII / Avira and Bitdefender for comprehensive protection and better detection, as well as System Repair for system recovery.

System acceleration
– Allows you to manage and optimize the startup of applications, plugins and services. Reduce your PC boot time.

Cleaning the system
– Helps free up hard drive space by cleaning junk files from your computer and make your work more efficient.

Real time protection
– Protect your computer from malware, hidden threats and the latest threats using fast and intelligent cloud technology.

Fixing vulnerabilities
– 360 Total Security detects vulnerabilities in the Windows system and allows you to download and install all the necessary security updates.

Security in a sandbox environment
– The Sandbox allows you to run selected applications (for example, a browser) in an isolated environment and work with them without the risk of harming the main system. It is possible to launch applications in the sandbox from the context menu and add to the list for automatic launch in the sandbox.

Firewall (firewall)
– Includes stand-alone tool GlassWire- network security monitor and firewall to control your network. The program protects your computer by visualizing network activity on a convenient graph and helping you to detect unusual behavior of malware on the Internet.

remote assistance
360 Connectmobile app for Android, which allows you to manage protection remotely using your smartphone and receive notifications about the status of your computer from installed antivirus 360 Total Security.

Installation and use rights

– 360 Total Security is free product for personal use. Qihoo 360 Software only grants a limited license to download, install, use and copy the software on a single device for non-commercial use with no limit on the number of uses.

The best antivirus is a backup copy of important documents to third-party media…

When creating the article, materials were used http://www.comss.ru/

Computer viruses cause a lot of trouble and problems to many users. And all of them in the vast majority of cases have antivirus installed. There is only one conclusion - the antivirus does not provide the necessary level of protection. This problem must be solved by complex computer settings and the study of the basics of security.

1. What you need to know about viruses

A virus is a malicious program created by an attacker. The purpose of the first viruses was the self-affirmation of their creators, and their action was to harm the computer. Today, the vast majority of viruses are aimed at illegally obtaining funds in one way or another.

In order to effectively protect yourself from viruses, you need to know how they work. The main tasks of viruses are to penetrate the user's computer, ensure their launch, protect themselves from detection and removal, and perform destructive actions.

2. Types of viruses

Viruses infect a computer in various ways and, depending on this, are divided into different types.

File virus

Infects other programs and files by adding its own program code. Thus, when an infected program or file is launched, malicious code is executed. If the virus is infected system files, then the malicious code runs automatically every time the computer boots.

Worm

The worm is a self-replicating virus. Having penetrated the user's computer, the worm duplicates itself many times, places many copies of itself in different folders with different names, making it difficult to remove. Worms can also copy themselves over a local network to public folders on other computers, spread themselves through email, messaging programs, and network attacks.

twin virus

Some viruses remove or hide user files and folders and replace them with malicious files with the same icons and names. The user tries to open them and runs malicious code. Such viruses are now found on flash drives.

Trojan

Trojans are viruses that do not infect other files, but place their own files on the user's computer. Often these files are located in the folders of the operating system, disguised as system files, registered in startup and launched every time the computer boots. Trojans are more difficult to identify because they act like other programs that also add their files to the system and run with the computer.

False Program

Some viruses disguise themselves as useful programs for the user, designed to download files from the Internet, watch videos on websites, improve computer performance and even protect against viruses. The user installs the program himself, uses it and is not even aware of its "undocumented capabilities".

Also, such programs often try to get money from the user. For example, a false antivirus or a program for fixing errors in the system detects several dozen non-existent viruses or problems on your computer, some of them offer to fix it for free, and the rest after purchase full version or sending SMS. This is a classic scam.

3. Actions of viruses

Regardless of the method of infecting a computer, viruses can perform different actions and, on this basis, are also divided into different types.

display intrusive advertising in Internet browsers, replace the home page address, redirect users to various sites. They are installed as an additional program, plug-in or browser panel with other free programs or under the guise of something useful from the Internet.

Spies and Keyloggers

Designed to steal confidential information and passwords. They monitor user actions, look for confidential information on the computer, collect data entered from the keyboard, from the clipboard, take screenshots of the screen and send them to the attacker. The purpose of such programs is a variety of data. Rooms bank cards allow you to steal funds from your bank account. Hacked social media and Skype accounts can send messages to your friends asking them to download a file or visit a website. Mail can be used to send spam. Software license keys, account and property from online games can be sold.

Ransomware blockers

They block the operation of the operating system and display a message with a request to send an SMS or pay a certain amount to some account. After that, it promises to unlock the computer. But in the vast majority of cases, unlocking does not occur. In order to remove such a virus and restore the normal operation of the computer, you need to have some experience.

Ransomware-blockers can report that you allegedly violated license agreement Windows, pretend to be law enforcement agencies (MVD), show shocking pictures and obscene text.

Ransomware ransomware

They quietly encrypt all user files on the computer - documents, photos, videos, etc. When all files are encrypted, a message appears on the screen asking you to send an SMS or pay a certain amount to some account. After that, it is promised to decrypt the files. But in the vast majority of cases, decryption does not occur.

Restoring encrypted files is only possible from a backup. I recommend storing valuable files (documents, photos, etc.) on an external drive.


Botnets

They spread to a large number of computers and provide access to them to an attacker. The virus does not manifest itself until it receives a special command. Infected computers (zombies) are used to organize large-scale attacks on the servers of enterprises, government agencies and send spam.

Backdoors

Provide access to the computer. Using them, an attacker can download various malicious programs to the user's computer. These programs may be removed or replaced as needed.

4. Ways of penetration of viruses

Viruses can enter a computer in several ways - from an infected flash drive, CD / DVD, from the Internet and local computer network. In this case, various vulnerabilities in the operating system, programs, social engineering and phishing can be used.

Flash drives

Many viruses spread using files on flash drives and external drives. It is enough to insert a USB flash drive into an infected computer and the virus will immediately appear on it. Then, when you insert a USB flash drive into a healthy computer, the virus is transferred to it. After that, the newly infected computer starts to infect other flash drives.

CD/ DVD-discs

Viruses can be carried through CD/DVDs. These can be both infected user files and viruses that have penetrated through the disc burning program.

Internet

There are many infected files and programs on the Internet, after downloading and opening them, the computer becomes infected with a virus. In addition, modern sites use scripts and other technologies based on program code to increase interactivity. Attackers create scripts designed to spread viruses. It is enough to go to the site with such a script and the virus is already on your computer, even if you have not downloaded or installed anything.

The local network

If one of the computers connected to a local network with other computers becomes infected, then viruses from it can be transmitted to other computers through public folders or through network attacks. If your provider, in addition to the Internet service, also has a local network, then the intensity of network attacks and the likelihood of infection will be high.

Vulnerabilities in the system

Network attacks are constantly being made on users' computers, which are possible both from the local network and from the Internet. They exploit various vulnerabilities in the operating system, network services, and drivers. Special network packets are sent to the user's computer, which lead to malfunctions software components in order to take control of them. Then a loophole is created in them through which the virus enters the computer. To infect, it is enough to connect the computer to a local network or the Internet, no user action is required.

Vulnerabilities in programs

Viruses can also enter a computer through various vulnerabilities in programs. These can be both network attacks on programs using the Internet, and various infected files. For example, malicious code can be embedded in a Word, Excel, PDF, or any other file. When an infected file is opened, control over the program is intercepted and the virus is further introduced into the system.

social engineering

Many viruses are spread through e-mail and Internet sites by persuading the user that he will get something useful, valuable or interesting if he opens a certain file or goes to a certain site. If the user believes this and takes the proposed action, then his computer will be infected with a virus.

Users are also sent emails, messages on social networks, Skype, SMS, and even receive calls asking them to provide some personal data. In this case, the attacker may present himself as an employee of a bank, a support service of some site, and even a friend or relative.

Phishing

Phishing is a substitution of the address of some popular site in order to infect a computer with a virus or obtain confidential information.

Users receive messages allegedly on behalf of the administration of the site or social network where they are actually registered, with an offer to go to the site to resolve some issue, and they are offered a link very similar to the official site address. If a user follows this link, then his computer becomes infected with a virus.

Also, attackers create special sites that exactly repeat the authorization pages of the official websites of banks, mail services, social networks, online games, etc. The site address can also be very similar. Users are then sent an email, ostensibly on behalf of the site, with some kind of notification and a link to go to the site. By clicking on the link, the user is taken to a fake authorization page, where they are prompted to enter a username and password. After entering the password, it is sent to the attacker and the account is hacked, and the user is redirected to the real site and does not notice the substitution.

After the virus has penetrated the computer, it is written to startup to run every time the computer is turned on. Here are the main ways to autoload viruses:

  • Task Manager
  • Windows Registry
  • Windows Services
  • Internet browser plugins and panels
  • Windows Explorer plugins
  • Infected system files
  • Boot sector or disk partition
  • Alternate NTFS streams
  • network stack
  • Print pool
  • In addition, there are hundreds of so-called autorun points. The same virus can use several of them at once. This makes it much more difficult to detect and remove malware.

    6. Self-defense of viruses

    Almost any virus, having penetrated a computer and registered in startup, tries to protect itself from detection and removal in various ways.

    Automatic restart

    The easiest way to protect a virus is to run several independent processes that monitor each other. If one of the processes terminates, the remaining one restarts it. This makes it difficult to disable the virus to remove it.

    Deletion Protection

    Virus processes in the computer's memory monitor the virus files on the disk and autorun points. If the user or the antivirus deletes the virus file or its autostart point, then the virus processes in memory immediately restore them. Also, the self-healing of the virus can occur every time you boot your computer.

    Disguise

    More advanced modern viruses use various methods of masking.

    Encryption is often used to protect virus files from detection, which prevents antivirus programs from detecting malicious code. When downloaded, the virus code is extracted from the encrypted file and placed in the computer's memory.

    Polymorphic (mutating) viruses change their code every time they infect a new computer, and sometimes every time the computer is restarted. This prevents the antivirus from identifying malicious code using already known signatures.

    Rootkits are special components included in the protection complex. modern viruses. They penetrate the core of the operating system and have the highest powers. Rootkits are designed to hide a virus from an antivirus program. For example, they can intercept antivirus disk and registry calls, remove virus file names and registry settings from the data stream, and send already cleaned data to the antivirus.

    Also, the virus itself can run in kernel mode, where only the most important system components, such as device drivers, have access. From there, they can even fight anti-virus programs.

    Neutralization of antiviruses

    Some high-tech viruses can successfully resist anti-virus programs, completely or partially neutralize their algorithms.

    The most dangerous virus is the one that does not allow itself to be detected, does not lead to problems in the operating system and lives on the computer for a long time in order to steal confidential information and user funds.

    7. Basic ways to protect against viruses

    I decided to divide the ways to protect against viruses and security threats into the main ones - mandatory for everyone, and additional ones - at the request of the user. In this section we will look at the main methods of protection, and in the next we will talk about additional ones.

    Modern viruses are high-tech programs with a complex of masking and self-defense that are difficult to detect and neutralize. Therefore, complex measures must also be taken to protect against them. This is an anti-virus program, covering all possible ways for viruses to enter and following the principles of security when working on a computer. All this is not so difficult, it is enough to set up the computer well once and not violate certain rules.

    7.1. File virus protection

    In order to protect yourself from viruses infecting files, it is enough to install any antivirus.

    Paid antiviruses provide a high level of protection against other security threats as well. It makes sense to acquire them if you deal with valuable confidential information or carry out serious financial transactions. The best for Russian-speaking countries is Kaspersky Internet Security. If the computer is weak, then you can purchase a faster and lighter Dr.Web Security Space.

    Of the free ones, for the Windows 7,8.1,10 operating system, I recommend Avast. For Windows XP - 360 Total Security or Avira. Both programs are fast, easy and well suited for weak computers. 360 Total Security has various additional functions- disk cleanup, monitoring Windows updates, webcam protection and is more suitable for those who like to understand everything. Avira contains all the necessary security elements and is more suitable for lovers of minimalism who do not want to delve into the settings.

    Never turn off your antivirus or open suspicious files, no matter how much you want to. In the vast majority of cases, you will not get what you want and only hurt yourself.

    7.2. Protection against false and infected programs

    Use only popular well-known programs. Download programs only from developer sites and popular well-known sites. Check all downloaded files at VirusTotal.com.

    Refrain from installing dubious programs, especially those that have been checked by VirusTotal.com as unwanted. Always select custom installation and uncheck optional features.

    7.3. Flash drive virus protection

    It is easiest to protect yourself from computer infection through a USB flash drive. To do this, you need to disable autorun flash drives in the Windows registry. I did special file, which sets the necessary parameters in the registry automatically and works with all Windows versions. You just need to run it and agree to make changes to the registry.

    You must restart your computer for the changes to take effect. After that, autorun viruses from flash drives will not be possible. Please note that the autorun window will not appear when inserting flash drives. You can access the flash drive through windows explorer(My computer).

    You can download the file to disable autorun of flash drives in the "" section.

    7.4. Virus protection on CD/DVDs

    CD/DVD autorun could also be disabled in the registry. But the spread of viruses on disks is already rare and antiviruses can easily block them. And disabling autorun disks will cause a lot of inconvenience, since you will have to manually look for the autorun program on them. So I recommend not to bother with it.

    7.5. Browser script protection

    There is a very good NoScript plugin for the Firefox browser. After installing it, some sites may lose some functionality. But it is enough to add them to the allowed list with a simple mouse click and their functionality will be restored.

    But you do not need to add everything in a row, but only those sites that you absolutely trust. Then the security on the Internet will be at a sufficiently high level.

    For Chrome browser there is a similar ScriptBlock plugin. The principle of its operation is the same. On allowed sites, scripts are not blocked, but on the rest you will be safe.

    7.6. Password protection in the browser

    All browsers allow you to remember passwords for sites the first time you enter them.

    This is convenient because you do not need to enter a password the next time you access this site. But this is not safe, as the password from the browser can be stolen.

    For Firefox and Chrome browsers, there is a great LastPass plugin that also offers to save passwords when entering them on sites, but stores them in secure storage. When entering the sites, it substitutes the username and password in the required fields, which is very convenient.

    Do not enter your passwords on other people's computers, as they may be infected with a spyware or keylogger.

    You can download the LastPass plugin in the "" section.

    7.7. Protection against social engineering

    Don't click on questionable online ads, especially flashing pictures with unbelievable promises. At best, you will end up on a site where they will try to convince you to buy something by fraudulent means, at worst, on a site infected with a virus.

    Never download files or follow links from emails that come from people you don't know. No matter how tempting or harmless this message is, in 99% of cases they want to deceive you!

    Also, don't open attachments or follow links from strange messages that came from someone you know (like look at my photo or download a cool program). Most likely, this indicates that your friend's account has been hacked and is being used to send malicious messages. Contact your friend, ask if he sent you this message and warn about a possible problem.

    If the message you think might be of high importance (for example, from your bank), then call them. Do not tell anyone your passwords for banking transactions, e-mail, etc. Official representatives have no right to ask about it.

    Be selective in social networks, do not add everyone who asks you as a friend. These people may try to get your personal data, send you messages to infected, fraudulent sites, or simply bombard you with ads. If suspicious activity appears, remove these people from your friends.

    Recently, attackers also often use SMS and even calls to deceive. Do not send response SMS and do not call the indicated numbers, as money will be withdrawn from your account for this. Do not follow links in SMS, they are now used to spread viruses on smartphones. Check all information on official phones and on official websites, and not according to the contact information that was sent to you.

    Recently, there have been more frequent reports that something happened to your relative or you won some very valuable prize (car, house, apartment, etc.) and you are asked for money to settle some issues. Never trust such messages and check information through reliable channels. The main thing is the understanding that no one ever gives anything to anyone just like that. If you did not buy anything and did not register for the promotion, then this is a 99% scam.

    7.8. Phishing Protection

    To protect yourself from site spoofing through phishing, never click on links that are sent to electronic messages. Open new page browser and go to the desired site from bookmarks or enter the address manually.

    All modern browsers have built-in phishing protection. If a site is identified as phishing, then access to it is blocked.

    Similar blocking windows may be displayed when malware is found on the site.

    But browsers can only detect fakes of the most popular sites or those sites that are blacklisted.

    Comprehensive paid antiviruses such as Kaspersky Internet Security and Dr.Web Security Space fight against phishing most effectively. Most popular free antiviruses also have phishing protection.

    7.9. Protection against vulnerabilities in the system

    To protect against vulnerabilities in the operating system, you must regularly install important updates, since these are mostly security updates. Go to "Control Panel\System and Security\Windows Update\Settings" and check your update settings. I advise you to enable the installation of updates in automatic mode.

    Despite the fact that official support for Windows XP has ended, for some older computers it is the only system that provides sufficient performance and functionality. There is a way to extend the receipt of security updates for Windows XP until April 2019. To do this, I made a special file that adds to Windows registry little change. It is enough to run it and agree with making changes to the registry.

    After that, installation of security updates in Windows XP will last until April 2019.

    You can download this file in the "" section.

    7.10. Disabling unnecessary services

    Another generally recognized method of protection is to disable unnecessary functionality. If potentially vulnerable components are disabled, then an attack on them is impossible. First of all, it concerns Windows Services, which run on every computer and are most often targeted for attacks. Many of them are not needed for the normal operation of the computer, and disabling them also has a nice bonus in the form of an increase in system performance.

    A-Data Ultimate SU650 120GB Hard Drive

    In order to disable unnecessary services, you need to go to the computer's management console. To do this, right-click on the "My Computer" or "Windows" icon (in Windows 8.10) and select "Manage ...".

    We go to the Services section.

    Now you need to right-click on the service that you want to disable and select "Properties".

    After that, set "Startup Type: Disabled" and click "OK".

    Now, when you turn on the computer, the service will not start.

    It is painless to disable some services that are not network services. Also, if you do not have a local computer network, you can disable some network services. I have prepared a description of the most important services and recommendations for setting them up. You can download them in the "" section.

    7.11. Protection against vulnerabilities in applications

    To protect against vulnerabilities in programs, it is advisable to regularly update them to new versions. Most programs have a feature to check for updates. As soon as an update for the program is found, the user is prompted to install it. Do not neglect updating programs, especially those that work with the Internet (browser, Skype, torrent client, etc.).

    7.12. Protection against network attacks

    The best way to protect against network attacks is to disable unnecessary services, regularly update the operating system and programs in order to eliminate the vulnerabilities that are used in attacks.

    But there are also programs specifically for protecting against network attacks, which are called firewalls. The firewall principle is that it does not allow Internet packets to reach the computer that contain data not requested by the user. For example, if you enter a website address in a browser, you will receive Internet packets with the content of the website in response, and the firewall will let them through. Infected Internet packets arrive at the computer without the user's request and the firewall blocks them.

    Windows operating systems have their own built-in firewall called the Firewall. With proper system security settings, it is usually sufficient. But there are also third-party solutions that are more advanced and reliable. If your computer has a valuable confidential information or you are actively working with payment systems, then additional protection in the form of a good firewall will not hurt.

    The firewall is part of paid antiviruses, the best of which are Kaspersky Internet Security and Dr.Web Security Space. If you have such an antivirus, then your computer is reliably protected from network attacks and you do not need a separate firewall. In addition, such a solution will be the best in terms of antivirus compatibility with the firewall.

    Of the free ones, the most popular firewall is Outpost Firewall Free, which can be installed from the Outpost Security Suite FREE and used in addition to any free antivirus. The disadvantage of this solution is the possible conflicts between the antivirus and the firewall.

    The best way to protect yourself from attacks from the Internet or the provider's local network is to connect your computer through a router. The router has the functionality of a hardware firewall. It hides your computer from hackers and securely blocks all unsolicited internet packets before they reach your computer. In addition, the router to some extent protects motherboard from electrical breakdowns by the provider, which happens quite often.

    However, a router does not protect against attacks from infected computers connected via it to a home or office local network, but only from those that come from the Internet. Therefore, a software firewall should still be running on every computer.

    7.13. System backup

    Even high-quality computer settings and adherence to security principles do not give a 100% guarantee that some kind of cunning virus will not penetrate the computer. But there is a tool that will reliably protect you from the consequences of infection. This is a creation.

    Built-in tool Windows Recovery is not efficient enough. Firstly, it protects only the most important system files, and the virus can be in another place. Secondly, viruses often infiltrate the backup storage and are restored along with the system restore, which nullifies the entire backup system.

    In order to create a reliable copy of the system, you need to set up your computer from scratch and make a complete image of the C drive using a third-party program. Additionally, this will protect you from any failures in the system or software.

    One of the best programs backup is Acronis True Image, it is paid. But there is a great free alternative - Paragon Rescue Kit Free.

    For a successful backup of the system, followed by a quick restore, you need to follow a few simple conditions.

    User files should not be stored on the C drive, otherwise they will be lost during system restore. Please note that the files on the "Desktop" and in the "My Documents" folder are physically located on the "C" drive. Therefore, store all your files on another partition, such as the "D" drive.

    Do not install games on the "C" drive, as they take up a very large amount of space, which will make it difficult to backup and restore the system. Install games on another partition, for example, on the "D" drive.

    A-Data Ultimate SU650 240GB Hard Drive

    Detailed instructions for using backup programs are available on the developers' websites from the "" section.

    7.14. File backup

    The backup copy of the operating system is intended for quick recovery computer performance and complete elimination of viruses. But this will not protect your files if they are deleted or encrypted by a virus.

    To protect your personal files, you should regularly back them up. You can simply copy files to a USB flash drive or external drive using standard tools, but this is not so convenient and can take a lot of time. It is better to use efficient synchronization algorithms for this.

    For example, in the popular file Total manager Commander has a directory synchronization feature. Open the folder with your files on the computer disk in the left panel, and the folder on the flash drive in the right panel.
    Transcend JetFlash 790 8Gb

    Go to the menu "Tools \ Synchronize directories".

    Set all the parameters as in the screenshot above and click the "Compare" button. After the comparison is completed, click the "Synchronize" button that has become active.

    One of the best free programs designed specifically for file synchronization is . The principle of operation is similar, but it works even better.

    In the left panel, you specify the folders that you want to synchronize on your computer's disk, and in the right folder on a USB flash drive or in another place where backups. After that, the “Compare” button is first pressed, and then “Synchronize”. For example, I synchronize my folders with a drive on another computer over a local network.

    Synchronization takes significantly less time than copying files because only new and changed files are copied. In addition, files that you deleted on your computer are removed from the backup.

    Remember! The question is not if you will lose your files if you don't back them up, but when it will happen...

    8. Additional ways to protect against viruses

    In this section, we will look at additional less popular protection methods that you can apply at will. However, some of them can greatly enhance the protection of your computer.

    8.1. Protection against spyware and keyloggers

    Exist special programs to protect against spyware and keyloggers. The most popular of them are Ad-Aware Free Antivirus+, Malwarebytes Anti-Malware Free, Spyware Terminator. But all modern antiviruses already have protection against spyware and keyloggers, and the use of several antivirus programs at the same time can lead to various problems.

    8.2. Anti-Phishing Plugin

    If you work with a large number of social and payment services and want to have an additional free protection, then you can install an anti-phishing plugin. One of the most popular is McAfee SiteAdvisor, which supports Firefox browsers and Chrome. It does not require any configuration, but simply blocks phishing and some other malicious sites.

    Such plugins add some antiviruses to browsers, such as Avast. The link to the McAfee SiteAdvisor plugin is in the "" section.

    8.3. Security with DNS servers

    There are special secure DNS servers to protect against malicious sites. One of the most popular free DNS servers in Runet belongs to Yandex (dns.yandex.ru).

    It is enough to register the address of a secure DNS server in the settings of the network card, and all sites, before they are loaded into your browser, will pass a security check on the Yandex server. Multiple DNS servers are offered: no protection, protection against malicious sites, and additional protection from adult content (can be used on a child's computer).

    In Windows XP, go to Start/Control Panel/Network and Internet Connections/Network Connections.

    In Windows 7, go to Start/Control Panel/Network and Internet/Network and Sharing Center/Change adapter settings.

    In Windows 8.10, right-click on the "Start" button and select "Network Connections".

    Select Internet Protocol Version 4 and click the Properties button.

    Enter the addresses of Yandex DNS servers.

    After that, only verified safe sites will be loaded in your browser.

    8.4. Working from a limited account

    If you are seriously concerned about the security of working on a computer, then it is a good idea to create a limited user account and work from under it. This is done easily through the "Control Panel / User Accounts ...".

    After that, a password is set on the Administrator account and it is used mainly for installing new programs and configuring the computer.

    The fact is that a virus, having got on a computer or just launched in a browser, receives the authority of the user who is currently working on the computer. If the user works with administrator rights, then the virus will run with administrator rights and will be able to change any system files and registry settings. If you work under a limited account, then if the virus still seeps through a well-configured protection system, it will not be able to infect system files and register in startup, and antivirus program it will be easier to neutralize it.

    8.5. Cleaning the system

    Keep your operating system clean and tidy, then viruses will not be so comfortable in it. Use one of the popular programs to clean the system of garbage. They delete files from the temporary folders of the system, programs and browsers. Viruses often like to sit in these folders and malicious scripts. In addition, you will save disk space.

    Such functionality has, for example, antivirus 360 Total Security. I can recommend excellent popular program. It keeps the system clean and deletes temporary files every time you boot your computer, a link to it is also below.

    9. Links

    Here you can download all the files that were mentioned in the article and will greatly help you in protecting your computer from viruses.

    Transcend StoreJet 25H3 2TB Hard Drive
    Hard Drive Transcend StoreJet 25M3 1TB
    Transcend StoreJet 25M TS500GSJ25M 500GB Hard Drive

    To keep your PC safe, you need to protect individual files and folders and take steps to physically protect your computer. If you have sensitive information on your computer, it must be stored in a safe place.

    The easiest ways to protect your computer are to lock it when you're away from work and set up a password-protected screensaver.

    PC lock

    Press key combination CTRL+ALT+DELETE.

      In the window that appears, click the button blocking. As a result, a dialog box will appear. Computer lock. The computer is now locked, which will prevent anyone other than the administrator and the user who locked the computer from logging in and opening files and programs.

      To unlock the PC, you must again press the key combination CTRL+ALT+DEL, enter the password, and then press the button OK.

    Protecting files with a screen saver password

      click right button click on an empty space on the desktop, open the context menu and select the command Properties.

      In the opened dialog box Properties: Screen go to tab Screensaver.

      Drop Screensaver choose any screensaver.

      Enable checkbox Password protection and press the button Apply.

    When checking the box Password protection PC operation is blocked when the screensaver is activated. To unlock the PC when you resume work, you must enter a password that matches the password of the current user.

    Use of passwords

    A password is an effective security tool used to manage user account logon and access to computers and resources.

    Password- this is a unique set of allowed characters that must be entered by the user to verify his account name and gain access to PC resources.

    To organize reliable PC protection, a password should be selected based on the following requirements:

    1) have a length of at least seven characters (the most secure passwords consist of 7 - 14 characters;

      letters (uppercase and lowercase) A, B, C,...; a, b, c,...; A B C,…; a B C,…

      digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9

      special characters ` ~ ! @ # $ % ^ & * () _ + - = ( ) | \ : " ; "< > ? , . /

    4) differ significantly from previously used passwords;

    6) not be a common word or name.

    Keep in mind that password cracking software uses one of three approaches: guessing,selection of options and automatic enumeration of all possible combinations of symbols. With enough time, you can crack any password using automatic brute force.

    On Windows XP, the user account password can be up to 127 characters long, but if the computer is used on a local network where there are Windows 95/98 PCs that support passwords up to 14 characters long, you cannot use longer passwords.

    To ensure security, you must be careful when using passwords. The following guidelines should be followed:

      never write down your password in any visible place;

      do not share your password with anyone;

      do not use the network password for other purposes;

      use different passwords for logging on to the network and the administrator account on the computer;

      change your password every 60-90 days;

      change your password immediately if you suspect that it has been compromised;

      be careful when saving your password on your computer. Some dialog boxes have the option to save the password. Never set this option.