Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail.
Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you:
* Understand the risks and analyze your PC’s current condition
* Select, install, and configure antivirus software
* Scan your computer and e-mail
* Rid your computer of viruses it’s already caught
* Update antivirus software and install security patches
* Use firewalls and spyware blockers
* Protect handheld PDAs from viruses
* Adopt safe computing practices, especially with e-mail and when you’re surfing the Net
Written by Peter H. Gregory, coauthor of CISSP For Dummies and Security + For Dummies, Computer Viruses For Dummies goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best program(s) for your needs.
Remember, if you don’t protect your computer, not only do you risk having your computer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book! This guide will help you properly immunize your PC with antivirus software now and install updates and security patches that are like booster shots to keep your software protected against new viruses.
Part I: Evaluating Your Virus Situation.
Chapter 1: Understanding Virus Risks.
Chapter 2: Does My Computer Have a Virus?
Chapter 3: Does Your Computer Have Antivirus Software?
Part II: Deploying Your Antivirus Defenses.
Chapter 4: Obtaining and Installing Antivirus Software.
Chapter 5: Configuring Antivirus Software.
Chapter 6: Scanning Your Computer and E-Mail.
Chapter 7: Ridding Your Computer of Viruses.
Part III: Maintaining Your Vigilance.
Chapter 8: Updating Antivirus Software and Signatures.
Chapter 9: Installing Security Patches.
Chapter 10: Using Firewalls and Spyware Blockers.
Chapter 11: Protecting PDAs from Viruses.
Chapter 12: Incorporating Safe Computing Practices.
Part IV: Looking at Viruses under the Microscope.
Chapter 13: Viruses and the Losers Who Write Them.
Chapter 14: Trojan Horses, Worms, Spam, and Hoaxes.
Chapter 15: How Viruses Function and Propagate.
Part V: The Part of Tens.
Chapter 16: Almost Ten Myths about Computer Viruses.
Chapter 17: Ten Antivirus Programs.