booting off of a Live Cadmium or seting the difficult thrust into another computing machine and booting from the other computing machines runing system though attention must be taken non to reassign the virus to the new computing machine.
The lone best manner to avoid viruses is maintaining the system as base entirely with out pass oning with any other system. Even diskettes, pen thrusts and bluish tooth are should non used for computing machine. But in to-days universe it is non at all possible because communicating plays a critical function in modern universe.
B. Anti – virus package.
Many users install anti-virus package that can observe and extinguish known viruses after the computing machine downloads or runs the feasible. There are two common methods that an anti-virus package application uses to observe viruses. The first, and by far the most common method of virus sensing is utilizing a list of virus signature definitions. This works by analyzing the content of the computing machine ‘s memory ( its RAM, and boot sectors ) and the files stored on fixed or removable thrusts ( difficult thrusts, floppy thrusts ) , and comparing those files against a database of known virus “ signatures ” . The disadvantage of this sensing method is that users are merely protected from viruses that pre-date their last virus definition update. The 2nd method is to utilize a heuristic algorithm to happen viruses based on common behaviours. This method has the ability to observe viruses that anti-virus security houses have yet to make a signature for.
Some anti-virus plans are able to scan opened files in add-on to direct and received e-mails ‘on the fly ‘ in a similar mode. This pattern is known as “ on-access scanning. ” Anti-virus package does non alter the implicit in capableness of host package to convey viruses. Users must update their package on a regular basis to piece security holes. Anti-virus package besides needs to be on a regular basis updated in order to forestall the latest menaces.
One may besides understate the harm done by viruses by doing regular backups of informations ( and the operating systems ) on different media, that are either kept unconnected to the system ( most of the clip ) , read-only or non accessible for other grounds, such as utilizing different file systems. This manner, if informations is lost through a virus, one can get down once more utilizing the backup ( which should sooner be recent ) .
If a backup session on optical media like Cadmium and DVD is closed, it becomes read-only and can no longer be affected by a virus ( so long as a virus or infected file was non copied onto the CD/DVD ) . Likewise, an operating system on a bootable Cadmium can be used to get down the computing machine if the installed operating systems become unserviceable. Backups on removable media must be carefully inspected before Restoration. The Gammima virus, for illustration, propagates via removable flash thrusts
C. Take no action while linking USB thrust
We can protect your Personal computer by merely following the simple stairss below while linking USB thrust.
Connect Pen Drive or USB thrust to Computer.
Then a duologue window will popup inquiring to take among the options as shown in the figure.
Fig.1 Take no action while linking USB thrust
Do n’t take any of them, merely merely click Cancel.
Now go to Start — & gt ; Run and type cmd to open the Command Prompt window.
Now go to My Computer and Check the Drive missive of your USB thrust or Pen Drive. ( E.g. If it is written Kingston ( I: ) , so I: will be the drive missive. )
In the Command Window ( cmd ) , type the drive missive: and Hit Enter ( I: ) .
Now type dir/w/o/a/p and Hit Enter.
You will acquire a list of files. In the list, hunt if anyone of the undermentioned do be.
RVHost.exe or any other files with.exe Extension.
If there is any one of the files above, Run the bid attrib -h -r -s -a * . * and Hit Enter.
Now Delete each File utilizing the undermentioned Command del file name ( E.g del autorun.inf ) .
Now scan USB thrust with the anti virus we have to guarantee that we made our Pen Drive free of Virus.
Now we removed the viruses manually and confirmed with Antivirus package.
D. Disable Write Access to USB Hard Disk and Flash Key Drives
There is a register drudge that able to disenable the USB thrust entree to USB mass storage device such as brassy thrust, USB key, thumb thrust, pen thrust and portable difficult disc while maintaining the USB hardware device such as webcam, mouse, keyboard, pressman and scanner connected to USB ports working as usual. However, the drudge disables the USB entree to harrow thrust wholly. User can non copy informations to the USB disc storage, nor able to read any files and paperss from the USB thrust.
For user who merely want to disenable write entree to the external removable USB mass storage disc thrust, there is another register drudge of WriteProtect in StorageDevicePolicies register key that able to curtail Windows system from composing to the USB disc thrust, and therefore efficaciously user to copy any sensitive or private informations from the Personal computer to USB cardinal stick. The fast one works in a similar manner to write-protect characteristic used in floppy disc and backup tape which make the disc read-only, merely that in this instance, itaa‚¬a„?s system broad execution that block any authorship and recording of informations to USB mass storage device.
To disenable composing entree to USB thrusts and do all USB thrusts has merely read-only entree, follow these stairss:
Run Registry Editor ( regedit ) .
Fig.2. run regedit.exe.
Navigate to the undermentioned register key:
To return and take the out of use write entree to USB drivers, merely cancel the StorageDevicePolicies register key, or cancel the WriteProtect register entry, or alter the value informations for WriteProtect to zero ( that is 0 ) .
For user who doesnaa‚¬a„?t want to manually redacting the register, merely the undermentioned codification to enable or disenable the write protection ( block composing effort ) to USB removable thrust.
A. Disable the write protection
Type the undermentioned codification and salvage to DisableWriteToUSB.reg file
Fig. 10 DisableWriteToUSB.reg file
Double click the DisableWriteToUSB.reg file
Fig. 11 DisableWriteToUSB.reg file icon
B. Disable the write protection
Type the undermentioned codification and salvage to EnableWriteToUSB.reg file
Fig. 12 EnableWriteToUSB.reg file
Double click the EnableWriteToUSB.reg file
Fig. 13 EnableWriteToUSB.reg file icon
This method works in Windows XP SP2 and SP3, Windows Vista, Windows Server 2003 and 2008.
Lot of viruses occupy infinite in disc and degrades the public presentation. Using these preventative steps infinite and clip jobs are solved to some extent. Public service systems besides get protection from viruses. Thousands of DTP centres will acquire profit by forestalling from distributing viruses.