Tuesday 14 August 2012

How to Protect Yourself from Malwares

Malware, short for malicious software, is software designed to secretly access a computer system without the owner's informed consent. The expression is a general term used bycomputer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.The term "computer virus" is sometimes used as a catch-all phrase to include alltypes of malware, including true viruses. [Wikipedia]
With the increase in malware "programmers", numerous malwares/spywares are releasingeveryday.



Here are some ways to stay safe from most malwares inWindows:


1. OS Installation Directory


Most of them are skids, so they hard-code location names in their apps, instead of getting the System Directory. As you know the default installation of Windows XP, Vista, 7 is C:\Windows. When you are installing an OS, you are asked for the installation location, even Directory name. Just change C:\Windows to something like E:\OSdir, etc. and you should be immune from skidmalwares.


Note: Some softwares may stop working this way, since it can be possible that they are using the same idea. Just find an alternative for them.


2. Show Hidden Folders, and System Files


It is really easy to make any file System/Hidden in most programming languages, so mostmalwares hide their stub using these attributes. It becomes real easy to find them after you unhide them.


3. Use BinText on suspicious apps


You have found a suspiciously hidden App? Open it in BinText, it will display all Text in the app. Most programmers don't hide Text, although it can be done by obfuscating. But there is still a very good chance you can find suspicious information in an app. If you find text like ", , etc" then the app is a malware/spyware.


Download BinText now from Official Site


4. Process in Task Manager


Most of the Malwares cannot hide their task from TaskManager. All they do is Disable Task Manager by creating a Key in Registry. Just Download another Task Manager, there are lots, or make one yourself (Google for that), and you can End the Process of the suspicious app.

No comments:

Post a Comment