Computer Security and Antivirus Software


Computer Viruses and Antivirus

Software Explained



What is a Computer Virus, and Why is it Called a Virus?


Before understanding what a computer virus is, it is necessary to understand what a virus in when it occurs in a living form (such as a human body, an animal, or a plant).

A virus is a small organism that is only able to reproduce itself within another living cell or body. It is typically harmful to the cell or body in which it lives, and is the cause of many illnesses and diseases. The word virus comes from Latin, and literally it means "poison."

So basically it is a "poison" able to reproduce itself within another cell or body. An example of an illness caused by a virus is the flu.

How does this relate to computers?

Well basically, a COMPUTER VIRUS is a harmful computer program which will damage files or your computer, and which is able to duplicate and spread itself within a computer or computer network. Usually the computer virus is hidden within a program, file or document.

Perhaps even more dangerous is the fact that viruses can also spy on you and steal your private information. They can collect your passwords, bank data, and credit card numbers. And the creators of the viruses can you this data to go into your private accounts, steal money, buy things in your name, and more. (When people steal your personal information and pretend to be you, this is called "identity theft.")

Criminals, or somewhat talented idiots with nothing better to do with their time, create computer viruses and spread them to other people's computers. Sometimes the sole purpose of this activity is to create trouble and damage. But in some cases, the purpose is identity theft, spying, and taking money from your accounts.

Similar to a common virus like the flu (which spreads from person to person), the computer virus has the ability to spread and "infect" other computers, files or documents.

A computer virus can spread itself through files documents such as word documents, spreadsheets, emails, computer programs etc. It can spread itself through the Internet, Local computer networks as well as through removable storage devices such as memory sticks and floppy disks.

Because it is hidden, it is hard to detect, and can it can be spread to other computers, unknowingly, by the computer user.

What exactly does a computer virus do?


A computer virus works similarly to a regular virus like (the flu) that makes a person sick, A computer virus will make your computer "sick".

What a virus will do to your computer depends on what it is programmed to do. Some can be very harmful, while others are made to simply annoy. A wide variety of names have been made up, in order to describe different types of computer viruses.

Some examples are as follows:

Macro Viruses


A MACRO is a computer instruction that tells the computer to take a series of actions. This is a very useful tool. It can, however, also be used to perform destructive actions.

Because of its nature, this type of virus is very easy to hide in files or documents. Macro viruses infect files that are created in certain programs, such as Microsoft Office documents, Word documents, Excel spreadsheets, PowerPoint presentations, and so forth.

The key point to remember is that the document being used in this case allows special actions; such as showing a picture, performing a calculation, playing a sound, etc.

One of the first macro viruses written was for Microsoft Word. It was discovered back August 1995. Today, there are thousands of macro viruses in existence, using many different types of programs.

This kind of virus is easily spread across a Local Area Network (a Network is a group of several computers which are connected in an office or home) or even over the Internet. Usually it spreads through shared drives and folders. Once it infects a system, it looks for other computers on the network, and tries to infect those.

(For more information on Macro Viruses, see the page here.)

Email Viruses


An email virus could be a form of a macro virus that spreads itself to all the contacts located in your email address book.

It automatically uses the addresses to send emails from your computer. If anybody opens the attachment of the infected mail, the virus spreads to that persons address book contacts, and then sends itself to all those contacts as well.

One can infect one's computer with an email virus even by just previewing the infected email.

(For more information on Email Viruses, see the page here.)

Trojan Horses


A Trojan Horse is a computer file which seems to be a useful, needed and wanted file. But in actual fact, it is a harmful file.

A Trojan horse appears to be doing something innocent, like showing a picture inside an e-mail, or installing a screen saver or other program. But in fact it is also doing something else, such as erasing files, or secretly sending information stored on your computer (such as passwords and other personal information) to the hacker who wrote it.

(For more information on Trojan Horses, see the page here.)

For more information about other types of harmful software, see the links on the right-hand column of this page.)

How to Deal with Computer Viruses


There are many ways in which a virus can infect your PC. But regardless of weather it is a harmful virus or an annoying "practical joke," it is dangerous to let one loose on your system, and it should be dealt with immediately.

Whether you are connected to the Internet or not, it is safest to have an antivirus program installed on your computer. If you are connected to the Internet, it is basically a must.

Types of Antivirus Programs


There are two types of anti virus programs. Both do more or less the same thing, but use different methods. Both types of programs are constantly on the lookout for viruses on your computer, but they do so in different ways.

The first one keeps a list of known viruses and virus types, called "virus definitions." This list of virus definitions is called a virus library. It constantly looks through your computer, checking to see if anything coming into your computer is a virus. It does so by comparing all things coming in with what it has stored in its "virus library".

Any file, document, or program coming into your computer is inspected and compared to this library to see if it matches any of the "virus definitions." One disadvantage of this system is that if a new virus comes out that is different than the viruses stored in your library, this type of antivirus program will not detect it and will allow it onto your computer.

When using such a program, it is important to have a subscription, and to be connected to the Internet, so that your virus definitions are constantly updated. New viruses come out every day. If you choose such a program, one of the things to check for is how often the virus definitions are updated. This will play an important role in keeping your computer safe.

The second type of anti-virus program is called a HEURISTIC program. "Heuristic" means "learning by discovery or trail and error." It comes from the Greek word "heuriskin," which means "to discover".

In other words, the program is capable of discovering new viruses not already known. It is written in such a way that it is able to learn and discover new viruses, without having to refer to a library. This program will most likely also have a library of virus definitions. But in addition to detecting already known viruses, it is able to detect new viruses, and is therefore a more secure program.

Will My Antivirus Program Drain my Computer of Energy?


One final thing to take into account, when choosing an anti-virus program, is how much computer power your anti-virus program uses. It is all fine to have the biggest antivirus program in the world, but that might not leave much computer power left for you to run your other programs. This is an important factors for you to take into account. Otherwise, you may run into a situation where, instead of viruses slowing your computer down, your antivirus program is slowing your computer down!

Some of the common Antivirus programs are as follows:

Kaspersky Antivirus

Trend Micro Antivirus

Norton Antivirus by Symantec


McAffee Antivirus

Panda Antivirus

For reviews of these antivirus programs and my own experience with them, please see the post here:

Reviews of Antivirus Programs



Useful Tips for Avoiding Computer Viruses


1. Only open email or Instant Message attachments that come from someone you know and trust, and that you are expecting.

2. Have email attachments scanned by an Internet security program before opening them.

3. Delete any unwanted or suspicious messages without opening them.

4. Do not click on Web links emailed to you by someone you do not know

5. If a person on your Instant Message "Buddy list" (or "Friends List," etc.) is sending strange messages, files, or web site links, end your Instant Message session at once.

6. Scan all files with an Internet Security program before moving or copying them to your computer. To do this, right-click on the document. If you have an anti-virus program installed, an option like "scan for viruses" will appear.

7. Only copy, transfer or download files from a well known source.

8. Keep your virus definitions up to date and use an Anti-Virus Program which does frequent updates.

ML,

Anna

P.S. I am doing research and a whole series of articles on this subject. I try to make things easy for people to understand. There will be more reviews and more links to software that will help you protect your computer - some of it free. So if you want to stay tuned, feel free to subscribe to updates of this blog!

What are Computer Viruses?

Viruses

In modern times, most people are aware to one degree or another of computer viruses. But exactly what are computer viruses?

Viruses are essentially computer programs written to cause harm and damage your computer. Viruses have the ability to open normal programs, files or documents, and copy themselves or parts of themselves into them.

When you access an infected program, file or document, you also activate the virus program without knowing that you are doing so. Some viruses lodge themselves into the memory of your computer, and access files every time you or your computer opens a document. (For more information on viruses you may see the page here.)

What happens when you open a program or document infected by a virus? That depends on what the virus is designed to do. Some erase files, some erase parts of files, some are designed to damage your computer operating system, and some are designed to simply fill your computer with unwanted garbage - making it impossible to operate your it.

Whatever a virus is designed to do, one thing is clear: you do not want one in your computer or on your network.

Because today's computer programs have become more and more complex, allowing more and more automated functions, there is an increased opportunity to create harmful code ("code" is a term used to describe a set of instructions for the computer to follow, written in computer programming language).

What to do about Computer Viruses

What are Macro Viruses?

Macro Viruses

One way of covertly introducing viruses into a computer is through the use of a MACRO. A macro consists of several instructions grouped together which then carry out a series of instructions. Macros are normally very useful tools, that make working with computer programs easier.

Common examples macro functions are: automatically inserting the date and time into your document, displaying a picture in your document, adding a sound to your document, or automatically calculating something in a spreadsheet. To perform these functions, the computer has to follow quite a set of complicated instructions. These are called macros.

Sadly, macros can also be used to cause harm to your computer or files. When a macro is used this way it is called a virus. When a macro is inserted to cause harm, it might not even be visible; or might be disguised as something desirable such as an innocent picture.

Far from all viruses in the form of macros. Some viruses come in the form of program files, where the virus file is made to look like part of a computer program. Other Viruses are disguised as part of the operating system (the operating system is the main program that runs your computer, such as Windows XP, Windows 2000, etc.) This, of course, makes it hard for someone who is not a computer technician to detect and fix them. And even computer technicians can be hard put to find and handle them. That is why we use antivirus programs.

What is Malware?

Malware

Harmful software is also referred to as "malicious software." "Malicious" means "intending to cause harm" and comes from the Latin word "malus," which means "bad." The term "malicious software" has also been shortened to the term "malware." One can define "malware" as "software that is bad or causes harm."

In earlier times, the only way to give a computer a virus, was by inserting an infected floppy disk into your computer. Today, with much more advanced technology, almost every computer is interconnected to the rest of the world, one way or the other. On top of all this, advancement in software and computers have also opened the door to new types of malware.

With these advancements in harmful or dangerous software, the term "malware" has come to mean all types of software or programs that are used to harm you or your computer.

Next we will look into some of the other types of viruses and malware that are used to attack your computer:


Spyware
Adware
Trojan Horses
Viruses
Email Viruses
Macro Viruses

What are Email Viruses?

Email Viruses

An email virus is a virus that is distributed through the use of emails, most frequently as an attachment to an email.

When the unsuspecting recipient opens the attachment to the email, the virus is released onto his or her computer. Most email viruses consist of a macro virus that enters the address book on your computer and then spreads itself to all of your contacts.

The virus then automatically sends emails from your computer to all of the contacts in your address book, such as your family, your friends, and your associates. Anyone receiving "your" email, who opens the attachment of the infected mail, automatically has them same cycle occur in his computer. Such a virus can thus spread rapidly to many computers, in a matter of hours.

What is Spyware?

Spyware

Spyware another form of malware, which does exactly what its name implies. It spies on you through the use of your computer. Twenty years ago only a subject of science fiction, it is today a hard reality.

Spyware consists of a computer program that collect personal information or other data stored on your computer, and then sends it to the originator of the spyware.

There are several methods used by spyware in order to secretly collect information. Some of these are as follows:

  • "Key logging" is a method by which the spyware keeps track of what keys you strike while you are at your computer. This is useful for detecting passwords, credit card numbers, bank account numbers, and other personal information.
  • Other spyware keeps track of your web browsing habits, which can then be used to build a personal profile of you, discovering your interests, who you contact, and what you visit. When this data is transmitted it can then be sold to advertising agencies, who can then use it to send tailored advertising to you.
  • Another form of spyware can simply scan your hard disk and send copies of your files to the originator of the spyware.
  • Some companies incorporate forms of spyware into their software, which give feedback to the company of your use of their programs. These are not considered malware or harmful software. But these programs still watch your computer activity and keep track of your usage, usually without your knowledge. While this might be considered "legitimate," it is, however still an invasion of your privacy if you have not given your express consent. In any case, this practice uses your computer resources for somebody else's gain.

While the above explanations and descriptions are far from complete, it does serve to give a general picture of what forms computer viruses, malware and spyware can take.

What is a Trojan Horse?

Trojan Horses

"Trojan Horses" are named after the Greek legend of the Trojan Horse. The Greeks, at war with the City of Troy, had been unable to get beyond the walls to enter the city. So they built a large wooden horse, and hid a some of their soldiers inside. They pretended that the horse was a gift to the Trojans. When the people of Troy saw the horse, they opened the gates and moved the horse into their city. At night the Greeks came out of the wooden horse and opened the city gates. The Greek army stormed into the city and Troy was defeated.

Similar to the Greek legend, we define a Trojan Horse as a computer file or program which seems to be useful, needed, or wanted, but which is, in actual fact, a harmful file or program. A Trojan horse looks like it is doing something innocent, such as showing a picture inside an e-mail or installing a screen saver. But in fact it is also doing something else - such as erasing files, or secretly sending information stored on your computer (such as passwords and other personal information) to the hacker who wrote it.

One key factor which makes a Trojan (as it is called for short) different from other malware is that the person receiving the file or program has to activate it before it can begin to operate. In order to get the user to activate it, the creator of the Trojan might disguise it as a screen saver and offer it on the web as a free screen saver. When one downloads the screen saver and activates it on one's computer, one sees a nice screen saver. But meanwhile, in the background, invisible to you, another program starts running and starts sending your personal data to some other site.

There are many ways to disguise such a harmful program. Common examples are: free games, screensavers, free tools for your computer, free videos or music files, free pictures of barely dressed females (which some males find really hard to resist:) and so on.

So a Trojan is called a Trojan, because, for it to work, it has to trick the person receiving it into activating the program and running it on their computer. Children and teenagers are particularly vulnerable to this sort of malware, as they are easy to entice with "free" games or cool videos. They are also least likely to be informed about the ramifications of Trojans.

New Antivirus Blog

This is a new blog about Internet Security and Antivirus. It is written with the intention that ordinary people who are not computer experts will be able to understand it. As I add more content I will also add more features, such as a subscription box and additional links. But for now, if you like the blog, please feel free to bookmark it and tell your friends.

Reviews of Antivirus Software

Reviews of Antivirus Programs

Some of the common Antivirus programs are as follows:

Kaspersky Antivirus and Internet Security

AVG Free Anti-Virus and Internet Security

Trend Micro

Panda Security


Norton Antivirus by Symantec

McAfee


Whereas Norton and McAffee are some of more well known antivirus programs, they are not necessarily the best. They tend to take up a lot of your computer power, and sometimes cause problems running other programs.

When I had Norton Internet Security (which includes Norton Antivirus) installed on my computer, I noticed that the program took up A LOT of memory; running several processes at all times on my computer, and slowing the shut-down process. At one point the "System Restore" function of my computer did not work and it was only remedied by removing Norton! I often got messages from my Norton Anti-Virus, which I could not understand or figure out. The program asked me to make choices which I didn't understand.

McAffee created problems on one computer I had, where it would not allow the wireless Internet connection to work, no matter what I did. When I tried to uninstall McAffee, it was almost impossible, and it took me weeks to figure out a round-about method of getting it off my computer. On another computer I had, I also could not get McAffee uninstalled, and it continued to send me pop-up messages for years (much to my annoyance)!

Features to Look for When Buying Antivirus Software

Choosing Antivirus Software

Before buying antivirus software, there are several factors to look at; in order to ensure that you get the best possible protection for yourself, your family, your business, and your computer.

To make an informed choice when selecting computer security and antivirus software, it helps to know a bit about computers and what threats there are to computers.

In this page I will try to give you a basic overview of these factors, without going into needless technical detail. As the information on this blog intended for the average person, I try to steer clear of to much technical terminology. But where I must use it, I will attempt to explain it in simple, everyday language.

First of I want to explain some of the common threats to the security of your computer or network.

Viruses


In modern times, most people are aware to one degree or another of computer viruses. But exactly what are computer viruses?

Viruses are essentially computer programs written to cause harm and damage your computer. Viruses have the ability to open normal programs, files or documents, and copy themselves or parts of themselves into them.

When you access an infected program, file or document, you also activate the virus program without knowing that you are doing so. Some viruses lodge themselves into the memory of your computer, and access files every time you or your computer opens a document.

What happens when you open a program or document infected by a virus? That depends on what the virus is designed to do. Some erase files, some erase parts of files, some are designed to damage your computer operating system, and some are designed to simply fill your computer with unwanted garbage - making it impossible to operate your it.

Whatever a virus is designed to do, one thing is clear: you do not want one in your computer or on your network.

Because today's computer programs have become more and more complex, allowing more and more automated functions, there is an increased opportunity to create harmful code ("code" is a term used to describe a set of instructions for the computer to follow, written in computer programming language).

Malware

Harmful software is also referred to as "malicious software." "Malicious" means "intending to cause harm" and comes from the Latin word "malus," which means "bad." The term "malicious software" has also been shortened to the term "malware." One can define "malware" as "software that is bad or causes harm."

In earlier times, the only way to give a computer a virus, was by inserting an infected floppy disk into your computer. Today, with much more advanced technology, almost every computer is interconnected to the rest of the world, one way or the other. On top of all this, advancement in software and computers have also opened the door to new types of malware.

With these advancements in harmful or dangerous software, the term "virus" has come to mean all types of software or programs that are used to harm you or your computer. Next we will look into some of the other types of viruses and malware that are used to attack your computer.

Macro Viruses

One way of covertly introducing viruses into a computer is through the use of a MACRO. A macro consists of several instructions grouped together which then carry out a series of instructions. Macros are normally very useful tools, that make working with computer programs easier.

Common examples macro functions are: automatically inserting the date and time into your document, displaying a picture in your document, adding a sound to your document, or automatically calculating something in a spreadsheet. To perform these functions, the computer has to follow quite a set of complicated instructions. These are called macros.

Sadly, macros can also be used to cause harm to your computer or files. When a macro is used this way it is called a virus. When a macro is inserted to cause harm, it might not even be visible; or might be disguised as something desirable such as an innocent picture.

Far from all viruses in the form of macros. Some viruses come in the form of program files, where the virus file is made to look like part of a computer program. Other Viruses are disguised as part of the operating system (the operating system is the main program that runs your computer, such as Windows XP, Windows 2000, etc.) This, of course, makes it hard for someone who is not a computer technician to detect and fix them. And even computer technicians can be hard put to find and handle them. That is why we use antivirus programs.

Email Viruses

An email virus is a virus that is distributed through the use of emails, most frequently as an attachment to an email.

When the unsuspecting recipient opens the attachment to the email, the virus is released onto his or her computer. Most email viruses consist of a macro virus that enters the address book on your computer and then spreads itself to all of your contacts.

The virus then automatically sends emails from your computer to all of the contacts in your address book, such as your family, your friends, and your associates. Anyone receiving "your" email, who opens the attachment of the infected mail, automatically has them same cycle occur in his computer. Such a virus can thus spread rapidly to many computers, in a matter of hours.

Trojan Horses

"Trojan Horses" are named after the Greek legend of the Trojan Horse. The Greeks, at war with the City of Troy, had been unable to get beyond the walls to enter the city. So they built a large wooden horse, and hid a some of their soldiers inside. They pretended that the horse was a gift to the Trojans. When the people of Troy saw the horse, they opened the gates and moved the horse into their city. At night the Greeks came out of the wooden horse and opened the city gates. The Greek army stormed into the city and Troy was defeated.

Similar to the Greek legend, a Trojan Horse is a computer file or program which seems to be useful, needed, or wanted. But in actual fact it is a harmful file or program. A Trojan horse looks like it is doing something innocent, such as showing a picture inside an e-mail or installing a screen saver. But in fact it is also doing something else - such as erasing files, or secretly sending information stored on your computer (such as passwords and other personal information) to the hacker who wrote it.

One key factor which makes a Trojan (as it is called for short) different from other malware is that the person receiving the file or program has to activate it before it can begin to operate. In order to get the user to activate it, the creator of the Trojan might disguise it as a screen saver and offer it on the web as a free screen saver. When one downloads the screen saver and activates it on one's computer, one sees a nice screen saver. But meanwhile, in the background, invisible to you, another program starts running and starts sending your personal data to some other site.

There are many ways to disguise such a harmful program. Common examples are: free games, screensavers, free tools for your computer, free videos or music files, free pictures of barely dressed females (which some males find really hard to resist:) and so on.

So a Trojan is called a Trojan, because, for it to work, it has to trick the person receiving it into activating the program and running it on their computer. Children and teenagers are particularly vulnerable to this sort of malware, as they are easy to entice with "free" games or cool videos. They are also least likely to be informed about the ramifications of Trojans.

Spyware

Spyware another form of malware, which does exactly what its name implies. It spies on you through the use of your computer. Twenty years ago only a subject of science fiction, it is today a hard reality.

Spyware consists of a computer program that collect personal information or other data stored on your computer, and then sends it to the originator of the spyware.

There are several methods used by spyware in order to secretly collect information. Some of these are as follows:
  • "Key logging" is a method by which the spyware keeps track of what keys you strike while you are at your computer. This is useful for detecting passwords, credit card numbers, bank account numbers, and other personal information.
  • Other spyware keeps track of your web browsing habits, which can then be used to build a personal profile of you, discovering your interests, who you contact, and what you visit. When this data is transmitted it can then be sold to advertising agencies, who can then use it to send tailored advertising to you.
  • Another form of spyware can simply scan your hard disk and send copies of your files to the originator of the spyware.
  • Some companies incorporate forms of spyware into their software, which give feedback to the company of your use of their programs. These are not considered malware or harmful software. But these programs still watch your computer activity and keep track of your usage, usually without your knowledge. While this might be considered "legitimate," it is, however still an invasion of your privacy if you have not given your express consent. In any case, this practice uses your computer resources for somebody else's gain.
While the above explanations and descriptions are far from complete, it does serve to give a general picture of what forms computer viruses, malware and spyware can take.

Protection


A full detailed description of all methods, viruses, malwares, and spywares, would practically fill an encyclopedia. The above description only serves to bring about a general awareness on the subject.

To protect yourself from viruses, malware, trojans, spyware, and so forth, it is important to have an antivirus program running that protects your computer.

There are two types of antivirus programs. Both detect and handle viruses, but they use different methods to accomplish this.

The first one keeps a list of known viruses and virus types, called "virus definitions." T his list of virus definitions is called a virus library. The program scans everything entering your computer. Any file, document, or program that enters your computer is inspected and compared to the virus definitions in its library, to see if it matches any of the "virus definitions."

One disadvantage of this system is that, if a new virus comes out which is different
from the viruses stored in your library, this antivirus program will not detect it, and will allow it onto your computer.

When using such a program, it is important to have a subscription and to be connected to the Internet, so that your virus definitions are constantly updated. New viruses come out every day. If you choose such a program, one of the things to check for is how often the virus definitions are updated. This will play an important role in keeping you and your computer secure.

The second type of anti-virus program is called a HEURISTIC program. "Heuristic" means "learning by discovery or by trial and error." It comes from the Greek word "heuriskein," which means "to discover".

In other words, the program is capable of discovering new viruses not already known. It is written in such a way that it is able to learn and discover new viruses, without having to refer to a library. This program will most likely also have a library of virus definitions. But in addition to detecting already known viruses, it is able to detect new viruses, and is therefore a more secure program.

One final thing to take into account, when choosing an antivirus program, is how much computer power your anti-virus program uses. It is all fine to have the biggest antivirus program in the world, but that might not leave much computer power left for you to run your other programs. This is one of the most important factors for you to take into account.

Otherwise, you may run into a situation where, instead of viruses slowing your computer down, your antivirus program is slowing your computer down!

There are many companies that specialize in these programs. Some of the more well known ones are Norton Antivirus, Trend Micro, Panda Anti-Virus , McAfee, and Kaspersky Antivirus.

There are several free antivirus programs, one of which is AVG Free Edition. You can also get free adware removal programs such as "Ad Aware" and Spybot Search and Destroy.

For my own reviews and experience with different Antivirus programs, please see the post here.

I would not necessarily say that "any antivirus program is better than no antivirus program." Free antivirus programs are not as secure as the ones you pay for, and can lead one to have a false sense of security. But this is, of course, personal choice, and I leave it up to the individual to decide what he thinks is best for himself.

I would, however, like to comment that the antivirus programs that you pay for are most likely invest more time and money into staying up to date and ensuring that their products meet higher standards than those of the programs which are free. It is simply a matter of available resources.

Having said that, the big name-brand antivirus programs are not necessarily the best antivirus programs. While Norton Antivirus is one of the better known antivirus programs, this is largely due to the fact that Norton has been around for a long time and has good marketing campaigns - not because of its performance.

Factually, Norton Antivirus takes up a lot of memory and computer resources. It is also known to cause bugs in some systems, and it is not the highest scorer in comparison charts. McAfee scores slightly higher than Norton, but also known to cause other problems, as well as being heavy on your system.

Kaspersky Antivirus, while not as well known as the others, generally scores high in charts and uses a minimum amount of resources. This is one I would recommend if I were asked. However, as I said before, I leave the choice up to the individual as to what program they should get.

If you want to find out for yourself, you can always check on a computer forum, or download trial versions and compare them. A word of caution - if you download a trail version - Norton, and especially McAffee, can be very hard to remove from your computer.

Okay, I hope you have a better understanding of computer viruses and computer security.

Best,


Anna