1✦ Windows configuration-Virus spread can be stopped by disabling workstation
vulnerabilities, such as NetBIOS shares. NetBIOS is discussed in more
detail in the "Operating Issues" section of this chapter. A virus can exploit the
trust established between two users when a NetBIOS share is set up between
workstations.
2✦ User training and awareness-Most viruses (as well as worms and Trojan
horses) can be stopped in their tracks by an aware user.
3✦
One may also minimise the damage done by viruses by making regular backups of data (and the operating systems) on different media, that are either kept unconnected to the system (most of the time), read-only or not accessible for other reasons, such as using different file systems. This way, if data is lost through a virus, one can start again using the backup (which should preferably be recent).
4✦
One possibility on Windows Me, Windows XP and Windows Vista is a tool known as System Restore, which restores the registry and critical system files to a previous checkpoint. Often a virus will cause a system to hang, and a subsequent hard reboot will render a system restore point from the same day corrupt. Restore points from previous days should work provided the virus is not designed to corrupt the restore files or also exists in previous restore points.[24] Some viruses, however, disable system restore and other important tools such as Task Manager and Command Prompt. An example of a virus that does this is CiaDoor.
Before you connect your computer to the internet, you should install a firewall. This is a piece of software or hardware that helps protect your PC against hackers and many Computer Viruses and worms. If you have the Microsoft Windows® XP operating system, you can use its built-in Internet Connection Firewall.
There aren't really four steps to protect your computer but the first step is to get an anti-virus program. Second step is to allow automatic updates.
Get really good antivirus/anti-spyware software, like McAfee or Norton. I have included links.
It accepts input, processes data, stores data, and produces output.
what are the four steps of oxidation number
Four Green Steps was created in 2008.
Four Steps to Death was created in 2005.
Four Steps in the Clouds was created in 1942.
what are the four steps in the execution of an after action review
The four steps in the execution sequence of an AAR are:planningpreparingconductingbenefits
Four half steps, or two whole steps.
The four type of pathogens are bacterium, protists, viruses, and fungi. Parasitic worms are NOT pathogens.
Four Steps to Death has 207 pages.
The four steps in the execution sequence of an AAR are:planningpreparingconductingbenefits
The four steps in the execution sequence of an AAR are:planningpreparingconductingbenefits