How to protect your computer from infection with Petya.A virus
- 1. The main rule
- 2 Corollary from the main rule
- 3. Just an important rule.
- 4. Another rule
- 5. Finally, what if everything is bad
Share on Facebook VKontakte Twitter Odnoklassniki
As recent events show, even quite serious companies are not insured from the danger posed by computer viruses and hackers. What to do so that your computer and your business are not affected by hacker attacks?
The previous one (WannaCry), and today's (Petya.A) viruses cause great damage to their “carriers”, but you can easily defend against them. Remarkably, these attacks differ only in the amount of damage: the methods of protection against viruses for users were and remain completely the same.
What happens: the virus is installed on the host computer and sends its own copies to the contacts from the address books on behalf of the owner. If the infected computer is connected to the local network, the virus spreads through it. Then the virus blocks access to all files and requires transferring money to a certain account for unlocking.
The virus runs very quickly, and a single user error can lead to the infection of all computers in the organization.
1. The main rule
Never, under any circumstances, open attachments from letters that came from unknown addresses, “by mistake”, not intended for you, and so on.
2 Corollary from the main rule
Even if the letter is received from a friend of the addressee, it is better not to open the attachment if you have not requested any files. During periods of active spread of viruses (like, for example, now), it is better to spend a minute on a phone call specifying “What did you send me?” Than a lot of time and money to eliminate the consequences of negligence.
EVEN "BEABINED" FILES IN THE "OFFICE" FORMAT, KIND OF * .DOCX OR * .XLS, CAN CONTAIN HARMFUL MACROSES
Installation files (* .exe, * .iso, * .bat) can never be opened.
3. Just an important rule.
Carefully read any pop-up messages from the received files. If you do not know what to choose, choose "cancel". Why is this “office” file requesting permission to access files or to install? Most likely, this is a virus.
4. Another rule
When installing any, even the most proven, applications, do not allow applications to update automatically, but select "manual update". Thus, you protect yourself from viruses distributed through updates (for example, you will not allow updates if there is information everywhere that such an update is harmful).
5. Finally, what if everything is bad
If you think you could catch a virus, disconnect the computer from the Internet and local network (unplug the Wi-Fi and remove all power cords). Next, from a secure device (for example, from a phone), look for a solution to this problem.
Often, such solutions (for example, antivirus updates) appear only a day or two after a massive virus attack, so it is better to follow the simple security measures described above.
Share on Facebook VKontakte Twitter OdnoklassnikiWhat to do so that your computer and your business are not affected by hacker attacks?
During periods of active spread of viruses (like, for example, now), it is better to spend a minute on a phone call specifying “What did you send me?
Why is this “office” file requesting permission to access files or to install?