Thursday 26 May 2011

Most commonly used Security Techniques against viruses.

Virus detection and its removal are mode through an antivirus or with some other security program. Different antivirus programs are available in the market and over Internet. The most common and famous security technique against viruses is as under:

Virus Signature/ Virus Definition

Virus signature is a known pattern of code of a code of a virus program; this pattern is used by antivirus program to detect viruses and then to remove these viruses. You should update virus definition continuously by downloading updates from Internet. This ensures that your antivirus is always able to detect changing viruses.

Inoculation

Inoculation file is separate file created and maintained by antivirus program to record information like file size and file creation date. This information later on is used for virus detection and removal.

Quarantine

Quarantine is a separate area on a hard disk. It contains the infected files and folders that cannot be cleared or deleted by antivirus due to some reason, for example sharing violation or unknown virus for that antivirus.

Recovery Disk

Recovery disk is a removable disk that holds un-infected system commands and startup information. In case the boot record of actual hard disk fails, this recovery disk can be used to start the computer. Afterwards an antivirus program can be used to remove the virus.

Un-authorized access

Accessing a computer system without the knowledge or permission of its user is called unauthorized access. It is always recommended to restrict computer resources with the help of usernames and passwords. These are unique combination of characters to identify users and their secret codes respectively.

Firewall

Firewall is a security system consisting of hardware and software to prevent unauthorized access of a network or computer. Big companies use a separate computer firewall software or hardware to protect their date from unauthorized access. Firewall check outgoing and incoming traffic and manage data access to the authorized users only.

Biometric Devices

A biometric device reads personal characteristics like fingerprints hand structure, facial features, and voice recognition to authenticate a user for any further access to a computer system or other peripheral devices. A biometric device translates the personal characteristics into digital code that is matched to already store user data in that system. If the digital data matches with any of the stored data, it gives access to the person. In case of no match, the access is denied.

Convert FAT or FAT32 File system into NTFS

You can increase the performance of your computer using NTFS (New Technology File System) hard drive volume with windows XP, because this advance file system provides some extra features, for example security, reliability, file encryption and Compression features.

But if you are still using old file systems like FAT or FAT32, you can covert it into NTFS with a simple command. The interesting thing is that you can convert your hard drive volumes file system without losing data on the drive.

Follow the giving steps to convert FAT or FAT32 partition to NTFS:

  • First go to Start button then click on Run option.

  • Now type here “CMD” and press Ok to open command prompt.

  • At the command prompt type convert drive letter name: /fs:ntfs

  • For example if you want to convert drive E to NTFS then the command will be “convert e: /fs:ntfs”.

  • Now restart your computer and enjoy NTFS features, but keep in mind you cannot covert back it to FAT or FAT32 again.

No comments: