CollectionMine

… online data backup solutions and storage

admin2 On March - 9 - 2011

offsite data backup

Every single day there are brand new computer viruses created to mess with us and our computer systems. It is undeniably a fact of life. Approximately 7% of all data loss worldwide is caused by viruses. It translates into millions of computers and billions of computer files being affected, damaged or destroyed.

It is impossible to keep track of all of the viruses out there as the list is ever growing. What we can do is let you know what six of the most destructive and prevalent viruses are.

Trojan.Lodear

This is a Trojan horse that attempts to download remote files. (A Trojan horse is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user’s computer system.) This particular Trojan horse will inject a .dll file into the EXPLORER.EXE process causing system instability.

Backdoor.Zagaban

This is another Trojan horse. This one allows the infected computer to be used as a covert proxy and may degrade network performance. (A covert proxy is a server that mirrors webpages without accessing the websites themselves, allowing visitors to mask or hide their true Internet identities.)

W32.Beagle.CO@mm

This is a mass-mailing worm that lowers security settings. (A computer worm is a self-replicating malware computer program. It uses a computer network to send copies of itself to other computers.) This one can delete security-related registry sub keys and may block access to security-related websites.

W32/Netsky-P

This one is a mass-mailing worm which spreads by emailing itself to addresses produced from files on your computer.

W32/Mytob-GH

This is another mass-mailing worm. Messages sent by this worm will have the subject chosen randomly from a list including titles such as: Notice of account limitation, Email Account Suspension, Security measures, Members Support and Important Notification.

W32/Netsky-D

This is a mass-mailing worm with IRC backdoor. IRC is Internet Relay Chat which refers to Internet text messaging programs that allow you to chat with other people. The term backdoor refers to a malicious program that opens a backdoor or a security hole on your computer. This backdoor can be used by a hacker to access your personal information, change your system configurations and download additional malicious programs onto your computer.

These then are the top six to watch for. The best advice we can give is to stay vigilant and keep your antivirus software up-to-date.

We also strongly recommend that you protect and keep your valuable and irreplaceable computer files out of harm’s way by using CollectionMine’s remote data storage software. No matter if your computer is infected by a virus or stolen by thieves or destroyed in a disaster, your computer files will be safe and retrievable, stored in a world class data centre.

offsite

Comments are closed.

Search the Site

    Free Tip Sheets


    What to Store?

    offsite data backupoffsite data backup

    Digital & scanned artwork, thesis, manuscript, novel, journal, books

    offsite data backupoffsite data backup

    Pedigree, pet insurance, license, adoption papers, digital & scanned photographs

    offsite data backupoffsite data backup

    Contact information, house insurance, mortgage, rental & renovation contracts

    offsite data backupoffsite data backup

    Homemade & downloaded movies, videos, recorded & downloaded music, musical scores, lyrics

    offsite data backupoffsite data backup

    Passport, itinerary, ID, citizenship documents, travel visa, digital files