1. Don’t run executable (.exe) files from unknown sources, including thoseattached to e-mail or downloaded from Web sites.
2. Don’t open Microsoft Office documents from unknown sources withoutfirst disabling macros.
3. Turn off the Preview and/or HTML mail options in your e-mail clientprogram.
4. Be careful about using diskettes that have been used in other computers.
5. Firewall software should be used and installed.
6. Install antivirus software, configuring it to run scans automatically at predefinedtimes and updating the definition files regularly.
7. Use intrusion prevention tools called behavior blockers that deny programsthe ability to execute operations that have not been explicitly permitted.
8. Use behavior detection solutions such as Fijian’s SurfinGate andSurfinShield that can use heuristic techniques to analyze executable filesand assess …show more content…
For common indications that a virus might be present, Administrators and users need to be on the alert for missing files or programs; unexplained changes to the system’s configuration; unexpected and unexplained displays, messages, or sounds; new files or programs that suddenly appear with no explanation; memory “leaks or unexplained use of disk space; and any other odd behavior of programs or the operating system. If a virus is suspected, a good antivirus program should be installed and run to scan the system for viruses and attempt to remove or quarantine any that are found. in case all these measures fail, all mission-critical or irreplaceable data should be backed up on a regular basis.
To demonstrate that a particular type of virus can be written or created, some virus writers create “proof of concept” viruses that do not cause