• Hithawathi
    • Hithawathi TEENS HUB
    • About Us
    • Our supporters
  • Help Centre

    Caution!

    • COVID-19 Cyber Attacks
    • Cyber security tips
    • Cyber security threats
    • Security Alerts

    Know More

    • Knowledge Base
    • Social Media
    • Parents Guide
    • Children’s Guide
    • How to get help

    Observation

    • Real time cases
    • Videos
    • Newspapers

  • How to get help
  • News and Events
  • e-Library
    • Monthly Newsletter
    • Cyber Security Booklet
  • Contact
    • FAQ
Are you lost in cyberspace? 011-421-6062 help@hithawathi.lk
Get Cyber security Booklet Cyber Security Alert!
Please note that Hithawathi services will be limited or delayed on 25th March 2023 from 12.30pm to 5.00pm. Please kindly bear with us. If you are unable to contact us immediately via phone or instant messaging services, please do send us an email to help@hithawathi.lk or a message via Whatsapp / Viber (+94 77 771 1199) or a message via FB Messenger (https://www.facebook.com/hithawathi). We will get back to you as soon as possible.
We value your feedback
  • සිංහල
  • தமிழ்
Hithawathi
  • Hithawathi
    • Hithawathi TEENS HUB
    • About Us
    • Our supporters
  • Help Centre

    Caution!

    • COVID-19 Cyber Attacks
    • Cyber security tips
    • Cyber security threats
    • Security Alerts

    Know More

    • Knowledge Base
    • Social Media
    • Parents Guide
    • Children’s Guide
    • How to get help

    Observation

    • Real time cases
    • Videos
    • Newspapers

  • How to get help
  • News and Events
  • e-Library
    • Monthly Newsletter
    • Cyber Security Booklet
  • Contact
    • FAQ

Identify Computer Virus

  • Home
  • Help Centre
  • Knowledge Base
  • Identify Computer Virus

Last updated on August 14, 2021

What is a Computer Virus?

A computer virus is a small program that can be spread from one computer to another and can even affect a computer’s operations. Such viruses can modify or destroy any data stored on a computer. Most viruses nowadays are executable files that attach themselves to emails and spread from one computer to another. Once executed or opened, these viruses will spread to other applications or computers.

Most common forms of Viruses

There are several types of viruses, or malware, which includes Spyware, Adware, Trojan Horses, and Worms. All these types of malware can destroy or steal your data without your knowledge.

Spyware – One of the most common types of viruses. These collect user data/information and details on the operation of computers without the knowledge of the computer’s owner/user (This might include data or services accessed, web browsing data, etc.).

Adware – These display advertisements on your display by installing itself on a computer without a user’s permission. Adware will track internet usage data and habits of the user.

Trojan Horses – This type of virus cannot self-activate, and are harmful programs that disguise themselves as useful at first, but will collect personal data in the background and wait for an exact date or time to begin exploiting and harming the computer.

Worms – These are different from traditional viruses. They do not need human interaction to spread from one computer to another. Worms have the ability to self-activate within a computer. For example, they will create thousands of copies of itself and send emails to all email addresses in the computer’s address book. This will repeat in other computers, and due to this, worms can spread automatically at a rapid rate within a computer network.

How do viruses enter a computer?

Computer viruses can be easily spread via emails and email attachments. Most email viruses are disguised in a very attractive manner (e.g. photos, audio and video files, e-greetings cards etc.). Unwitting users can fall prey to such tricks perpetrated by attackers. Users must be very careful when opening suspicious emails, and those from unknown parties. It is better to avoid opening them. One should also be careful when downloading files from the Internet, as they may contain viruses.

Symptoms of a virus infection on a computer

  • The computer will start to slow down without good reason
  • The computer will abruptly restart itself often and will show abnormal behavior
  • Applications installed on the computer will not function as expected
  • There might be unusual (typically badly written) error messages.
  • There might be new shortcuts or other icons in the computer that were not created by the user
  • Users may find that their files or applications have been deleted without their permission.

How can a computer be protected from virus attacks?

  • Use a firewall when using the Internet
  • Update all software and the operating systems on all computers when necessary
  • Use an up-to-date anti-virus software
  • Do not open emails that are received from unknown sources
  • Do not open unknown attachments or content (links etc.) even from a known source
  • Complete a virus scan before opening any email attachments
  • Do not visit unknown or suspicious websites
  • Do not share your personal details with unknown parties or services (your email, bank accounts, credit card numbers etc.)
  • Use trusted websites to download applications or content

What is a firewall?

A firewall is a software or a hardware device that checks information that is received from the Internet or a network, and either blocks it or allows it to pass through to a computer, depending on the firewall settings. For example, a firewall can help prevent hackers or malicious software (such as worms) from gaining access to your computer through a network or the Internet. A firewall can also help stop your computer from sending malicious software to other computers.

Users can install a firewall to their personal computers to protect them from virus attacks from the Internet. A firewall checks all data going through it and allows it to reach its destination, or denies data from reaching the destination, depending on the set of rules defined by an authorized user.

What is an Anti-Virus software?

An anti-virus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software such as viruses and worms. Up-to-date anti-virus software helps users against the latest virus threats.

How does anti-virus software work?
Anti-virus software typically uses two different techniques to find and remove viruses:

  • Virus Dictionary Approach
  • Suspicious Behavior Approach

Virus Dictionary Approach

In the virus dictionary approach, when an anti-virus software examines a file, it refers to a dictionary of known viruses that have been identified by the author of the anti-virus software. If a piece of code in the file matches any virus identified in the dictionary, then the anti-virus software can then either delete the file, quarantine it so that the file is inaccessible to other programs and the virus is unable to spread, or attempt to repair the file by removing the virus itself from the file. To be successful in the medium and long terms, the virus dictionary approach requires periodic online downloads of updated virus dictionary entries. This will minimize the risk of known virus attacks on your computer.

Suspicious Behavior Approach

The suspicious behavior approach, by contrast, doesn’t attempt to identify known viruses, but instead monitors the behavior of all programs. If a program tries to write data to another executable program, for example, this is flagged as suspicious behavior and the user is alerted to this, and asked what to do. Unlike the dictionary approach, the suspicious behavior approach therefore provides pro-active protection against brand-new viruses that do not yet exist in any virus dictionaries.

Factors to be considered when selecting anti-virus software

Today, there are a lot of anti-virus software product companies. Selecting an anti-virus software to protect a computer will depend on users’ requirements. There are, however, some considerations to be made when selecting an anti-virus software.

  • Whether it can update itself automatically
  • Whether the software product owner is provided a detailed updates summary
  • Whether the software can be integrated with the email software
  • Whether it can scan for viruses automatically
  • Whether the software product owner is provided accurate and updated information about new viruses

Some of the most popular and commonly used anti-virus software today

  1. Bitdefender
  2. Norton
  3. ESET NOD32
  4. Webroot
  5. Kaspersky
  6. Trend Micro
  7. Avast
  8. Avira
  9. Panda
  10. AVG
  11. McAfee
  12. VIPRE

If you have any questions, please inform us

Phone: (011) 421-6062
Email: help@hithawathi.lk

This document was prepared by the Training Division of LK Domain Registry in collaboration with TechCERT. For more details please visit http://www.nic.lk/index.php/outreach/training-materials.

  • Special Warning
  • Defense Against COVID-19 Cyber Threats
  • How to be safe during this disasters situation
  • How to save your child from cyber crimes
  • Covid-19 Cyber Threats
  • What you should do?
  • How to report to Hithawathi
  • Tell IGP
  • Child Hotline
  • Useful Contact Information
  • Identify, prevent Internet Theft
  • Cybersafety Tips 1
  • Cyber Safety Tips 2
  • Password Part 1 – Selecting a strong password and protecting it
  • Your Safety in Cyber Space
  • What is Two-Factor Authentication?
  • Internet Safety Tips for Children and Teens
  • Spam vs. Scam
  • Work From Home Tips
  • Password Part 2 – How to remember difficult passwords in an easy way
  • Cyber Security Threats in 2020 – 01 – Deepfake
  • Cyber Security Threats in 2020 – 02 – 5G
  • Special Warning
  • Receiving OTP (One Time Password) via a Local Private Number
  • Google Patches High-Severity Flaws in Google Chrome
  • Cyber Security Alert
  • Apple Release Urgent Patches for two Zero-Day Flaws
  • Identify Computer Virus
  • Is Internet good or bad?
  • Internet Frauds
  • Safety on Your Email
  • How to secure your email account?
  • Why can’t I receive or send an e-mail?
  • You Decide whether it is a Fake or a Real Weblink/URL!
  • How to tell if an e-mail is a scam
  • What are scams
  • Social Engineering
  • Report a video
  • Report a thumbnail
  • Report a comment
  • Report a live chat message
  • Report a channel
  • How to change the number on WhatsApp account?
  • How to delete the WhatsApp account?
  • How to block WhatsApp contacts?
  • How to configure privacy settings on WhatsApp?
  • How to configure security settings on WhatsApp?
  • WhatsApp Hacking
  • How to secure your WhatsApp account from social hacking
  • Reporting on WhatsApp
  • How to configure two-step verification settings on WhatsApp?
  • WhatsApp group settings
  • How you can protect your privacy while using Viber?
  • How to back up your Viber chats?
  • How to deactivate a Viber account?
  • Reporting on Viber
  • Admin Controls in Viber Groups
  • Imo
  • How to delete an IMO account?
  • How to Block an IMO chat?
  • How do you report a fake account (impersonating you / pretending to be you) on Instagram?
  • How do you report a post or profile for abuse or spam on Instagram?
  • Do you think your Instagram account has been hacked?
  • How do you report a hacked account on LinkedIn?
  • How do you report inaccurate information on another member’s profile on LinkedIn?
  • How do you report a fake profile on LinkedIn?
  • How do you file a report when a Tweet is abusive
  • How do you report an impersonation violation (fake account) on Twitter?
  • Is your Twitter account hacked?
  • How to report Inappropriate Content on TikTok?
  • If your TikTok account is hacked
  • How to report fake / impersonating accounts on TikTok?
  • Privacy and Safety
  • Reporting

  • Login and Password
  • Your Profile and Settings
  • Names on Facebook

  • What names are allowed on Facebook?
  • Which name should I use on Facebook?
  • How do I add or edit a language-specific name?
  • What if I have one name instead of a first name and a last name?
  • Changing your name or adding additional names

  • Keeping Your Account Secure
  • Notifications
  • Ad Preferences
  • Accessing & Downloading Your Information
  • Deactivating or Deleting Your Account

  • I deactivated my account. How do I reactivate it?
  • How do I permanently delete my Facebook account?
  • Can I remove the account of a friend or family member who’s medically incapacitated?

  • Reporting Abuse

  • Reporting a Privacy Violation
  • Hacked and Fake Accounts

  • Hacked Accounts

  • You think your account was hacked or someone is using it without your permission.
  • You think your friend’s account was hacked.

  • Impersonation Accounts

  • How do you report an account for impersonation?
  • How do you report an account or Page that’s pretending to be you or someone else?
  • How do you request information about a timeline that was impersonating you?

  • Fake Accounts

  • Managing a Deceased Person’s Account
  • Uploading Your ID
  • Intellectual Property

  • Overview

  • What types of things aren’t allowed on Facebook?
  • What types of behavior does Facebook identify as abusive?
  • Does Facebook allow photos of mothers breastfeeding?
  • Does Facebook allow post-mastectomy photos?
  • Why does Facebook limit the use of certain features and what are the limits?
  • Does Facebook consult with any external groups to inform its policies?
  • Are firearm sales allowed on Facebook?
  • Account Info
  • Can I create a joint Facebook account or share a Facebook account with someone else?

  • Your Privacy
  • Staying Safe
  • Keeping Your Account Secure
  • Unfriending or Blocking Someone

  • Unfriend
  • Block

  • What is blocking and how do you block someone?
  • After you block someone, can you see anything about that person?
  • How do you block someone from following you?
  • How do you block messages from someone on Facebook?
  • What is unblocking and how do you unblock someone?

  • Take a Break

  • How do you take a break from someone on Facebook?
  • Can you limit who can see your past posts?
  • Your romantic relationship ended. What can you do?
  • Who can see when you change your relationship status?
  • How can you stop someone from contacting you?

  • Hacked and Fake Accounts

  • Hacked Accounts

  • You think your account was hacked or someone is using it without your permission.
  • You think your friend’s account was hacked.

  • Impersonation Accounts

  • How do you report an account for impersonation?
  • How do you report an account or Page that’s pretending to be you or someone else?
  • How do you request information about a timeline that was impersonating you?

  • Fake Accounts

  • Inheritance scams
  • Rebate scams
  • Nigerian scams
  • Unexpected prize and lottery scams
  • Travel prize scams
  • Classifieds scams
  • Overpayment scams
  • Health & medical products
  • False billing
  • Online shopping scams
  • Psychic & clairvoyant
  • Mobile premium services
  • Investment scams
  • Betting and sports investment scams
  • Jobs and employment scams
  • Pyramid schemes
  • Identity theft
  • Phishing
  • Hacking
  • Remote access scams
  • Malware & ransomware
  • Threats to life, arrest or other

Hithawathi

A Project Funded by
LK Domain Registry

Quick Links

Sri Lanka CERT|CC
TechCERT
Internet Crime Complaint Centre
     
    Instagram 

Our Supporters


Contact Us

Phone:011-421-6062
Email:help@hithawathi.lk
WhatsApp / Viber:
+94 77 771 1199

BUSINESS HOURS
Weekdays 08.30 am – 07.00 pm
Saturdays 08.30 am – 05.00 pm
Closed on Public holidays.

(Calls may be recorded for training and quality purposes)

Copyright © 2023 Hithawathi. All Rights Reserved.

Terms and Conditions | Privacy Policy

Become a partner ?
Just call us 011-421-6062