You might want to invest in an Anti-Virus
software package as well, but use your mind
first! Do not play with strange programs on a system that contains
sensitive data (even a single network password would qualify as that). Unless
you wouldn't mind anyone in the world looking through your files (under your
real name), I'd suggest you remember that old phrase, "Why take chances?"
Running a dubious (questionable) program on your system means that you must
also be able to live with the chance that your hard drive(s) could be completely
erased. Or, that your personal data (and/or passwords) could be collected
and used for criminal activites; or possibly even worse, used against
you personally!
Just as it would be very unwise to believe
everything you've ever read on the Internet (or in print for
that matter), you'd also be ill-advised to put all your trust in any
virus scanning program(s).
Regarding the first issue,
note that I said the author (programmer) must be trusted,
and not just the site that is distributing the program. It is possible
that a new virus/trojan could be placed on a major download site if
people are not careful in "checking out" its author. Sites vary
a lot, and even if they say otherwise, may leave all the checking up to
you!
As a former BBS manager, I would never post a new file for downloading until I had established its origins, did a couple different virus checks, and a trial run on a spare machine. Some online websites have a similar attitude, but certainly not all of them. So, try to decrease the chances of infection by learning as much as you think necessary about a program's author and what measures a site takes to help reduce your risk of getting a virus from them. The second issue may
depend upon an ISP's ability to keep crackers from breaking into their
servers and whether or not there is much chance of someone
wanting to do so. Websites which are very critical of crackers, or seemingly
boast about how invulnerable they are, would be the kind they normally
go after: the CIA, FBI, an Internet security company, or some large media
organization. If you believe that you may already
have a virus or trojan on your computer, you should review the notes I
have on checking for one in: Is your computer
free of all trojans? ( Includes free software to help you hunt
for them.) Looking for PGP-signed FilesSometimes a file or program that
is considered to be vital to company or even government operations ( or
to an individual who always practices the ultimate in security!) will
have what's called a 'PGP Signature file' included in its distribution
package or made available at the download site. PGP
is a very reliable encryption program which can also be used to
"sign" files available for download from the Internet.
If the author of a program provides PGP signature files, this might
help to increase your trust in using his/her program. ( There are two
.sig files with my batch program, REG Check
for example. ) See my page: What Is a Computer Virus? for information on anti-virus software and helpful links. |
You can write to me using this: online reply form. (It opens in a new window.)
Helping visitors to this page since April 8, 1999. The Starman.