-Boot Sector Viruses-
Boot sector viruses spread by modifying the program that enables your
computer to start up.
When you switch on a computer, the hardware looks for the boot sector program –
which is usually on the hard disk, but can be on a floppy disk or CD – and runs it. This
program then loads the rest of the operating system into memory.
A boot sector virus replaces the original boot sector with its own, modified version (and
usually hides the original somewhere else on the hard disk). When you next start up,
the infected boot sector is used and the virus becomes active.
You can only become infected if you boot up your computer from an infected disk, e.g.
a floppy disk that has an infected boot sector.
Boot sector viruses were the first type of virus to appear, and they are mostly quite old.
They are rarely encountered today.
- Browser Hijackers-
Browser hijackers change the default home and search pages in your
internet browser.
Some websites run a script that changes the settings in your browser without your
permission. This hijacker can add shortcuts to your “Favorites” folder or, more seriously,
can change the page that is first displayed when you open the browser.
You may find that you cannot change your browser’s start page back to your chosen
site. Some hijackers edit the Windows registry so that the hijacked settings are restored
every time you restart your computer. Others remove options from the browser’s tools
menu, so that you can’t reset the start page.
In every case, the intention is the same: to force you to visit a website. This inflates
the number of “hits” and the site’s ranking with search engines, which boosts the
advertising revenue that the site can earn.
Browser hijackers can be very tenacious. Some can be removed automatically by
security software. Others may need to be removed manually. In some cases, it is easier
to restore the computer to an earlier state or reinstall the operating system.
-Chain Letters-
An electronic chain letter is an email that urges you to forward copies
to other people.
Chain letters, like virus hoaxes, depend on you, rather than on computer code, to
propagate themselves. The main types are:
Hoaxes about terrorist attacks, premium-rate phone line scams, thefts from ATMs
and so forth.
False claims that companies are offering free flights, free mobile phones, or cash
rewards if you forward email.
Messages, which purport to be from agencies like the CIA and FBI, warning about
dangerous criminals in your area.
Petitions. Even if genuine, they continue to circulate long after their expiry date.
Jokes and pranks, e.g. the claim that the internet would be closed for maintenance
on 1 April.
Chain letters don’t threaten your security, but they can waste time, spread
misinformation and distract users from genuine email.
They can also create unnecessary email traffic and slow down mail servers. In some
cases the chain letter encourages people to send email to certain addresses, so that
these are deluged with unsolicited mail.
The solution to the chain letter problem is simple: don’t forward such mail.
-Cookies-
Cookies are files on your computer that enable websites to remember
your details.
When you visit a website, it can place a fi le called a cookie on your computer. This
enables the website to remember your details and track your visits. Cookies can be a
threat to confidentiality, but not to your data.
Cookies were designed to be helpful. For example, if you submit your ID when you visit
a website, a cookie can store this data, so that you don’t have to re-enter it next time.
Cookies also have benefits for webmasters, as they show which web pages are well used,
providing useful input when planning a redesign of the site.
Cookies are small text files and cannot harm your data. However, they can compromise
your confidentiality. Cookies can be stored on your computer without your knowledge or
consent, and they contain information about you in a form you can’t access easily. And
when you revisit the same website, this data is passed back to the web server, again
without your consent.
Websites gradually build up a profile of your browsing behavior and interests. This
information can be sold or shared with other sites, allowing advertisers to match ads
to your interests, ensure that consecutive ads are displayed as you visit different sites,
and track the number of times you have seen an ad.
If you prefer to remain anonymous, use the security settings on your internet browser to
disable cookies.