15. Archivers for Windows - WinZip, WinRar, Computer viruses and antiviruses

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

15.

Archivers for Windows - WinZip, WinRar, Computer viruses and antiviruses

In almost earliest 21st century, hard disk was available with low size and expensive price. From that
there comes the need of software, which can compress the size of file and help in saving the space.
Today WinZip and WinRar are two famous compressor, which are used to compress the file size and
provides some extra benefits and features also. Let us discuss them one by one.
WinZip is the first compression software, which is still popular software since April 1991. First it was
created for file compression but now its facilities range has been increased. You can use it for file
sharing, file management, PDF conversion to Word & vice versa, driver updates registry optimization,
courier and malware protection. This software is available for Mac, Windows, iOS and Android.
Zipping and sending the large size files has become very easy by this software. Moreover, WinZip
email companion version for MS Outlook 2002, 2003 and 2007, MS Word, PowerPoint and Excel for
same described version is also available.
WinRar: WinRar is a new compression and shareware software than WinZip. First time context menu,
archive and spanning options were introduced by WinRar. It is capable of supporting Zip format in
addition to its specific Rar format. WinRar is available in 45 languages for Windows XP or later
versions, Mac, Linux, FreeBSD and Android. This software can unpack 17 archive files. I MB to 1GB
file compression size is available by WinRar. Currently more than 500 million users are using this
software for file compression, transfer, email transmission and organizing data storage. It is an ideal
software for multimedia files as it automatically detect the suitable and best compression method for
your file. Less than 2MB size is not enough size for using this.
There are the main differences between WinZip and WinRar:
 WinRar is available in 45 languages while WinZip is available in just seven languages, which are
six times less than WinRar.
 WinRar provides the options of standard RAR compression and solid compression, which is not
available by WinZip.
 Extract from broken files, separate archive and setting up compression dictionary size is totally
neglected by WinZip but available by WinRar.
 Pause and size setting after each volume available by WinRar not by WinZip.
 Conversion rate of WinZip for text files, word files, bitmap file and 3D CAD files is two time
more than WinRar.
2

 Security features of WinRar are more advanced and protective than WinZip.
 With the help of WinRar you can unpack 17 archive files while WinZip provides just 13 archive
files option.
 WinZip is useful for multi task in addition to simple compression. It offers you conversion of
PDF files to MS Word & vice versa, driver updates and malware protection as well, which is lack
in WinRar.
 WinRar accept the WinZip format but WinZip does not allowed WinRar file format.
For unzip files: Right-click on any archive and choose how you want to extract the files.

For archive documents: Right click on the folder you want to compress and select "add to the
archive".

Enter a value (in Bytes KB, etc) to set the size of the archive, or select a predefined size as a CD,
DVD, etc).
3

Protect your archives with a password: Right click on the folder you want to compress and select
"add to the archive".
In the General tab, click on "Set password":

Repair an archive: Open WinRar and look for your corrupted archive:

 Click on Repair.

Computer viruses and antiviruses

Virus is a small program that penetrates into the computer and performs some action. Virus is a
malicious software, when this program runs, the virus runs. These actions can be either:
 harmless (for instance, show some pictures on the screen, or open / close the drive tray CD-ROM);
 unpleasant (to restart the computer, the output in full screen window, which cannot be closed, write
your own copy at a certain location on hard disk);
 destructive (formatting a hard disk, removing system software).
Viruses are very well camouflaged in the pictures, flash-games and commercials. There are viruses
that infect your computer when the user executes seemingly harmless actions.
How viruses are transmitted from computer to computer
Viruses can find their way onto your computer in many different ways. Viruses can be transmitted
by email, in downloads from the internet, through network connections, by floppy disks or by CDs,
particular those that have been burnt on a computer infected by viruses.
4

A virus can be spread by opening an email attachment, clicking on an executable file, visiting an
infected website or viewing an infected website advertisement. It can also be spread through infected
removable storage devices, such USB drives. Once a virus has infected the host, it can infect other
system software or resources, modify or disable core functions or applications, as well as copy, delete
or encrypt data. Some viruses begin replicating as soon as they infect the host, while other viruses will
lie dormant until a specific trigger causes malicious code to be executed by the device or system.
How do you get a virus:
 When you run the executable file (*.exe, *.com), whose purpose is unknown to you,
 When an infected executable file from an external drive,
 When you open a web page on the Internet,
 When you open the attached file (for example, a file picture),
 When you open a Microsoft Word document or Microsoft Excel, contains macros,
 In addition to the above, there are quite a few other ways to get infected.
Symptoms of Virus Attack:
 Computer runs slower than usual
 Computer no longer boots up
 Computer applications are not working right
 You cannot print
 Screen sometimes flicker
 PC speaker beeps periodically
 System crashes for no reason
 Files/directories sometimes disappear
 You find unusual, error messages
 Strange music or sounds suddenly play from the speakers
 A program you typically use suddenly disappears from your computer without you purposely
removing it
Virus through the Internet: Today almost 87% of all viruses are spread through the internet.
Different Types of Malware: Trojan Horse:
 Covert
 Leaks information
 Usually does not reproduce
Worms:
 Spread over network connection
 Worms replicate
 First worm released on the Internet was called Morris worm, it was released on Nov 2, 1988.
To protect your computer system from such type of malicious code as a virus, you can install and use
an antivirus program. This utility scans hard disk drives for viruses, worms and Trojan horses and
removes, fixes or isolates any threats that are found. Most antivirus programs include an auto-update
feature that enables the program to download profiles of new viruses so that it can check for the new
viruses on your system as soon as they are discovered.
There also exists spyware, these are independent executable programs which are able to monitor
keystrokes, scan files on the hard drive, snoop other applications, install other spyware programs, read
cookies, change the default home page on the Web browser, consistently relaying this information
back to the spyware author who will either use it for advertising purposes or sell the information to
5

another party. Antivirus and antispyware programs work pretty much in the same way, the difference
being the type of malicious file and pattern the program scans your hard drive (including the system
registry) for and detects.
The type of the virus:
1. Browser Hijacker
Imagine typing in an internet address and automatically bouncing through several different sites.
When this happens, a browser hijacker is responsible for the incident. Unfortunately, hijackers are
usually attached to appealing toolbars, programs and other free downloads you choose. They often
have the word "search" in their names. A good security program can detect nearly all of these.
2. File Infector
One of the most common types of computer viruses is a file infector. These viruses attach to host
files, so this means they usually stick to files you use often. Any time you open or run the file, the
virus is running. It can even take over the file completely.
3. Macro Virus
This is another type of file-based virus. It attaches to files made from programs that support macros.
Some examples are Microsoft Excel and Word, and people often unknowingly download them from
email attachments. A good security program scans these types of files before you download them
to detect any threats.
4. Polymorphic Virus
These viruses are harder to detect. This is because security programs scan coding to identify viruses,
but these specific viruses both encrypt and change their coding. They continually changing their
operations over time, which may affect the programs you use.
5. Multipartite Virus
Some types of computer viruses only spread in one way, but these ones spread in several ways.
Their actions usually depend on the form of operating system you use, certain programs on your
computer or your use of specific files. It can have multiple actions, so it is one of the most frustrating
viruses to deal with.
6. Direct Action Virus
Although it was once a devastating form of virus, this type is not as common as was in the past. It
is only active upon execution of the file or program it is attached to. Once the program is not in use,
the virus no longer runs its operations. Most security programs are good at detecting these types of
viruses.
7. Boot Sector Virus
This type of computer virus was more common when floppy disks were popular for booting a
computer. While they are not as common today, this type of virus still exits and causes problems.
If your computer is infected with a boot sector virus, it will run its operations when you start it up.
The program is tied to the boot menu.
8. Web Scripting Virus
These viruses come from the programming used for a site's display. The image placement, videos,
links and layout of a site are all constructed with coding. This can be altered with the intent of
infecting your computer when you click links or watch videos on a malicious site. A site may
unknowingly host malicious codes added by a third party, so be careful about visiting any sites.
Good security programs have features that detect malicious sites while you browse the Internet.
9. Memory Resident Virus
This form of computer virus is very destructive. It embeds itself in the computer's memory to carry
out operations. This means whenever you run your operating system, the virus is working. It has
varying effects, but it will clear up space on your computer for its own use by corrupting and deleting
6

your files.
10. FAT Virus
FAT viruses ruin your file allocation system, which is where information about files and where to
find them exists. It even destroys files and the entire directories for them.
Most types of viruses today only work on Windows operating systems, but there are many for
Android, Macintosh, iOS and even Blackberry. To avoid these destructive viruses, you must always
have a good security program for optimal computer protection. While there are free options, they
come with only minimal protection and require manual updates. Since viruses change quickly and
are a constant threat, you always face a greater risk using the basic free programs. Keep in mind
that even the most trusted sites may still have vulnerabilities, and security breaches in the past have
resulted in devastating effects for many Internet users.
When it comes to the best computer protection, several programs meet the steepest challenges. They
scan downloads and sites in advance. They offer malware detection and removal, block outside
attempts to access your device and have many additional benefits. The peace of mind they offer is
worth every cent.

Top antiviral Programs:


 Kaspersky Antivirus
 Mcafee Antivirus
 Bit Defender 2010
 Quick Heal Antivirus
 VG Antivirus
 Avira AntiVir
 Panda Antivirus
 Avast! Professional Edition
 Dr. Web

You might also like