{"id":422,"date":"2016-04-11T12:30:47","date_gmt":"2016-04-11T17:30:47","guid":{"rendered":"http:\/\/mypcreloaded.com\/?p=422"},"modified":"2017-01-26T16:32:42","modified_gmt":"2017-01-26T22:32:42","slug":"the-best-antivirus-utilities","status":"publish","type":"post","link":"http:\/\/mypcreloaded.com\/?p=422","title":{"rendered":"The Best Antivirus Utilities."},"content":{"rendered":"<p><strong><a style=\"color: blue; text-decoration: underline; text-underline: single;\" href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2372364,00.asp\" target=\"_blank\">Link Here<\/a><\/strong><\/p>\n<p><em>&#8220;&#8221;A <b>computer virus<\/b> is a type of malicious <a title=\"Software\" href=\"https:\/\/en.wikipedia.org\/wiki\/Software\">software<\/a> program (&#8220;<a title=\"Malware\" href=\"https:\/\/en.wikipedia.org\/wiki\/Malware\">malware<\/a>&#8220;) that, when executed, <a title=\"Quine (computing)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Quine_(computing)\">replicates<\/a> by reproducing itself (copying its own <a title=\"Source code\" href=\"https:\/\/en.wikipedia.org\/wiki\/Source_code\">source code<\/a>) or infecting other <a title=\"Computer program\" href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_program\">computer programs<\/a> by modifying them.<sup id=\"cite_ref-Stallings_2012_p.182_1-0\" class=\"reference\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_virus#cite_note-Stallings_2012_p.182-1\">[1]<\/a><\/sup>Infecting computer programs can include as well, data <a title=\"Computer file\" href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_file\">files<\/a>, or the <a title=\"Boot sector\" href=\"https:\/\/en.wikipedia.org\/wiki\/Boot_sector\">&#8220;boot&#8221; sector<\/a> of the <a title=\"Hard disk drive\" href=\"https:\/\/en.wikipedia.org\/wiki\/Hard_disk_drive\">hard drive<\/a>. When this replication succeeds, the affected areas are then said to be &#8220;infected&#8221; with a computer virus.<sup id=\"cite_ref-2\" class=\"reference\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_virus#cite_note-2\">[2]<\/a><\/sup><sup id=\"cite_ref-vx.netlux.org_3-0\" class=\"reference\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_virus#cite_note-vx.netlux.org-3\">[3]<\/a><\/sup><sup id=\"cite_ref-4\" class=\"reference\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_virus#cite_note-4\">[4]<\/a><\/sup> The term &#8220;virus&#8221; is also commonly, but erroneously, used to refer to other types of <a title=\"Malware\" href=\"https:\/\/en.wikipedia.org\/wiki\/Malware\">malware<\/a>. &#8220;Malware&#8221; encompasses computer viruses along with many other forms of malicious software, such as <a title=\"Computer worm\" href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_worm\">computer &#8220;worms&#8221;<\/a>, <a class=\"mw-redirect\" title=\"Ransomware (malware)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Ransomware_(malware)\">ransomware<\/a>, <a title=\"Trojan horse (computing)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Trojan_horse_(computing)\">trojan horses<\/a>, <a class=\"mw-redirect\" title=\"Keylogger\" href=\"https:\/\/en.wikipedia.org\/wiki\/Keylogger\">keyloggers<\/a>, <a title=\"Rootkit\" href=\"https:\/\/en.wikipedia.org\/wiki\/Rootkit\">rootkits<\/a>, <a title=\"Spyware\" href=\"https:\/\/en.wikipedia.org\/wiki\/Spyware\">spyware<\/a>, <a title=\"Adware\" href=\"https:\/\/en.wikipedia.org\/wiki\/Adware\">adware<\/a>, malicious <a title=\"Browser Helper Object\" href=\"https:\/\/en.wikipedia.org\/wiki\/Browser_Helper_Object\">Browser Helper Object<\/a> (BHOs) and other malicious software. The majority of active malware threats are actually trojan horse programs or computer worms rather than computer viruses. The term computer virus, coined by <a title=\"Fred Cohen\" href=\"https:\/\/en.wikipedia.org\/wiki\/Fred_Cohen\">Fred Cohen<\/a> in 1985, is a misnomer.<sup id=\"cite_ref-Ludwig_1998_p.13_5-0\" class=\"reference\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_virus#cite_note-Ludwig_1998_p.13-5\">[5]<\/a><\/sup>Viruses often perform some type of harmful activity on infected host computers, such as acquisition of <a class=\"mw-redirect\" title=\"Hard disk\" href=\"https:\/\/en.wikipedia.org\/wiki\/Hard_disk\">hard disk<\/a> space or <a title=\"Central processing unit\" href=\"https:\/\/en.wikipedia.org\/wiki\/Central_processing_unit\">central processing unit<\/a> (CPU) time, accessing private information (e.g., <a title=\"Credit card\" href=\"https:\/\/en.wikipedia.org\/wiki\/Credit_card\">credit card<\/a> numbers), corrupting data, displaying political or humorous messages on the user&#8217;s screen, <a title=\"Email spam\" href=\"https:\/\/en.wikipedia.org\/wiki\/Email_spam\">spamming<\/a> their e-mail contacts, <a title=\"Keystroke logging\" href=\"https:\/\/en.wikipedia.org\/wiki\/Keystroke_logging\">logging their keystrokes<\/a>, or even rendering the computer useless. However, not all viruses carry a destructive &#8220;payload&#8221; or attempt to hide themselves\u2014the defining characteristic of viruses is that they are self-replicating computer programs which install themselves without user consent.&#8221;<\/em><\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_virus\">https:\/\/en.wikipedia.org\/wiki\/Computer_virus<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>I use AVG Free on my home PC&#8217;s, you should check with your internet provider to see what security software they offer. in Oklahoma Cox Cable offers a free 3-PC license for it&#8217;s customers, I don&#8217;t use it because I don&#8217;t like the firewall program that&#8217;s built into the McAfee Anti-Virus suite. But you have to look out for AVG&#8217;s tricky packaging because you&#8217;ll end up installing the trial version instead of the free version.<\/p>\n<p><strong><a style=\"color: blue; text-decoration: underline; text-underline: single;\" href=\"http:\/\/www.avg.com\/ww-en\/free-antivirus-protection?ECID=ad:go:se:US-EN-XSite-Brand-Free-Search&amp;gclid=CMix7dePh8wCFU1gfgod4GQPnQ\" target=\"_blank\">AVG Free &#8211; Link Here<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Link Here &#8220;&#8221;A computer virus is a type of malicious software program (&#8220;malware&#8220;) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them.[1]Infecting computer programs can include as well, data files, or the &#8220;boot&#8221; sector of the hard drive. When this replication succeeds, the affected &hellip; <a href=\"http:\/\/mypcreloaded.com\/?p=422\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">The Best Antivirus Utilities.<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[3],"tags":[],"class_list":["post-422","post","type-post","status-publish","format-standard","hentry","category-windows"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7mJWO-6O","_links":{"self":[{"href":"http:\/\/mypcreloaded.com\/index.php?rest_route=\/wp\/v2\/posts\/422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/mypcreloaded.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/mypcreloaded.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/mypcreloaded.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/mypcreloaded.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=422"}],"version-history":[{"count":8,"href":"http:\/\/mypcreloaded.com\/index.php?rest_route=\/wp\/v2\/posts\/422\/revisions"}],"predecessor-version":[{"id":616,"href":"http:\/\/mypcreloaded.com\/index.php?rest_route=\/wp\/v2\/posts\/422\/revisions\/616"}],"wp:attachment":[{"href":"http:\/\/mypcreloaded.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/mypcreloaded.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=422"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/mypcreloaded.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}