Make this page my home page
  1. Drag the home icon in this panel and drop it onto the "house icon" in the tool bar for the browser

  2. Select "Yes" from the popup window and you're done!

November 25, 2008
Print Comment RSS

John Rivera P1 Technology Helpdesk
with John Rivera

P1 Tech Help: Beating computer viruses

Related articles:
“I’m just browsing.”
Grasping ‘control-alt-delete’


The sixth edition of Barron’s Dictionary of Computer and Internet Terms defines a computer virus as a computer program that automatically copies itself, thereby “infecting” other disks or programs without the user knowing it and then disrupts the operation of the computer.

A computer hard drive executes processes; a virus disrupts these processes and functions by overloading the computer processes. The virus instructs the hard drive to execute many processes at the same time or out of order instead of the usual sequential order. Some viruses have been known to actually make a hard drive emit smoke.

Request product info from top Technology companies.
First: *
Last: *
Department: *
Department size: *
Email: *
Zip Code: *
Telephone: *
I recommend or purchase products for my Department: *
Purchasing Timeframe: *
*Required Field

A virus can be introduced almost any software (referred to as malware) or even Microsoft Word documents via ‘Trojan horse’ or ‘computer worm.’ Once downloaded into your computer system, it can lay dormant as long as the writer dictates in the creation of the malware’s code. It can even start its desired effect after several on/off cycles or other function is executed. One of the most common methods a virus causes disruption is by collecting email addresses or other contact information from your computer’s address book, and then replicating and sending itself to the addresses it has collected.

One of the ways to combat the ever-growing group of Trojan horses and viruses is by installing antivirus software. Barron’s defines antivirus software as software that protects a computer from viruses, either by blocking the modification the virus tries to make or by detecting the virus as soon as it enters the computer. It’s illegal to knowingly distribute destructive computer program under common law but as you may well know it is a very hard crime to enforce.

There is a growing list of companies making antivirus software available (some of which is offered for free) but the two major antivirus software developers is McAfee and Norton developed by Symantics. Either of these two programs performs their functions well and offer constant updates.

This antivirus software can be scheduled to scan your computer at certain times or can be used to scan other storage media such as: floppy disks, CD’s, external hard drives, or flash drives. You can even let the antivirus software run in the back ground where it will constantly check your computer as you work.

Because of the proliferation of viruses, many computer companies are now bundling antivirus software with their machines.

Even with the proliferation of effective antivirus solutions, there is one very important carbon-based (human) fix you can use every day: be wary of forwarded emails from friends, family, or familiar-looking addresses. Many times these are viruses that have replicated and sent themselves to the addresses collected from their contact files. If you open the infected email, you start the virus’ cycle all over again. So, if you have antivirus software in your computer and haven’t used it or researched it, open the help file and learn how to use it. A very handy method for stopping virus from infecting your computer (or that of your friends/colleagues) may already be in your computer.  And don’t forget: the antivirus prevention capability stored between your ears is invaluable. 

Stay safe and have a great Thanksgiving.

About the author

John Rivera is a Patrol Officer with the Bremerton Police Department. John’s career BPD started as a Volunteer Reserve Officer and while he volunteered his time as a reserve officer he work as Police Officer at Naval Base Kitsap. He was hired full time in 2006 and attended the Washington State Police Academy. While at the academy, John was selected as the class “Techy” to help with the technologically deficient class instructors. Before John’s law enforcement career, he gained his computer experience through earning a degree in Computer Programming and then working in the computer industry as a Network Administrator and Systems Engineer for several companies. Contact John Rivera

Keep up on the latest products by becoming a fan of PoliceOne Products on Facebook




PoliceOne Offers


Technology Sponsors

Featured Distributor

Featured Products

Ops Force Components: CADmine®, Staff Wizard®, and GeoBalance®

Ops Force Components: CADmine®, Staff Wizard®, and GeoBalance®



TASER X26P Smart Weapon

TASER X26P Smart Weapon




Featured Videos

Top Product Articles

Featured Deals

Featured Product Categories

New Products

Police Technology Questions

PoliceOne Offers