Preview

Protecting againist macro viruses

Satisfactory Essays
Open Document
Open Document
347 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Protecting againist macro viruses
Protecting Against Macro Viruses
Marques Tate
Rasmussen College

This paper is being submitted on February 23, 2014, for Tina Grezinski’s D181 Excel course.

Protecting Against Macro Viruses Many applications, such as Microsoft Excel and Word, support macro languages. A macro virus attacks these kinds of applications, infecting the documents and template files. So if your computer has a macro virus, and you use a word template file to make a new document, it 'll also become infected by the virus. A macro virus can transfer to other computers and applications through various ways, such as, by opening email attachments, downloading applications, and through networks and modems. A few signs that may mean your computer is being attacked by a virus includes: your computer displays unusual error messages or saves documents as template files, your computer prompts for a password on a file that doesn 't require a password, and your computer runs slower than it usually does. The best way to prevent viruses is to install an antivirus program; these include but are not limited to: Kaspersky, McAfee, and Norton. While these may cost money they are worth the investment. There are some free programs that a person can use and some that even offer a free trial. I researched Norton and it seems to be one of the best antivirus programs available. Prevention is relatively simple once you know a little about macro viruses. Picture attachments (mostly those ending with .jpg or .gif) are safe - malicious code can 't be attached to them. However Word, Excel or PowerPoint documents can have programs included in them and should always be checked for viruses. If in doubt - do a virus scan. It only takes a few moments and won 't hurt the attachment. So in my conclusion the best advice I can give is, don’t open files that you are not sure where they came from. Make sure that the "Always ask



References: Retrieved from: http://www.spamlaws.com/e-macro.html

You May Also Find These Documents Helpful

  • Powerful Essays

    Unit 7 P3 Research Paper

    • 1234 Words
    • 5 Pages

    Virus protection – virus protection protects a computer system from malicious viruses and Trojans and worms which you can be infected by through the internet or email or downloading files or through a USB flash drive etc. virus protection usually consists of a firewall, virus scanner, virus remover and spyware. With virus protection you can perform a scan on your computer to check if you have been infected by any viruses or Trojans or worms. With some virus protections software’s you can scan your computer then it will ask you if you want the viruses removed, also if any programs have been infected the virus protection will ask you if you want the infected program deleted, most virus…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Virus protection comes in many different forms for the level of protection you need. Norton is a company I use and like that I would recommend. A basic package costs $45 but being a business that will use customers credit information I would recommend the highest form of protection that costs $114 for two…

    • 755 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    IS3110

    • 382 Words
    • 2 Pages

    Installing antivirus on workstations will lessen the chance of infections from virus but it will not completely eliminate.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Malware - Can take many forms, but as the name implies, it is malicious software. It can take the form of viruses, bots, spyware, worms, trojans, rootkits, and any other software intended to cause harm. Having proper firewall and security software protection can usually prevent malware from spreading.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Even though Macros do it yourself software is ranked as one of Microsoft’s most useful tools to use. Based on the article by Lenning (2005) the primary security risk for users to know using macros is that many of these sites could have many different types of viruses. It is recommended that one should use caution when opening a new document. You should only open and used a trusted because some files can be corrupted and then they will spread viruses to your computer and most of the time you do not know where they come from. Depending on which version that you are going to use you will get a warning every time for a file that contains a macro. This is done because many times macros can be programmed to act like a virus. Before even considering opening a marcro site one has to remember that it can be dangerous to their computer. Because these viruses that pretend to be a marco they can get into your computer and delete files and cause other damage to your system as viruses are meant to do. It’s a good idea to be careful when you enable macros. There are a couple of ways to help keep your computer safe; I would look at installing the lasts service packs and updates for Microsoft. I would also make sure I had a strong firewall/anti- virus program on my computer. But, the main way to help keep your computer safe I feel is to pay attention to what you are using, what sites, and what you…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    307-Task B

    • 265 Words
    • 2 Pages

    Biv, If your files are stored on computer or other electronic device you should ensure it is password protected and that any removable devices are locked away securely. Usernames and Anti-virus programs also give you better protection. Anti-virus is only effective if you keep it up to…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To avoid this, users have to avoid untrusted websites and make sure to scan small attachments before opening them. Simply, reliable and trusted programs must be downloaded which are anti-virus and anti-spyware programs in order to prevent viruses. Also, users must install programs which scan a computer to detect viruses.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    homework 1

    • 454 Words
    • 2 Pages

    Enable content filtering and antivirus scanning at the entry and exit points of the Internet. Enable workstation auto-scans and auto-quarantine for unknown file types.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Risk Using Macro in Excel

    • 468 Words
    • 2 Pages

    Well I think that keeping control of the macros in the Microsoft programs are very important to the security of the user’s computer. From what I read in the reading and a little research letting the wrong macro get a hold of your computer can be a disruptive to your computer. From what I found out in one of the websites called ComputerWeekly.com Saran(2001), “ an advisory notice by Cert, the security service run by Carnegie Mellon University , has alerted user to a major security oversight in Microsoft Office” (para. 2). This was discovered due to a macro virus that was spread in 1999 to people using Microsoft (Saran,(2001). So with that said the user needs to pay attention to the security setting that Microsoft has implemented.…

    • 468 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    When doing research on how some of the main operations systems play a major role in the success of one’s business. Like Microsoft Words, one of the key tools when creating document needed for letters, resumes, and many other great things. Power Points are a good system when promoting your business, and Excel’s is a great expertise of organizing data, graph data, and to develop professional looking report.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Risks of Macros

    • 300 Words
    • 2 Pages

    A primary security risk in using macros is that macros can be programmed to act like viruses and delete files and cause a lot of damage to your system. Depending on the service pack installed you may get an alert every time you open a file that contains a macro. It would be a good security practice to never enable macros unless you are completely confident and aware of the source. Any unsigned macros are automatically disabled. Any macros that are unknown or downloaded, the Microsoft security system will think it has a virus.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    macros

    • 1080 Words
    • 3 Pages

    A macro is also a set of computer instructions that you can use to record and associate with a shortcut key combination or a macro name (Microsoft). When you press the shortcut key combination or click the macro name, your computer program automatically responds by carrying out the instructions of the macro. In return, this process saves you time by replacing a repeatedly used, and sometimes lengthy series of actions with a shorter action (Microsoft).…

    • 1080 Words
    • 3 Pages
    Good Essays

Related Topics