The A,B,C And D Of Conficker Precautions

Conficker precautions

Currently there are four versions or levels of the Conficker Virus — A, B, C, and D – that are steadily infecting Windows’ Operation Systems worldwide.

Conficker affects Windows 2000, XP, Vista and Windows 7 Beta as well some Windows server platforms such as 2000, 2008 and 2008 R2 Beta.

Conficker precautions

Conficker precautions

Basically what the virus does is it disables the computer’s ability to defend itself from malware.

There are Conficker precautions that a Windows user can take in order to prevent any of the Conficker levels from infecting a computer.

Using Windows Live Update

Most private Windows PC owners can prevent the Conficker Virus from attacking their computer by simply making sure that the Automatic Update feature is turned on for their PC.

To do this simply press the “Start” button; open the “Control Panel”; go to “Windows Security Center” and make sure that “Automatic updating” is turned on.

This will ensure that the PC has received the necessary out-of-band patch.

Using Group Policy

Group Policy is a way in which networks can prevent the Conficker Virus from attacking PCs at the workplace.

Using Group Policy will negate Conficker’s activities by removing users from the “Administrator” list. Doing this means that it will be very unlikely for the virus to attack a PC on a network.

Third Party Protection

Third party software developers that specialize in anti-virus and malware protection have developed their own patches that scan for and remove the Conficker worm.

Some of these applications will run the scan automatically and others will have a scan-on-demand feature.

Conclusion

Many people believe that the current levels of the worm are just a prelude of things to come.

By having the Conficker virus already disabling malware protection on a PC, it could leave the PC open to other malware attacks.

It is best to make sure that precautions against Conficker have been taken so that there are no security issues later on.

About Lee Munson

Lee's non-technical background allows him to write about internet security in a clear way that is understandable to both IT professionals and people just like you who need simple answers to your security questions.

Trackbacks

  1. […] referred to as a malicious computer worm, the Conficker virus has several different variants that attack and spread in several different ways, making it hard to contain and control even if a […]

  2. […] It is called the CF worm or the Conficker worm. […]

  3. […] Conficker virus is one of the most infectious and one of the hardest viruses to detect that has hit the […]

  4. […] is trying to decide if the Conficker Worm is the most advanced virus ever […]

  5. […] recent weeks the Conficker virus has spread to roughly 30% of Windows based networks throughout the […]

  6. […] The first and most common vector of attack is the widely known computer virus. […]

  7. […] conficker worm could be easily one of the worse infections that has spread through the Internet for the entire […]

Speak Your Mind

*