Viruses and Antivirus Programs In general, a virus is a computer program intentionally designed to cause harm to your computer.. Viruses may rename files so they are unusable, delete fil
Trang 1New Interface
The first thing you’ll notice when you start using Office 2007 is the new and improved interface There’s a lot of material in this book to get you up to speed on this The interface is completely redesigned and contrary to what Microsoft implies, is going to take some time to master There are
no longer drop-down menus; instead, you select a tab at the top of the page, and the choices change underneath the tab depending on what you’ve selected Some of the old standbys are hard to find though, like settings that were easily accessed in Office XP’s Word’s Tools➝ Options There, you could set everything from user information to formatting marks to spelling and grammar You’ll have
to learn to navigate through the new interface to find those preferences now
Look at Figures 1-2 and 1-3 and you’ll understand how drastic the changes are The figures show two tabs in Word and how the choices change when a tab is selected You learn more about the new interface starting with Part III Not having any drop-down lists is going to take some getting used to
Figure 1-2: Office now has tabs instead of drop-down menus This is Word, and Home is selected.
Figure 1-3: This shows Word with Page Layout selected Notice how the options are different than in the previous figure.
New Features
Microsoft has certainly changed the interface, but the features you’ve come to rely on are still there
In Figure 1-2, you may recognize the familiar icons for Bold, Italic, and Underline, icons to add bul-leted lists and numbered lists, and icons for managing other common tasks like changing a font or font size But the changes to Word and other applications are more than just a reordering of tools and offering a new and more intuitive way to access them
The release of Microsoft Office 2007 is a major breakthrough in office software The building blocks in this release allow developers to create custom-made solutions for workers and home users alike This office suite lets users from enterprise, small business, and the home take advantage of new collaboration tools, content management tools, and timesaving interfaces that together create a more productive environment
Part I: Getting Started
10
Trang 2Some of the new features are listed here:
The new uncluttered workspace has a Web-like interface
Ribbon, the new sets of commands and tabs, keep all tools relevant to the task in progress
at the forefront
Contextual Tabs offer unique sets of commands appropriate for the particular type of data being edited For instance, in Excel, clicking a chart opens a new contextual tab with options for chart editing
Galleries, combined with Live Preview, provide a set of clear results for a particular project and allow you to create a professional looking presentation, document, or spreadsheet eas-ily With Live Preview, you can see what the final product will look like before actually applying the style or template; simply hover your mouse over the gallery style you like The interface is extensible This means that developers can add functionality to additional releases of Office so that their programs integrate with Office That means developers can add Contextual Tabs, interface tabs, and Galleries
Summary
Installing and activating Microsoft Office 2007 usually goes very smoothly However, you can increase the likelihood of success by performing a few preinstallation tasks Cleaning up your computer, back-ing up data, and understandback-ing what type of installation you need are the main three Once installed, you’ll be prompted to activate and register the product Activation is necessary, but registration is not, and there are pros and cons for the latter We suggest you register your product immediately, and take advantage of updates, tips and tricks, and other perks
Once installed and activated, you’ll experience the new interface, complete with new tabs and no drop-down lists You can explore Ribbon, Galleries, Live Preview, and the new uncluttered look and feel Once you’ve installed and introduced yourself to the product, you can move forward to Chapter 2
If you already have even only a modest familiarity with Windows and the Office applications, you can flip around the book to locate what you need to know right now
Chapter 1: Installing Microsoft Office 2007 11
Trang 4Chapter 2
Protecting Against
Viruses and Other
Threats
Computer viruses are a fact and an intrinsic part of the computing experience It’s extremely
likely you have antivirus software installed on your computer, and possibly even software that protects against adware and spyware If you don’t, you should However, installing this software, accepting the defaults during installation, and expecting the application(s) to protect you against any-thing and everyany-thing that comes your way is no longer a reality These days, you need to have at least
a basic understanding of viruses and other threats, including what types of viruses exist, how they work, and what you can do to help protect your computer, data, and personal information from harm While you can obtain a virus manually by downloading something from an unscrupulous Web site or installing a malicious freeware or shareware program, most viruses are passed from one com-puter to another automatically through applications like Outlook In fact, the fastest spreading and most destructive viruses travel through e-mail in the form of attachments
Macros you use in Excel or Access can also contain viruses Downloading a macro or “borrowing” one from a colleague is sometimes the source of the virus, but more often than not, they arrive in e-mail attachments Viruses can attack through Office applications if the proper security updates have not been downloaded and installed It is therefore very important to also keep Microsoft Office protected, just as you would your computer
Other threats exist though You need to take personal precautions for keeping your data safe You should sign up for security bulletins, configure high-security passwords, and do whatever else you can to thwart unauthorized access to your computer, including being vigilant about what you down-load and install from the Internet
Viruses and Antivirus Programs
In general, a virus is a computer program intentionally designed to cause harm to your computer Like their biological namesakes, viruses also replicate themselves Viruses may rename files so they are unusable, delete files, replicate themselves through an e-mail program or other application, or simply tie up valuable computer resources such as CPU and RAM by attacking those resources
13
Trang 5Viruses don’t generally bring down a system though Viruses most often cause system-wide slow downs, produce annoying pop-up messages, and cause nagging error messages
Virus Types
The most common type of virus is one that attaches to an executable file, such as Outlook, Excel, or
a graphic-editing program Most of these types of viruses, once on your computer, simply wait for you to perform the command necessary to release them, such as opening a ZIP file, running a macro,
or opening an e-mail attachment Once they’re running, they replicate themselves using your
com-puter and its resources These types of viruses are usually called program viruses.
Other common virus types are those considered malware These viruses may run during boot-up,
when logging on to a network, or even when a specific hour and minute of the day is reached For example, in the latter case the malware may release automatically when the system clock hits mid-night of a certain year, say 2010 It may then delete all JPEG files or all documents on the computer,
or create a pop-up that simply says “Happy New Year!” Spyware and adware are also considered
mal-ware, as detailed in a sidebar later in this chapter
How a Virus Works
There are plenty of virus types, but they all generally work the same way First, the virus gets onto your computer This usually happens without your knowledge, although you are usually at fault for contracting it Most of the time, the viruses are acquired through malicious software you intention-ally download or open, such as trial software, screen savers, e-mail attachments, or freeware Once on the computer, they run Viruses are executable files and run when you install the screen-saver, trial software, or freeware, or when you open an e-mail attachment that contains it
Once the virus is loose, it produces symptoms and begins to replicate itself As noted, these symp-toms can range from harmless pop-up messages to the deletion of important files Some viruses wait
in the background too, in anticipation of an event such as a specific date and time
No matter what, viruses replicate That’s why it’s so important to have antivirus software config-ured on your computer This software should catch a virus before it is opened, thus preventing it from doing harm and replicating to other computers on your network (or the Internet)
Caution
You can prevent the majority of viruses by being vigilant about what you download, install, and open If you get e-mail with an attachment from someone you don’t recognize, don’t open the attachment Even if you do recognize the sender, e-mail back and ask them if they meant to send you an executable file If you’re on a Web site and you are prompted to download and install a program, don’t do it Finally, don’t fall for free screensavers, free emoticons, or free software of any kind on the Internet, unless you’ve read the reviews and license and know it’s a legitimate and virus-free application.
Custom-Configure Antivirus Programs
Antivirus software, while an excellent and must-have tool, can sometimes cause your computer to perform more slowly than a mild virus would Letting your antivirus program check for updates
Part I: Getting Started
14
Trang 6daily is important, but checking for updates each day at 8 A.M., just when you’re logging on to the Internet, will slow down access and quickly become tedious Configuring your antivirus software perform a system-wide virus scan at boot up is also a performance killer Imagine the issues you’d have if you let your computer perform a two-hour scan just when you’re sitting down in the morning
to get some work done The point of this section then is to learn how to use and configure your antivirus programs for the best performance possible, while at the same time protecting you and your computer from harm
The newest antivirus programs offer more than just protection from viruses Many also contain firewalls, privacy services, and options for permanently deleting files You’ll need to work with those accordingly
To see what your antivirus software offers, click Start➝ All Programs, and select your antivirus program from the list Figure 2-1 shows an example In this figure, there are four options: McAfee VirusScan, McAfee Personal Firewall Plus, McAfee Privacy Service, and McAfee Shredder Each of these offers different kinds of protection You may have these or others
Figure 2-1: Antivirus software often contains more than virus protection.
Chapter 2: Protecting Against Viruses and Other Threats 15
Trang 7Spend some time now and open each antivirus subprogram you have to see what’s offered Only then can you configure the program for the best possible performance You should look for several things If possible, set or use your antivirus program to perform the following tasks:
Schedule a complete system scan weekly, during a time when the computer is on but is not
in use
Check for quarantined files twice a month and either delete files you know are harmful or restore files that are not
Find out what viruses are currently circling the Internet by visiting your antivirus manu-facturer’s Web site as time allows
Run only one antivirus program Running more than one can cause system instability Scan incoming and outgoing e-mail automatically
Start when Windows starts
Create a rescue disk in case a virus disables your computer
Schedule updates to download and install at a time that is convenient for you, a time when you will not be actively using the computer or using programs that require a lot of com-puter resources
Use the firewall to warn you of potential dangers, but not automatically block them You can then decide for yourself what is or is not a potential danger and take the appropriate action
Enable instant messaging protection
Perform a manual scan anytime you see anything suspicious, such as an odd or recurring pop-up message, changes to names of files or pictures, or a noticeable slowdown at the computer (which would indicate an attack on computer resources)
Spyware and Adware
Spyware and Adware are two more threats to be concerned with
Spyware is malicious software that spies on you by stealing keystrokes, passwords, and other
personal data It is usually written and distributed for someone’s personal monetary gain, and is generally well hidden in long licenses you agree to when downloading and installing software
Spyware can make changes to almost any part of your computer, including changes to your Internet home page or what you see when performing an Internet search Spyware can also cause system-wide slow downs, install malicious toolbars, and collect Internet browsing history data, including passwords and personal information It can even make changes to the Registry At best, it’s a
nuisance; at worst, it’s all a person needs to steal your identity or disable your computer
Adware is similar It’s a form of spyware and it also collects information about you as you surf the Web Adware programs use the information collected to display advertisements in the form of pop-ups, ads
Part I: Getting Started
16
Trang 8that are targeted directly at you based on the Web sites you’ve visited Adware, like spyware, can slow down your system by hogging system resources It can also slow down Internet browsing, by using valuable bandwidth on ads
To avoid spyware and adware:
1 Keep your PC up to date with Windows Update.
2 Install and use antiadware and antispyware software from such reputable companies as Spybot
Search and Destroy, Ad-Aware, and Windows Defender (to be released with Vista)
3 Use a personal firewall.
4 Install software only from trusted sources.
5 Do not open suspicious attachments in e-mail.
Generally, antiadware software catches tracking cookies, which collect information about your Web surfing habits
Understanding and Avoiding Office Viruses
You can unknowingly unleash a virus from almost any Microsoft Office application From Outlook, you can set a virus loose by opening a dangerous e-mail attachment, from Excel, by running an unsafe macro, and from any other application through a security hole (that could have been patched with a simple Office update) However you get the virus is not necessarily the point here though; once you have a virus, you have no choice but to deal with it Here we want to talk about avoiding viruses in the first place
Beware of Attachments
The most common virus threats come via e-mail in the form of attachments Attachments you receive from people you know are generally harmless They’re usually forwarded e-mails, videos, pictures, Word documents, or PowerPoint presentations If you know the person who sent the attachment, and are expecting something from them, it’s usually safe to open it It’s doubly safe if you have antivirus software running that scans all attachments before they are opened
However, viruses can and do replicate themselves without a user’s knowledge Even if the user knows they were affected, viruses replicate so quickly through e-mail programs that that person may not have time to let you know a virus is coming your way in time anyway That being the case, the best thing you can do is to never open e-mail attachments that contain suspicious extensions such as exe (an executable file), bat (a batch file), and vbs (a Visual Basic file) There is more information
on this in Table 2-1
Another way to protect yourself from viruses that come through attachments is already config-ured in Microsoft Outlook by default Outlook automatically blocks attachments that contain file types it deems dangerous If you try to forward one of these e-mails, you’ll be prompted regarding the security threat as well
Chapter 2: Protecting Against Viruses and Other Threats 17
Trang 9Table 2-1 lists potentially dangerous extensions and offers a brief explanation of what each is.
Table 2-1 Suspicious E-Mail Attachment Extensions
.exe A file that contains a program (executable) Almost all executable files in e-mail
attachments are viruses Legitimate executable files are used to install software such as Microsoft Office or Adobe Photoshop
.com A file that contains instructions (commands) that tell your computer to do something
specific COM files are created for DOS-based systems and usually run faster than executable files, and thus can cause problems very quickly Almost all COM files in e-mail attachments are viruses
.vbs A file that contains a Visual Basic script Scripts are executed code that can access
and modify data on your computer Unless you work with Visual Basic in a work setting, consider all Visual Basic files in e-mail attachments as viruses
.scr A screen saver file in Microsoft Windows Screen savers are safe as long as they
come from valid sources However, almost all screen saver files in e-mail attachments are viruses and should be deleted immediately
.bat A batch file that contains a sequence of commands for DOS based systems
Consider all batch files that come as e-mail attachments as viruses
.pif A program information file that contains information about how Microsoft
Windows should run a non-Windows application Consider all PIF files that come as e-mail attachments as viruses
.zip A compressed file and a common format for sending data via e-mail attachments If
you know the sender and are expecting a large amount of data, the attachment is probably safe If you do not know the sender, do not open the attachment
Caution
Just because a filename says it’s one thing doesn’t mean it is While many ZIP files are safe and do not con-tain viruses, if you aren’t expecting a ZIP file you shouldn’t open it Once unzipped, it could concon-tain and run any other file type, such as an EXE or a VBS program In other instances, attachments ending in doc may not
be a simple Word document In reality, it may be a macro virus Again, the warning stands: Only open attach-ments from people you know and trust.
Part I: Getting Started
18
Trang 10Microsoft Office helps you protect against macro viruses by using the High macro security setting as the default It is wise to leave this security setting alone, as you’ll be prompted to enable macros anytime a macro is detected within a document With this setting, you can run only those macros that are digitally signed from trusted sources, and macros you create yourself You cannot, by default, run harmful macros If you choose the Low setting for macros, you will not be prompted to enable or disable macros; they will run automatically.
Avoid Macros
Macros, if you aren’t familiar with them, are programs created to perform often-repeated steps, and are initiated with a specified key sequence such as Ctrl+A For instance, if you insert your name, address, city, state, phone number, and e-mail address often in the Word documents you create, you can construct a macro to do it for you Once the macro is created, you simply click a user-defined key combination to run that macro and insert the information at any time and at any place in the document
Sophisticated and malicious macros can also be created and sent via e-mail to unsuspecting recip-ients These macros attach themselves to Microsoft Office programs and can run every time you open the program or each time you hit a specific keystroke While these macro viruses are generally more annoying than harmful (a specific keystroke may cause something “comical” to happen), they may also replicate by using your Outlook contact list, thus continuing their destruction via the Internet The best way to avoid macro viruses is the same way you’d avoid any other virus Don’t open attachments from people you don’t know, don’t install programs from suspicious sources, and don’t borrow macros from people you know or download from Web sites offering free ones Macro viruses are the most common type of Office viruses; they are becoming increasingly prevalent with the free exchange of documents, templates, and data over the Internet
Patch Security Holes
Some viruses are specifically written to attack a computer through known vulnerabilities in software
It is therefore extremely important to protect Microsoft Windows, Windows Vista, and Microsoft Office with security patches and updates All updates are free and can be installed automatically with little or no intervention on your part, or manually, so you stay in control
WINDOWS UPDATE IN MICROSOFT WINDOWS
There are two ways to install updates in Microsoft Windows operating systems and Office 2007: manually and automatically To install an update manually, in Microsoft Windows, click Start➝ All Programs➝ Windows Update You’ll need to be connected to the Internet, and once at the Microsoft Update Web site, you’ll follow the directions listed
Installing updates manually isn’t generally a good idea though; that is, unless that’s the way your network administrator wants you to do it That’s because you have to remember to get the updates
Chapter 2: Protecting Against Viruses and Other Threats 19