O'Reilly logo

Windows Vista Security: Praxisorientierte Sicherheit für Profis by Marcus Nasarek

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

514
|
Chapter 15: Protecting Your Computer with Windows Defender and Windows Firewall
Whatever the flavor of malware, most of it provides no value to the computer on
which it exists. Malware has many impractical purposes, including malicious use of
the infected computer. It may also allow the use of personal information housed on
the infected computer for profiteering, or identity theft. Malware makes up a very
large portion of the problems inherent to the Internet in its current state, and it poses
a great threat to private information housed on private networks. The worst part of
malware seems to be computer users’ lack of knowledge of how to remove and pre-
vent these types of programs from infecting their computers. This includes home
users and corporate IT professionals alike. Malware may arguably be the worst threat
against computers to date.
Understanding Antimalware Programs
Recently more companies have realized the potential harm of malware programs,
and they have tried to take steps to begin removing malware from their environ-
ments. With the onset of the Sarbanes-Oxley and HIPAA acts, compliance is on the
rise and many people have started to realize how vulnerable their private data has
become to outside entities. Armed with this knowledge, security practices have
become increasingly important for many organizations, and everyone feels the pain
as we struggle to maintain a balance between user-friendly computing and secure
computing. To combat the problem with malware, many vendors now offer tools
that will remove even the toughest malware out there. The industry refers to these
programs as antimalware tools.
Antimalware tools scan and remove malware from infected computers. If you type
“antimalware” in a search engine, you will discover some of the more than 13 mil-
lion web pages on the topic. The reason for this relates directly to the inexhaustible
amount of malware floating around on the Internet. As discussed previously, most
users have become aware of the problem with this type of software only in the last
few years. Some people were aware of the problem early and tried to explain to oth-
ers how difficult it may become, especially in the corporate world, but mostly it was
ignored. Now antimalware has taken the lead in the battle for securing your data.
Antimalware programs work similarly to antivirus scanners—identifying malicious
programs on the suspect computer, whether in RAM, on the hard drive, or on net-
work shares connected to the computer. Once the antimalware program has identi-
fied the threat, it will either alert the user for further instructions on how to handle
the problem, or it will delete the program and eliminate any registry entries associ-
ated with the rogue program.
As with antivirus engines, multiple malware scanners are your best bet for eliminat-
ing malware programs from suspect computers. You can find these types of pro-
grams online, and using them will eliminate the vast majority of malware on an
infected computer. For the purposes of malware removal, Windows Vista offers
Windows Defender, arguably the largest and most powerful antimalware engine
available.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required