Having meandered around various academic and technical aspects of viral programs for a while, it’s now time to get down to brass tacks and direct some attention to how the average user, or office, can detect the presence of computer viral programs and deal with them when detected. In this section I’ll be laying out a guideline blueprint that any user can follow, even without specialized software. In the next chapter, I’ll be dealing with the various types of antiviral software and how to evaluate them.
KeywordsDition Lost Iraq Smite Havoc
Unable to display preview. Download preview PDF.