They are available in countless variations: few are just annoying, most of them are extremely dangerous. It is easy to catch them, but it’s difficult to get rid of them: this applies to all viruses – whether they infect the human body or a computer. Where do viruses come from, what tricks they use and what damage can they cause?
For more than 30 years, viruses have been making PCs all over the world unsafe, and now they are even endangering nuclear power plants and attacking authorities. There are well over 500 million computer viruses, and an estimated 300,000 new viruses are added every month. It all started quite harmlessly. In the spring of 1986, computer users discovered that their floppy disk drive suddenly ran slower. The name of the data carrier had also changed – it was “(c)Brain”. It was the computer virus of the same name. Two brothers from Pakistan had developed it. Although the first viruses have been ghosting on the data highway since 1984,”Brain” was the first to cause disaster all over the globe.
Computer viruses are mini-programs with the ability to reproduce themselves and thus spread quickly. In the past, they usually found their way to PCs via infected floppy disks, but nowadays the Internet is the most common means of transmission (see below). Once installed, they spread out on the hard disk or in memory, manipulate the operating system, encrypt data or allow remote access via the Internet. Back then, as now, it was about computer control – but the intentions of virus programmers have changed fundamentally.
In the early days, it was mostly about joking and some fame. A funny message on the screen, here and there a malfunction – the real damage was not caused by the first viruses. But over time, however, it was no longer only programmers and young people with an attention deficit who started to circulate viruses, but more and more cyber gangsters. The main objectives: Spying out passwords, misusing PCs as spammers or blackmail. The main difference to earlier these viruses rarely become noticeable through flickering screens, malfunctions or messages. The main goal of the programmers is nowadays to infiltrate as malware unnoticed onto their victims’ PCs. This way they browse systems in peace and quiet, hunting for registration data and other important information.
In order for a virus to cause damage, it must first reach the target device. There are several ways to do this:
There are many virus protection solutions, eBlocker is one of them but helping block malware hidden in website ads. These ads can have hidden code inside the ad, eBlocker stops ads and trackers, therefore helping prevent this malware attacks.
Anyone who actually wants to block tracking on every Internet-compatible device in the household faces an almost impossible mammoth task. Plug-ins or VPN programs, for example, do not work on smart TVs, game consoles or IoT devices (IoT = Internet of Things) and their too complicated for your younger kids to use. The eBlocker makes it much easier.
Connected to the home network, the little box anonymizes the online behavior of your family on all Internet-enabled devices in the system. In addition to the computer, it also protects tablets, smart TVs, game consoles and IoT devices, for which there are hardly any other options for privacy protection.
In addition, the eBlocker reliably blocks all trackers and data-collecting advertising. Thanks to this combination, the eBlocker offers protection for the whole family – without software installation.Back to Category Overview