{"id":3651,"date":"2018-02-07T06:23:50","date_gmt":"2018-02-07T00:53:50","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=3651"},"modified":"2020-08-18T22:40:33","modified_gmt":"2020-08-18T17:10:33","slug":"methods-protect-pc-virus-threats","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/","title":{"rendered":"Methods to Protect your PC Against Virus and Threats"},"content":{"rendered":"<p>We all make mistakes. Like leaving our PC(s) unlocked or creating easily guessable passwords, which provide bad actors easy access to them. Now, what if the bad actor leaves no trace behind? Example: let&#8217;s say he or she locks up your system and let&#8217;s say you don&#8217;t remember leaving it unlocked in the first place. When faced with such circumstances, here are some tips using which PC users like you can find out who&#8217;s been lurking in your PC(s) while you were away.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/02\/methods-protect-pc-virus-threats.png\" alt=\"Methods to Protect your PC\" width=\"650\" height=\"300\" class=\"aligncenter size-full wp-image-12937\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/02\/methods-protect-pc-virus-threats.png 650w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/02\/methods-protect-pc-virus-threats-300x138.png 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/02\/methods-protect-pc-virus-threats-225x104.png 225w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p><strong>1. Check Windows Logs:<\/strong> Windows 10 contains a built-in tool called Event Viewer which records events (such as user login and logoff) occurring within your PC(s). So if you suspect someone&#8217;s been using your PC, then you can find out the same using Event Viewer. (Reading the information available within Event Viewer can be tough, but it&#8217;s worth the time spent. You can find out more Event Viewer on the internet).<\/p>\n<p><strong>2. Check Your Firewall:<\/strong> Another way is to use your firewall. And in case if you don&#8217;t have one (which is not advisable), you can check the built-in firewall, as these security tools which are supposed to filter inbound and outbound traffic, too contain a record of your PC-related activities such as login and logoff. Again, understanding the information can be tough, so check online for instructions.<\/p>\n<p><strong>3. Check Who Powered Your Machine:<\/strong> Windows Logs also records when your PC was powered on. Although a bit vague information to conduct the search, it can nevertheless prove useful where other methods might fail. So it&#8217;s definitely worth checking this out.<\/p>\n<p>But why be so careless so as to allow someone to intrude into your PC(s) in the first place?<\/p>\n<p>Prevent hackers gaining remote access to your PC(s) by:<\/p>\n<p><strong>1. Installing Antivirus:<\/strong> With free antivirus or paid ones installed, your PC(s) will be strong enough to resist such remote hacker intrusions. You can also use your security software&#8217;s logs to check whether someone accessed your PC(s) while you were away. And if hackers successfully bypass the security and gain access to your PC, then your <a href=\"https:\/\/antivirus.comodo.com\/\" target=\"_blank\" rel=\"noopener\">antivirus <\/a>will alert you to such happenings \u2013 no need to surf through tough-to-understand logs.<\/p>\n<p><strong>2. Keeping Your System Up-to-Date:<\/strong> Ensure your operating system and other software within your PC(s) stay updated \u2013 all the time. This will reduce the room for security vulnerabilities which may allow hackers to access your PC(s) remotely. So never forget to keep your system up-to-date.<\/p>\n<p><strong>Conclusion:<\/strong><\/p>\n<p>Remember we live in an age which witnesses security <a href=\"https:\/\/www.comodo.com\/lab\/\" target=\"_blank\" rel=\"noopener\">threats<\/a> every day. Therefore there is no real excuse for leaving your PC(s) unattended (and without locking) or not having <a href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/best-antivirus-windows-pc-2018\/\" target=\"_blank\" rel=\"noopener\">antivirus for PC.<\/a> Because when you do so, you are literally inviting cybercriminals to access your PC(s). So better avoid such careless acts and safeguard your PC(s) against various security threats by installing <a href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/windows-10-update-crashes-avast-antivirus\/\" target=\"_blank\" rel=\"noopener\">antivirus<\/a> and by never forgetting to lock it up while you are away.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p><strong>Related Resources:<\/strong><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/how-to\/get-virus-off-my-computer\/\">Get virus off my computer<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We all make mistakes. Like leaving our PC(s) unlocked or creating easily guessable passwords, which provide bad actors easy access to them. Now, what if the bad actor leaves no trace behind? Example: let&#8217;s say he or she locks up your system and let&#8217;s say you don&#8217;t remember leaving it unlocked in the first place. [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":1460,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[9,139,63],"class_list":["post-3651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to","tag-antivirus","tag-antivirus-for-pc","tag-free-antivirus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Methods to Protect your PC Against Virus | Antivirus for PC<\/title>\n<meta name=\"description\" content=\"PC are most vulnerable to viruses and threats. Get to know the methods in which PC gets affected and role of antivirus software towards protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Methods to Protect your PC Against Virus | Antivirus for PC\" \/>\n<meta property=\"og:description\" content=\"PC are most vulnerable to viruses and threats. Get to know the methods in which PC gets affected and role of antivirus software towards protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-07T00:53:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-18T17:10:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/01\/RF-10296_thb_3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"170\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/\",\"name\":\"Methods to Protect your PC Against Virus | Antivirus for PC\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/01\/RF-10296_thb_3.jpg\",\"datePublished\":\"2018-02-07T00:53:50+00:00\",\"dateModified\":\"2020-08-18T17:10:33+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"PC are most vulnerable to viruses and threats. Get to know the methods in which PC gets affected and role of antivirus software towards protection.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/01\/RF-10296_thb_3.jpg\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/01\/RF-10296_thb_3.jpg\",\"width\":225,\"height\":170,\"caption\":\"antimalware comparison\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Methods to Protect your PC Against Virus and Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Methods to Protect your PC Against Virus | Antivirus for PC","description":"PC are most vulnerable to viruses and threats. Get to know the methods in which PC gets affected and role of antivirus software towards protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/","og_locale":"en_US","og_type":"article","og_title":"Methods to Protect your PC Against Virus | Antivirus for PC","og_description":"PC are most vulnerable to viruses and threats. Get to know the methods in which PC gets affected and role of antivirus software towards protection.","og_url":"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2018-02-07T00:53:50+00:00","article_modified_time":"2020-08-18T17:10:33+00:00","og_image":[{"width":225,"height":170,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/01\/RF-10296_thb_3.jpg","type":"image\/jpeg"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/","url":"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/","name":"Methods to Protect your PC Against Virus | Antivirus for PC","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/01\/RF-10296_thb_3.jpg","datePublished":"2018-02-07T00:53:50+00:00","dateModified":"2020-08-18T17:10:33+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"PC are most vulnerable to viruses and threats. Get to know the methods in which PC gets affected and role of antivirus software towards protection.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/01\/RF-10296_thb_3.jpg","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/01\/RF-10296_thb_3.jpg","width":225,"height":170,"caption":"antimalware comparison"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/how-to\/methods-protect-pc-virus-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Methods to Protect your PC Against Virus and Threats"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/3651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=3651"}],"version-history":[{"count":18,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/3651\/revisions"}],"predecessor-version":[{"id":14956,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/3651\/revisions\/14956"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/1460"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=3651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=3651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=3651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}