Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Effects of virus on a computer
Effects of virus on a computer
Effects of computer virus
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Effects of virus on a computer
A computer virus is a simple set of computer instructions or code that is written by some unscrupulous person. This code is attached to some part of the normal computer operating system or computer program. Instructions in this code tell the computer to perform some task. This task is often destructive, such as deleting important information or crashing the hard disk. There are other that may be only a slight aggravation. Some viruses have been known to do nothing more than put a large happy face on your computer screen (Berger).
There are different types of viruses that can infect different parts of system. Some viruses are harmless that a computer user might not notice for years. Sometimes viruses might cause random damage to data files and over a long period of time they might destroy files and disk (Hanhisalo). Boot viruses are infected floppy disk that boot records or master boot records in hard disks. They replace copying it elsewhere on the disk overwriting it. Boost viruses load into memory if the computer tries to read it while it is booting. Examples of a boot virus are Form, Disk Killer, Michelangelo, and Stone virus. Another type of virus is a program virus. This virus infect executable program files, such as those writing extensions like .BIN, .COM, .EXE, .OVL, .DRV [driver and .SYS [device driver]. These programs are loaded in memory during execution, taking the virus with them. The virus becomes active in memory, making copies of itself and infecting files on disk. Examples of this type of virus are Sunday and Cascade. Multipartite viruses are hybrid of Boot and Program viruses that infect program files and when the infected program is executed, these viruses infect the boot record. When you boot the computer the next time the virus from the boot record in the memory starts to infect other program files on disk. Examples of these types of viruses are Invader, Flip, and Tequila.
Stealth viruses use certain techniques to avoid detection. It may either redirect the disk head to read another sector instead of the one which reside or they make alter the reading of the infected file's size shorter than the directory listing. For instance, the Whale virus adds 9216 bytes to an infected file; than the virus subtracts the same number of bytes (9216) from the size in the directory. Examples of this type of virus are Frodo, Joshi, and Whale.
This virus searches for a new vulnerable host in order to survive and carry the disease to the next victim. The critical aspect around the spread of a virus is how drastically the reproduction process occurs. Without being controlled, the contamination throughout any species causes the spread to take place in a toxic way, “On day one, there were two people. And then, four, and then, sixteen. In three months, it’s a billion.
After coming home from a long day at school, I turn on my computer and go to the Internet to see "What's New!" Then all of a sudden I hear, "You've Got Mail!" I check my e-mail and it's a message from my friend in Alabama. It is warning me about a computer virus that is being spread, and that I should watch out. Thank goodness someone warned me about this. I said to myself, "This kind of stuff must be the work of those hackers that I hear so much about." But what exactly is a hacker, and what are they out to do?
Viruses can do many different things to a body, they can destroy, corrupt, and take over cells in the body. They can damage parts of the body or make your body destroy itself, viruses are dangerous but sometimes can be cured. Viruses do not have the enzymes needed to carry out life so they use other’s cells, called a host cell, to live and to perform their functions, such as reproduction. Viruses inject their genetic instructions into a cell causing the cell to create viruses materials, which become new viruses, and usually break the side of the cell destroying it. The viruses can cause parts of the brain to react and activate, causing behavioral changes. For example a disease called Toxoplasmosis can alter rat behavior, while it affects humans in a different way than rats, its an example of what viruses can do. The virus switches the triggers that causes neuronal reactions for fear and arousal, so that what causes fear actually cuses arousal. This is so that the rat gets eaten by a cat and a parasite (which injects the virus) inside the rat can reproduce in a cat. A virus doesn’t simply just head to the brain to cause these things, as there is a “shield” around the brain that protects it from everything. This “shield” is called the Blood Brain Barrier, the BBB, which molecul...
The hanta virus is not a new foe to humanity. This mysterious and sometimes fatal disease has plagued humanity for over 1000 years. This virus, most likely originating in China over 1000 years ago, is transmitted by human contact with mice. Only relatively recently has the hanta virus captured the attention of the United States. Although the hanta virus has been known for such a long time, there is little known about the virus. In the United States most cases are found in the southwestern part of the country, although cases have been reported from all four corners of the country. Recently, there have been successful tests done on prospective vaccines for the hanta virus. Despite this, strains of the hanta virus kill many people a year for lack of an effective medicine or vaccine (www.pharminfo.com).
Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.
At the Aim Higher College there have been recently discovered malware on the campus systems that are due to many recent attacks. I used an Anti-virus protection software called AVG on the computer systems on campus and ran a whole computer scan. The results came back very quick of numbers of malware being high and medium priorities that these should not be taken lightly. Furthermore, the scan found many viruses, Trojans, and malicious software and applications.
I decided to read the book by David Harley called Viruses Revealed. This book goes into great detail about the different kinds of viruses and virus mechanisms, the solutions to these viruses, studies on different cases of viruses and then the social aspects of viruses. In the first part of the book, Harley talks about the problems with viruses. A virus is a program that infects other programs to modify them. “Infecting means that a virus will insert itself into the chain of command” (Harley). The virus structure was defined into three different parts: Infection, Payload, and Trigger. The infection is defined as the way or ways in which the virus spreads. The payload is defined as what the virus does besides duplicating itself. Trigger is defined as the procedure that decides whether or not the payload is necessary. Harley also talks about the difference between damage versus infection. The major difference between the two is that many users have infected documents or applications on their computer. Whether or not those applications are run is the difference between the two. In part one Harley also converses about Trojan Horses. Trojan horses are normally known as a virus, but he shoots that down. Harley says that Trojan Horses are normally not viruses, but just a worm that goes from computer to computer. After talking about different kinds of viruses and worms, he goes into Anti-Virus softwares. There are two different kinds of anti-viruses. One being virus-specific. Virus-specific means that every time a virus is found on your computer, it is identified but not detected. Generic scanners do the opposite. Generic scanners detect viruses but do not identify them.
Most viruses are created out of curiosity. There are those out there who create them out of malice, but far more of the creators are just meeting a challenge, to see if they can do it or not. A common type of virus would be a Trojan Horse, a destructive program disguised as a game, a utility, or an application. When run a Trojan Horse does something harmful to the computer system, while appearing to do something useful. A worm is also a popular type of virus. A worm is a program that spreads itself across computers, usually by spawning copies of itself in each computer’s memory. A worm might duplicate itself in one computers memory so often that it causes the computer to crash. A worm is introduced secretly into a host system either for fun, or with the intent to damage or destroy information. Now I will explain some of the more major viruses, and how they function.
The current paper examines the contributing factors of Park Chan-wook's Oldboy cult status. The current paper will examine factors of both the macro-level (history, culture, and social and economic condition) and the micro-level (cult elements of the film). I will first talk about the background of transnationalism and , by which I will examine how Asian films takes its root in the United Stated and Europe. I will then turn to the broader social context of Oldboy by connecting the cinematic elements with the current economic and social condition of Korea. In the end, I reveal how the prominent cult elements of the film (ex., hero revenge, transgression, shock effects, and irony) might have appealed to and resonated with the the fans of the
Hantavirus is a virus in the Bunyaviridae family of viruses. Dr. Lee Ho Wang from Korea discovered Hantavirus in the early 1950s. Though the virus is commonly found in rodents, it does not cause disease in the rodents. Disease results when the virus is transmitted to humans. A common way of contracting Hantavirus is from breathing in dust that has been contaminated by an infected rodent’s saliva, feces or urine or the infected dust gets into broken skin. It is also transmitted by the bite of an infected rodent. So far, it has not been confirmed that Hantavirus can be passed on from person to person. The most common places to contract Hantavirus are Korea, China or most countries in Asia. In Korea, Hantavirus seems to have two major “seasons;” May to June and October to November are the times of year when the disease is more prevalent because the rodent populations are higher during these times. There are two forms of Hantavirus, the mild illness found in Scandinavia, and the more severe illness found in the Far East and Central Europe.
Malicious software in short known as Malware. It is also known as computer Contaminant. Similar to biological parasite, malware also reside in a Host. Malware will get installed on host without user’s consent. Generally a software is considered malware based on the intent of the creator...
...he Trojan horse, users should be familiar with all the programs that should normally run on their systems. Once there is an addition or alteration, it is easy to notice and investigate. Another technique that is often used by attackers involves using wrapping programs, that are combining both malicious and original code. Once run on the victim’s computer the program first installs malicious code, and then executes the original code.
Virus is one of the most common malware. Unlike spyware, virus is largely designed to harm useful programs or wreck down an entire operating system. There are many ways through which virus may enter a computer. The most common way is via email attachments. A...
What is the “MALWARE”? A malware refers to software programs designed to damage or do other unwanted actions on a computer system. In Spanish, "mal" is a prefix that means "bad," making the term "bad ware" .Malware includes viruses, worms, Trojan horses, and spyware. Viruses, for example, can cause havoc on a computer's hard drive by deleting files or directory information. Spyware can gather data from a user's system without the user knowing it. This can include anything from the Web pages a user visits to personal information, such as credit card numbers.
Malware can survive in a number of ways say different sizes, shapes and also the purpose ranging from viruses to spyware and to bots. Malware in general is classified into two types. They are the concealing malware and infectious malware. In case of infectious malware, the malware code is said to spread all over which means that the software code shall replicate from one user to another and this goes on. In infectious malware, we need to consider two cases, which are called the viruses and the worms. Viruses are termed as the software that has executables within itself and causes the executables to spread when it is run. The second case called worms is a software which infects a computer and then spreads to others.