Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
solution to computer viruses
computer security against viruses
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: solution to computer viruses
There are many types of invaders in the computer world including virus's, worms and trojan horses. They come in many types and come into your computer in many ways. There are ways to protect your computer from these nasty things however, you must keep on protecting it and not let your guard down. According to wikipedia.com a virus is a "self replicating computer program that spreads by inserting copies of itself into other executable code or documents". Just as a biological virus spreads itself from cell to cell and host to host in humans a computer virus spreads from file to file and computer to computer. It has been argued whether the first viruses were malicious or just programming experiments that went out of control. Originally computer viruses were spread by primitive networks and by disks that became infected and were passed from one person to another. Many computers were originally infected by dreaded boot sector viruses but as technology has changed so has the way that viruses are delivered and boot sector viruses have all but vanished. A large majority of today's viruses are spread by e-mail attachments. Also most viruses now are infected executable files or are hidden in compressed zip folders. There are many types of macro virus scripts that will infect programs such as word processing and accounting programs by manipulating these scripts to transfer from one infected file to another. Viruses can infect a file in many different ways. Parasitic viruses modify the code of the infected file leaving it partially or fully intact and inserting the code somewhere at the beginning, the end, or in an empty area somewhere in the middle. Overwriting viruses just simply place there code over the code of the original program rendering it useless. Companion file viruses do not modify the original file but instead create a duplicate file containing the virus. Then when a user tries launching an the file the infected version launches first. A leading antivirus software company Kaspersky Labs says on there virus information website Viruslist.com that today the most common and dangerous computer threat is Trojan programs. There are eleven types of programs classified as Trojans; Backdoor Trojans, General Trojans, PSW Trojans, Trojan Clickers, Trojan Downloaders, Trojan Droppers, Trojan Proxies, Trojan Spies, Trojan Notifiers, ArcBombs, Rootkits. Of all these Trojan programs, Backdoor Trojans are classified as the most dangerous type and the most widespread.
Privacy and security issues have become one of the top concerns among computer users in today’s market. It has become a game of survival of the fittest in protection of your security. The only true way to defend yourself is knowledge. You should prepare your self against hackers, spammers and potential system crashing viruses and web bugs. Lets focus on how you can protect yourselves from the would be thieves.
The hanta virus is not a new foe to humanity. This mysterious and sometimes fatal disease has plagued humanity for over 1000 years. This virus, most likely originating in China over 1000 years ago, is transmitted by human contact with mice. Only relatively recently has the hanta virus captured the attention of the United States. Although the hanta virus has been known for such a long time, there is little known about the virus. In the United States most cases are found in the southwestern part of the country, although cases have been reported from all four corners of the country. Recently, there have been successful tests done on prospective vaccines for the hanta virus. Despite this, strains of the hanta virus kill many people a year for lack of an effective medicine or vaccine (www.pharminfo.com).
The Center for Strategic and International Studies estimates that cybercrime costs the global economy over $400 billion per year, and that in 2013 over 3,000 companies in the United States had their systems fall victim to cybercrime (Cyber Risks, 2015, para. 3). One of the reasons that cybercrime is so prevalent is the lack of education and prevention by businesses and individuals. One of the biggest ways to prevent cybercrime is to keep your computer and other devices current with the latest patches and updates. This keeps attackers from exploiting flaws in software. Firewalls and virus protection software are some of the most common ways people and companies protect their computers and are usually the first line of defense against outside attackers going through the data coming in while accessing the internet (Norton, 2017, para. 5). These firewalls and antivirus software would be what protect businesses and people from computer as a target cybercrimes. Another good thing that can help is to have backups of original files and maintain them usually on removable storage devices that can be secured away. When it comes to protecting from scams, frauds, and other computer as tool offenses it is important for users to be cautious when online as simple as that may seem. A lot of scammers will use pop up warning or ads. A website
Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.
At the Aim Higher College there have been recently discovered malware on the campus systems that are due to many recent attacks. I used an Anti-virus protection software called AVG on the computer systems on campus and ran a whole computer scan. The results came back very quick of numbers of malware being high and medium priorities that these should not be taken lightly. Furthermore, the scan found many viruses, Trojans, and malicious software and applications.
I decided to read the book by David Harley called Viruses Revealed. This book goes into great detail about the different kinds of viruses and virus mechanisms, the solutions to these viruses, studies on different cases of viruses and then the social aspects of viruses. In the first part of the book, Harley talks about the problems with viruses. A virus is a program that infects other programs to modify them. “Infecting means that a virus will insert itself into the chain of command” (Harley). The virus structure was defined into three different parts: Infection, Payload, and Trigger. The infection is defined as the way or ways in which the virus spreads. The payload is defined as what the virus does besides duplicating itself. Trigger is defined as the procedure that decides whether or not the payload is necessary. Harley also talks about the difference between damage versus infection. The major difference between the two is that many users have infected documents or applications on their computer. Whether or not those applications are run is the difference between the two. In part one Harley also converses about Trojan Horses. Trojan horses are normally known as a virus, but he shoots that down. Harley says that Trojan Horses are normally not viruses, but just a worm that goes from computer to computer. After talking about different kinds of viruses and worms, he goes into Anti-Virus softwares. There are two different kinds of anti-viruses. One being virus-specific. Virus-specific means that every time a virus is found on your computer, it is identified but not detected. Generic scanners do the opposite. Generic scanners detect viruses but do not identify them.
Before I talk about it, what are Spyware and its popularity? Spyware doesn't actually harm your computer, but it's software that sits on your computer without you knowing and tracks your computers activity depending on how the malware was written. Some are worse than others and sometimes can be even worse than viruses. Their effects vary widely from just being annoying to huge data loss. Example of spyware are, but not limited to, adware, browser hijacker, keyboard logger, and modem hijacker. Adware is the most popular out of this list and is pretty small in size in terms of malware.
The history of cybercrime goes back to 1971 and the first computer virus called the Creeper which was created by Bob H. Thomas, who was a BBN engineer (Dalakov, Meltzer, and Phillips). BBN which stands for Bolt, Beranek and Newman, is now Raytheon BBN Technologies (“About”, Dalakov). A computer virus is a program that is created to cause damage to a computer or perform other malicious acts (204). The Creeper virus was designed to infect the ARPANET network. The ARPANET, which stands for Advance Research Projects Agency was set up by the U.S. Government as an agency in 1969 to provide a network of computers that would connect various academic and research organizations; it was the predecessor of the Internet (“Internet”, Morley, and Parker).
Computers are main technological features that allow criminals to step into unsuspecting victims lives. With a simple piggy-backing program hackers are able to track every keystroke made by the victim. One such program is called spyware, not to be confused with adware, which is often referred to interchangeably with spyware, but is potentially harmless (Louis 15). Spyware, hidden within downloaded software, implants itself deep within a computer’s hard drive, allowing it to track every move made by the user (Louis 16).
ways, perhaps the best thing to do is more a form of damage control rather than
Malicious code is a real danger to modern systems. Most systems nowadays do not work in isolation; they are more likely to be connected to other systems and sometimes they can even be dependent on them. Therefore an attack on one of the systems in the network is a potential attacking attempt to any other systems, with which it is interacting. Therefore, it is inevitable for any networked or Internet-connected computers to deal with malicious code attacks at some point. Businesses lose billions of dollars each year because of malicious code attacks. Responding to the attack and restoring all the data on the computers is a time-consuming and expensive task. It is a much better practice to try preventing it through organizing and maintaining effective defenses. However, it is important to keep in mind that there is no one general solution that can help to prevent all the attacks. Attackers are constantly looking for new ways to take advantage of systems’ vulnerabilities and find new ones. That’s why organizations have to not only defend themselves against existing attack methods, but also try to predict and prevent new attacking techniques. It means that computer and network security is a never-ending challenge and expense.
...us that contains malicious files including a key logger, which collects every key stroke that you make on your computer. To create a successful virus, many hackers usually encrypt their virus. Doing so increases the chances that the virus will not be detected by an anti-virus software that the victim is using. In order to spread the virus, hackers upload fake files relating to something entirely different that might have an interest to the victim. Once the victim downloads the selected file, they are now infected with the Trojan horse. Common sites that are used by hackers would be Pirate Bay which is a database of torrents ranging from pictures to full movie downloads. Hackers take advantage from torrent sites by infecting the file with their Trojan horse. This is the most used method of infecting someone with a virus, all though, there are dozens of other ways.
Virus is one of the most common malware. Unlike spyware, virus is largely designed to harm useful programs or wreck down an entire operating system. There are many ways through which virus may enter a computer. The most common way is via email attachments. A...
“A digital world we became”. These days individuals turned to use computer systems in everything in their lives. They even use them in manufacturer instead of employees. I did not say that technological innovation is not essential for us but sometimes the technological innovation disregards our role in life. Technological innovation is very essential to any lifestyle to flourish. Technology contains cell mobile phones, laptops, machines, Ipads and many other factors. Not also they include all the excellent stuff but any great factor comes out with a drawback. Technological innovation has some drawbacks, and the most essential one of them that we will mainly talk about is the malware.
Malware can survive in a number of ways say different sizes, shapes and also the purpose ranging from viruses to spyware and to bots. Malware in general is classified into two types. They are the concealing malware and infectious malware. In case of infectious malware, the malware code is said to spread all over which means that the software code shall replicate from one user to another and this goes on. In infectious malware, we need to consider two cases, which are called the viruses and the worms. Viruses are termed as the software that has executables within itself and causes the executables to spread when it is run. The second case called worms is a software which infects a computer and then spreads to others.