A computer virus is a software program that affects the computer operation and it can potentially damage the computer. A computer virus is attached to a program or a file which allows it to spread from one computer to another when the program is running. Most of the viruses are attached to an executable file which allows the virus to stay on the computer but cannot do any damage until you open or run the infected program. Viruses are capable of corrupting or deleting data from the computer. They can also infect other computers. Viruses can enter your computer in different ways such as, through infected email attachments and programs. You will not realize there is a virus until it has done the damage. Different types of viruses account for various types of effects. It is important to learn about these types of viruses and their effects so that we know how to prevent and avoid them. These are merely a few of the many types of viruses that are found. Boot viruses – These infect only the master boot records of the hard disk. The boot record program is what loads the operating system at start up. These viruses replace the boot disk and move it somewhere else in the hard disk. Once the virus is in the startup memory, it will do whatever it was originally programed to do. Program viruses – These types of viruses attack executable files. Files that have extensions like .BIN, .COM, .EXE, .OVL, and .DRV. Once the files are executed the programs and virus will all load into memory. Once it is in the memory the virus can spread to other files and do its damage. Luckily these are easy to remove compared to Boot viruses. Stealth viruses – This is the type of virus that is an expert at avoiding detection using various methods. Although the... ... middle of paper ... ...ents is very important because many times viruses ride on email attachments, and enter the system when you open the attachments. Only open attachments when you have asked someone to send it to you personally. You should also try to avoid downloading from sites and if it is absolutely necessary then make sure the website you are downloading the content from is trustable. Although the things listed above are very crucial having an anti-virus program and keeping it up to date is something that should be heavily paid attention to. This is beneficial because it detects and helps to remove the virus before it can do much damage. Make sure that you choose a well-known antivirus program. Installing a firewall helps to keep the intruders such as viruses out. If you have a windows product then firewall is turned on by default. If not then make sure to turn firewall on.
I decided to read the book by David Harley called Viruses Revealed. This book goes into great detail about the different kinds of viruses and virus mechanisms, the solutions to these viruses, studies on different cases of viruses and then the social aspects of viruses. In the first part of the book, Harley talks about the problems with viruses. A virus is a program that infects other programs to modify them. “Infecting means that a virus will insert itself into the chain of command” (Harley). The virus structure was defined into three different parts: Infection, Payload, and Trigger. The infection is defined as the way or ways in which the virus spreads. The payload is defined as what the virus does besides duplicating itself. Trigger is defined as the procedure that decides whether or not the payload is necessary. Harley also talks about the difference between damage versus infection. The major difference between the two is that many users have infected documents or applications on their computer. Whether or not those applications are run is the difference between the two. In part one Harley also converses about Trojan Horses. Trojan horses are normally known as a virus, but he shoots that down. Harley says that Trojan Horses are normally not viruses, but just a worm that goes from computer to computer. After talking about different kinds of viruses and worms, he goes into Anti-Virus softwares. There are two different kinds of anti-viruses. One being virus-specific. Virus-specific means that every time a virus is found on your computer, it is identified but not detected. Generic scanners do the opposite. Generic scanners detect viruses but do not identify them.
Imagine this; you are sitting at your desk looking at a bunch of pictures. Just a normal scene, what could go wrong? Suddenly, you’re attacked by deadly things that are trying to steal your personal information like your credit card numbers, email address, all your passwords, everything. Could this be the work of ninjas? No (bet that is what you first thought though). What about the FBI? No. Then what was it? It was a virus. If you hadn’t figured it out by now, you were looking at pictures online using Google images (for all you Bing fans, I’m sorry but Google is much better). You were downloading pictures from Google and one of them happened to contain a virus and it was downloaded with one of the pictures. How do I know this is a virus? The answer is that I don’t. I didn’t give enough symptoms to diagnose this. To the pros at hacking and security, you may know that viruses are not the only threat. If you are new to the world of computers, you might not. The three types of malware that will try to harm your PC or your data in any way are Trojans, worms, and the most famous, viruses. These three are very different and all are terrible for you and your PC.
The protection of your network requires a level of network security. If you do not have security on your network, then you are capable of being hacked or receiving malware, spy, virus, and lots more. There are many programs or applications that can help detect and prevent strange activities on your computer, but there is also ways that you can help prevent anything from happening. Creating a password for your network is a good start toward protection of your computer. Try to make the password something only you would know, and maybe throw some numbers in there as well to maximize protection. It is good to know who all is on your network and internet; because if someone were to log on to your internet from a distance, they could plant viruses and other things into your files on the network. Quite a bit of problems occur in network when file sharing takes place in a work place to copy or manage files. Most of the time when this happens, no one sets the security setting up themselves,...
What is virus? A computer virus, according to Webster's Collegiate Dictionary, is "a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data)". Two categories of viruses, macro viruses and worms, are especially common today. Computer viruses are never naturally occurring; they are always man-made. Once created and released, however, their spread is not directly under human control. One example of a virus is the Anna Kournikova virus, which comes in the form of a picture sent through email.
In 1998, Chernobyl virus affects computers that are running Windows; it is one of the most viruses destructive, written by Taiwan's "Shan Ling is", the name "Chernobyl" in relation to "an incident Chernobyl" that took place in Ukraine in 1986 because of an explosion at a nuclear reactor. Chernobyl virus scans the boot drive to become the device is unable to load. At the same time it is trying to clear the BIOS," the basic Input/output System instructions that tell the computer to start", which often being protected from writing, so the people who are infected with this virus; they changed their device or rather change the motherboard of a computer. (BBC News, 1999)
Computer Viruses are a form of malware that are small software programs that can spread to different computers. They cause interference to your computer’s operations,
MS-DOS 6.X) and loads itself at Side 0, Cylinder 0, Sectors 4 and 5. The virus
The word virus is derived from the Latin word meaning “poison, slimy liquid, or poison juice. ” Viruses are very small infectious (pathogenic) particles that cannot be seen with an ordinary lighted microscope. The virus is encapsulated with protein, and is unable to multiply unless it is living inside the cells of a living host. As such, when a virus enters the living cells of an animal or plant, something extraordinary
“A digital world we became”. These days individuals turned to use computer systems in everything in their lives. They even use them in manufacturer instead of employees. I did not say that technological innovation is not essential for us but sometimes the technological innovation disregards our role in life. Technological innovation is very essential to any lifestyle to flourish. Technology contains cell mobile phones, laptops, machines, Ipads and many other factors. Not also they include all the excellent stuff but any great factor comes out with a drawback. Technological innovation has some drawbacks, and the most essential one of them that we will mainly talk about is the malware.
Viruses are simple yet deadly. They disguise themselves and spread without any instructions. They can send themselves through e-mail or travel over a shared internet connection. They are hidden from their victims as they slowly eat away at their computers. They are capable of compromising entire computer networks. With all our personal information saved on computers it is vital that we keep it safe. Antivirus software is a marvelous tool that should be installed on every computer. Viruses can be destructive but if we are able to understand how they work, we will be better able to protect ourselves from them.
Malicious software in short known as Malware. It is also known as computer Contaminant. Similar to biological parasite, malware also reside in a Host. Malware will get installed on host without user’s consent. Generally a software is considered malware based on the intent of the creator...
Is a computer virus similar to a human virus? Below is a chart that will show
A virus is a piece of code that spreads through some user interaction(going to a shady website or downloading a file), usually written with evil intentions. A virus infects files that already exist on systems. They are not their standalone programs. It is designed to wreak havoc on a computer and spread itself from one file to another, then from computer to computer. (“What Are Viruses, Worms, and Trojan
...ntial information from a user. Luckily, there are reliable ways of defending against them. The most reliable way is to install strong security software that has the capacity to defend against the multifaceted forms of threats. Avoiding P2P file sharing sites and scanning email attachments before downloading them are also a surefire way of protecting a computer against malware threats. Basic acts like using an updated browser and allowing Windows updates to install and update themselves are also necessary to keep a machine safe. Furthermore, checking validity of individual website addresses and installing authenticated software can also help a computer user remain safe from potential data theft and possible damage of useful programs. It may also pay good dividends to backup files. In case of a lethal malware attack, backed-up files can always be recovered easily.
Malware can survive in a number of ways say different sizes, shapes and also the purpose ranging from viruses to spyware and to bots. Malware in general is classified into two types. They are the concealing malware and infectious malware. In case of infectious malware, the malware code is said to spread all over which means that the software code shall replicate from one user to another and this goes on. In infectious malware, we need to consider two cases, which are called the viruses and the worms. Viruses are termed as the software that has executables within itself and causes the executables to spread when it is run. The second case called worms is a software which infects a computer and then spreads to others.