Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Solutions to computer virus
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Solutions to computer virus
Computer VirusesIt is morning. You’re awakened to the sweet smell of flowers and the sound ofBirds chirping. You turn on your new I B M computer only to findThat every bit and byte of information has been erased. A computer virus hasStruck. These small bits of computer code have slowly overtaken the world ofComputing.
A computer virus is a small program that attaches itself to disksAnd computer systems with instructions to do something abnormal. Sometimes theEffects of a computer virus can be harmless. But sometimes the effects of aComputer virus can be dangerous. But whichever way you look at it they stillCause problems. There are many kinds of computer viruses. Three of the mostCommon are the time kill, the logic kill and the Trojan horse.
The time kill isA virus triggered by the computers clock reaching a certain date and time (oftenFriday the thirteenth). The logic kill is a virus triggered by a certain valueAppearing a certain part of the computers memory, either relevant to the virusesPurposes or at random. The Trojan horse is an innocent seeming programPurposely infects with a virus and circulated publicly. There is a cure forThese viruses, though. These "cures" are called remedies.
A remedy is aProgram that watches for typical things viruses do, halts them, and warns theComputer operator."Put a child with the small pox together with a bunch of healthy childs and notAll of them will get sick." But that is not the case with computer viruses.You see when a computer virus passes on a virus it never fails unless theComputer is protected with a remedy. A typical computer virus spreads fasterThan the small pox too. Now as I said before when a computer virus attemptsTo infect another computer the attack is not always successful. However thatDoes not mean the infected computer stops trying. An infected computer willPass on the virus every chance it gets. Computer viruses are spread by twoMethods Floppy disks and modems.
A modem is a phone link connected to aBulletin board service (B.B.S.). A B.B.S. is a lot like what it sounds, aBulletin board. If a human calls you and you're not home he leaves a messageSo that the next time you use the B.B.S. you can see the message.
HoweverSometimes a human can leave a virus in a B.B.S. or an unsuspecting computerUser whose computer is infected the next time you hook up to the B.
Almost no one on Earth has any immunity at all to this virus, which makes ordinary vaccines useless against it. The sudden spread of the virus into Europe foreshadows an epidemic development that could be worldwide. Ultimately, there is no way to protect ourselves against epidemics. They will keep disappearing and coming back in new forms.
Beal, V. (2011, March 29). The difference between a computer virus, worm, and Trojan horse.
Modern medicine has proved that the best way to prevent the contraction of a disease for humans is to inject a tolerable amount of the virus into the host and let the individual's immune system build a defense capable of withstanding future invasions of the same strand. The small pox vaccination, for example, has eliminated the disease from almost every nation on Earth.
The hanta virus is not a new foe to humanity. This mysterious and sometimes fatal disease has plagued humanity for over 1000 years. This virus, most likely originating in China over 1000 years ago, is transmitted by human contact with mice. Only relatively recently has the hanta virus captured the attention of the United States. Although the hanta virus has been known for such a long time, there is little known about the virus. In the United States most cases are found in the southwestern part of the country, although cases have been reported from all four corners of the country. Recently, there have been successful tests done on prospective vaccines for the hanta virus. Despite this, strains of the hanta virus kill many people a year for lack of an effective medicine or vaccine (www.pharminfo.com).
Likewise, if the virus cultures are kept, there is a possibility that enemies could obtain it to use against other countries at their leisure. However, because it is impossible to identify countries that are harboring the virus in order to take action to eradicate it, eliminating the only protection the world has against the virus would be a lethal mistake.... ... middle of paper ... ... Since it is impossible to tell what countries wrongfully obtain live small pox virus, complete eradication of the virus is non-existent.
At the Aim Higher College there have been recently discovered malware on the campus systems that are due to many recent attacks. I used an Anti-virus protection software called AVG on the computer systems on campus and ran a whole computer scan. The results came back very quick of numbers of malware being high and medium priorities that these should not be taken lightly. Furthermore, the scan found many viruses, Trojans, and malicious software and applications.
I decided to read the book by David Harley called Viruses Revealed. This book goes into great detail about the different kinds of viruses and virus mechanisms, the solutions to these viruses, studies on different cases of viruses and then the social aspects of viruses. In the first part of the book, Harley talks about the problems with viruses. A virus is a program that infects other programs to modify them. “Infecting means that a virus will insert itself into the chain of command” (Harley). The virus structure was defined into three different parts: Infection, Payload, and Trigger. The infection is defined as the way or ways in which the virus spreads. The payload is defined as what the virus does besides duplicating itself. Trigger is defined as the procedure that decides whether or not the payload is necessary. Harley also talks about the difference between damage versus infection. The major difference between the two is that many users have infected documents or applications on their computer. Whether or not those applications are run is the difference between the two. In part one Harley also converses about Trojan Horses. Trojan horses are normally known as a virus, but he shoots that down. Harley says that Trojan Horses are normally not viruses, but just a worm that goes from computer to computer. After talking about different kinds of viruses and worms, he goes into Anti-Virus softwares. There are two different kinds of anti-viruses. One being virus-specific. Virus-specific means that every time a virus is found on your computer, it is identified but not detected. Generic scanners do the opposite. Generic scanners detect viruses but do not identify them.
for which no cure has yet been created. It is important to know however, that methods are currently available which can prevent the transfer of this virus, and even slow down its malicious effects. before they become fatal. It is equally important to know how to avoid getting the virus and also the symptoms in case you might run across them. They are all a lot.
them and how the virus itself adapts to meet the ever changing conditions of a
Computers are main technological features that allow criminals to step into unsuspecting victims lives. With a simple piggy-backing program hackers are able to track every keystroke made by the victim. One such program is called spyware, not to be confused with adware, which is often referred to interchangeably with spyware, but is potentially harmless (Louis 15). Spyware, hidden within downloaded software, implants itself deep within a computer’s hard drive, allowing it to track every move made by the user (Louis 16). Once inside a system, spyware can gather e-mail addresses, passwords, and credit card numbers.
Malicious software in short known as Malware. It is also known as computer Contaminant. Similar to biological parasite, malware also reside in a Host. Malware will get installed on host without user’s consent. Generally a software is considered malware based on the intent of the creator...
Malicious code, also known as malware, installed on a computer provides an attacker with the control over this machine. Therefore, malware can be defined as “a set of instructions that run on your computer and make your system do something that an attacker wants to do”. It is more common to see malicious code to be implemented in binary executable files. However, it can be implemented in almost any computer language. Attackers have used a huge number of scripting languages, word processing macro languages and a h...
Virus is one of the most common malware. Unlike spyware, virus is largely designed to harm useful programs or wreck down an entire operating system. There are many ways through which virus may enter a computer. The most common way is via email attachments. A...
“A digital world we became”. These days individuals turned to use computer systems in everything in their lives. They even use them in manufacturer instead of employees. I did not say that technological innovation is not essential for us but sometimes the technological innovation disregards our role in life. Technological innovation is very essential to any lifestyle to flourish. Technology contains cell mobile phones, laptops, machines, Ipads and many other factors. Not also they include all the excellent stuff but any great factor comes out with a drawback. Technological innovation has some drawbacks, and the most essential one of them that we will mainly talk about is the malware.
In today’s days malware is designated as a software which aims to disturb a computer with the consent or permission of the owner. This term “Malware” is used by computer professionals to describe a varied forms of destructive, annoying and intrusive software code. This word “Malware” is used to indicate all types of malware which include a true set of viruses.