Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Solutions to viruses
An essay about computer virus
Computer viruses in computers environment
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Solutions to viruses
Computer Viruses
A virus is a program that copies itself without the knowledge of the computer user. Typically, a virus spreads from one computer to another by adding itself to an existing piece of executable code so that it is executed when its host code is run. If a virus if found, you shouldn't panic or be in a hurry, and you should work systematically. Don't rush!
A Viruse may be classified by it's method of concealment (hiding). Some are called stealth viruses because of the way that they hide themselves, and some polymorphic because of the way they change themselves to avoid scanners from detecting them.
The most common classification relates to the sort of executable code which the virus attaches itself to. These are:
¨ Partition Viruses ¨ Boot Viruses ¨ File Viruses ¨ Overwriting Viruses
As well as replicating, a virus may carry a Damage routine.
There is also a set of programs that are related to viruses by virtue of their intentions, appearances, or users likely reactions. For example:
¨ Droppers ¨ Failed viruses ¨ Packagers ¨ Trojans ¨ Jokes ¨ Test files
THE DAMAGE ROUTINE
Damage is defined as something that you would prefer not to have happened. It is measured by the amount of time it takes to reverse the damage.
Trivial damage happens when all you have to do is get rid of the virus. There may be some audio or visual effect; often there is no effect at all.
Minor damage occurs when you have to replace some or all of your executable files from clean backups, or by re-installing. Remember to run FindVirus again afterwards. Moderate damage is done when a virus trashes the hard disk, scrambles the FAT, or low-level formats the drive. This is recoverable from your last backup. If you take backups every day you lose, on average, half a day's work.
Major damage is done by a virus that gradually corrupts data files, so that you are unaware of what is happening. When you discover the problem, these corrupted files are also backed up, and you might have to restore a very old backup to get valid data.
Severe damage is done by a virus that gradually corrupts data files, but you cannot see the corruption (there is no simple way of knowing whether the data is good or bad). And, of course, your backups have the same problem.
Unlimited damage is done by a virus that gives a third party access to your network, by stealing the supervisor password. The damage is then done by the third party, who has control of the network.
At the Aim Higher College there have been recently discovered malware on the campus systems that are due to many recent attacks. I used an Anti-virus protection software called AVG on the computer systems on campus and ran a whole computer scan. The results came back very quick of numbers of malware being high and medium priorities that these should not be taken lightly. Furthermore, the scan found many viruses, Trojans, and malicious software and applications.
I decided to read the book by David Harley called Viruses Revealed. This book goes into great detail about the different kinds of viruses and virus mechanisms, the solutions to these viruses, studies on different cases of viruses and then the social aspects of viruses. In the first part of the book, Harley talks about the problems with viruses. A virus is a program that infects other programs to modify them. “Infecting means that a virus will insert itself into the chain of command” (Harley). The virus structure was defined into three different parts: Infection, Payload, and Trigger. The infection is defined as the way or ways in which the virus spreads. The payload is defined as what the virus does besides duplicating itself. Trigger is defined as the procedure that decides whether or not the payload is necessary. Harley also talks about the difference between damage versus infection. The major difference between the two is that many users have infected documents or applications on their computer. Whether or not those applications are run is the difference between the two. In part one Harley also converses about Trojan Horses. Trojan horses are normally known as a virus, but he shoots that down. Harley says that Trojan Horses are normally not viruses, but just a worm that goes from computer to computer. After talking about different kinds of viruses and worms, he goes into Anti-Virus softwares. There are two different kinds of anti-viruses. One being virus-specific. Virus-specific means that every time a virus is found on your computer, it is identified but not detected. Generic scanners do the opposite. Generic scanners detect viruses but do not identify them.
Data could be lost permanently, rather than at least being available in a consistent state that existed prior to a failure.
It is recommended that all personal computers be backed up. Copies of the personal computer files
...come a virus that consumes its host, ultimately leading to its own demise in the process.
files can also be purged manually with the SALVAGE utility, which is a great way
The hanta virus is not a new foe to humanity. This mysterious and sometimes fatal disease has plagued humanity for over 1000 years. This virus, most likely originating in China over 1000 years ago, is transmitted by human contact with mice. Only relatively recently has the hanta virus captured the attention of the United States. Although the hanta virus has been known for such a long time, there is little known about the virus. In the United States most cases are found in the southwestern part of the country, although cases have been reported from all four corners of the country. Recently, there have been successful tests done on prospective vaccines for the hanta virus. Despite this, strains of the hanta virus kill many people a year for lack of an effective medicine or vaccine (www.pharminfo.com).
Physical damage is something that, once done, can not be undone. It is something that is going to follow her for the rest of her life, that will not allow her to grow as a person physically.
A person who suffers harm or damage is hurt in some way,hurt might be physical or it might be some other type of hurt.
One of them could be the system could crash as if not saved data can
...a malicious site where the malicious code like the activex control can be downloaded on to the users system. This infects the users computer.
“A digital world we became”. These days individuals turned to use computer systems in everything in their lives. They even use them in manufacturer instead of employees. I did not say that technological innovation is not essential for us but sometimes the technological innovation disregards our role in life. Technological innovation is very essential to any lifestyle to flourish. Technology contains cell mobile phones, laptops, machines, Ipads and many other factors. Not also they include all the excellent stuff but any great factor comes out with a drawback. Technological innovation has some drawbacks, and the most essential one of them that we will mainly talk about is the malware.
In this globalized arena, with the proliferating computer users as well as computer networks, risks associated like Malware attacks are also multiplying. As the proverb
Malicious software, or simply malware, can be described as software that a computer user never authorized to be loaded. This means that the software can be found on user’s computer without his or her knowledge. Furthermore, a malware can be described as software that collects private information from any computer without user’s knowledge and authorization. As the name suggests, this software is malicious and can do great damage to a computer, mobile device, or other related devices. This damage can range from something as slight as altering the author’s name on a document to massive damage like making an entire device fail to function properly (Töyssy and Marko 109). The good news is that malwares can be controlled or prevented. As a matter of fact, it does not cost a fortune to keep a device safe from malware attacks. It also needs enough knowledge about them. In order to be able to do this, however, it is important to understand the various terminologies used to describe malicious software.
Malicious code, also known as malware, installed on a computer provides an attacker with the control over this machine. Therefore, malware can be defined as “a set of instructions that run on your computer and make your system do something that an attacker wants to do”. It is more common to see malicious code to be implemented in binary executable files. However, it can be implemented in almost any computer language. Attackers have used a huge number of scripting languages, word processing macro languages and a h...