Table of contents Page 1. Computer viruses 1 1.1. Introduction 1-2 1.2. History of computer viruses 2-3 2. Classification of computer viruses 2-7 3. Spreading of computer viruses 8 References 9 Table of figures 1.1 How viruses work 2 1.2 Infection of MacMag virus - 1988 3 2.1 Classification of computer viruses 4-7 2.2 Distribution of Viruses 7 1. Computer Viruses 1.1. Introduction A small computer programme which is loaded to a computer and runs against the wishes of the user using its destructive abilities is called as a computer virus. A computer virus can be replicated itself. Figure 1.1 How viruses work 1.2. History of computer viruses There is a long history of the development of computer virus and its evolution has been in line with software and hardware technology advance. Viruses were written just for fun or for malicious purposes. When the operating system was developed, the virus was able to improve itself to live on new systems. Public attention was not drawn much by computer virus until it caused serious consequences. The Creeper virus was first detected on ARPANET (The Advanced Research Projects Agency Network), the forerunner of the Internet, in the early 1970s. Creeper was an experimental self-replicating programme which was written by Bob Thomas at BBN Technologies. This virus was written by him in 1971. DEC PDP-10 computers which were running the TENEX operating system were infected by Creeper, using ARPANET. Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The ... ... middle of paper ... ... Distribution of Viruses 3. Spreading of computer viruses Computer viruses can be spread from removable media, from downloads off the internet and from email attachments. When a removable media such as a pen drive or a portable hard disk is connected to an infected computer, the virus is entered to the media automatically. When that same removable media is connected with another computer, that computer also gets infected by the virus. Most of the time viruses are spread through downloads off the internet. Accessing to unsecured sites cause to this situation. Emails are another source which contributes to the spreading of viruses. Viruses could be entered to computers through emails as attachments. Opening unknown emails will be a help for these kinds of viruses. References http://www.wikipedia.org http://www.microsoft.com http://www.wave.com
This virus searches for a new vulnerable host in order to survive and carry the disease to the next victim. The critical aspect around the spread of a virus is how drastically the reproduction process occurs. Without being controlled, the contamination throughout any species causes the spread to take place in a toxic way, “On day one, there were two people. And then, four, and then, sixteen. In three months, it’s a billion.
I decided to read the book by David Harley called Viruses Revealed. This book goes into great detail about the different kinds of viruses and virus mechanisms, the solutions to these viruses, studies on different cases of viruses and then the social aspects of viruses. In the first part of the book, Harley talks about the problems with viruses. A virus is a program that infects other programs to modify them. “Infecting means that a virus will insert itself into the chain of command” (Harley). The virus structure was defined into three different parts: Infection, Payload, and Trigger. The infection is defined as the way or ways in which the virus spreads. The payload is defined as what the virus does besides duplicating itself. Trigger is defined as the procedure that decides whether or not the payload is necessary. Harley also talks about the difference between damage versus infection. The major difference between the two is that many users have infected documents or applications on their computer. Whether or not those applications are run is the difference between the two. In part one Harley also converses about Trojan Horses. Trojan horses are normally known as a virus, but he shoots that down. Harley says that Trojan Horses are normally not viruses, but just a worm that goes from computer to computer. After talking about different kinds of viruses and worms, he goes into Anti-Virus softwares. There are two different kinds of anti-viruses. One being virus-specific. Virus-specific means that every time a virus is found on your computer, it is identified but not detected. Generic scanners do the opposite. Generic scanners detect viruses but do not identify them.
Bob is at the skate park, showing off his skills as a skateboarder. With one wrong move, he fell off of his skateboard, and his knee scrapped on the concrete, causing a big gash on his knee. A virus enters in the knee, and it has a mission. Its mission is to infect every organ in Bob's body.
All information obtained about an IP address from where authorities suspected the worm had came from led them to obtain a search warrant on a individual on August 19, 2003. On that day, FBI and USSS Special Agents seized seven computers throughout the household. The individual in question, Jeffrey Lee Parson, admitted to agents that he modified the Blaster worm and creating a variety of them including one named, W32/Lovesan.worm.b. Within the worm he placed code that would direct computers to his personal website, www.t33kid.com, so he could maintain a list of compromised computers.
Discovery of this virus divided scientist in two groups; the ones in favor of publication the virus and the ones are against the publication. According to Fouchier in the article “The Deadliest Virus” by Micheal Green, he says that if more people have access to it, it
Spread of virus or worms in computer network is very much similar with the spread of virus in biological systems. Remarkable research has been done in biological epidemic. Most of the models which are developed in computer epidemiology are taken from biological epidemic by changing few compartments or by adding various parameters. The basic models describe the number of individuals (or proportion of the population) that are susceptible, infected and recovered from a particular disease. The assumptions produce three standard sets of differential equations that give the foundations of almost all of mathematical epidemiology: the susceptible-infectious-recovered (SIR) model (Kermack, Mckendrick, 1927, 1932, 1933). Many biologically motivated modifications have been made to this basic framework also in computer epidemics. The basic model SIR (Susceptible-Infectious-Recovered) is given by Kermack and Mckendric. Based on the classical epidemic model of Kermack and Mckendric, several works have done in computer epidemiology. SIR model is extended to SEIR, SEIQR etc. Works of Mishra et. al. shows diversity in e-epidemic ...
Viruses can be transmitted in many ways. Being in contact with an infected person will most likely transfer the virus. One can also obtain the virus through swallowing, inhaling, and unsafe sex. Poor hygiene and eating habits usually increase the risk of catching a viral infection. Contracting a viral infection is followed by adverse s...
In today’s days malware is designated as a software which aims to disturb a computer with the consent or permission of the owner. This term “Malware” is used by computer professionals to describe a varied forms of destructive, annoying and intrusive software code. This word “Malware” is used to indicate all types of malware which include a true set of viruses.
What is the “MALWARE”? A malware refers to software programs designed to damage or do other unwanted actions on a computer system. In Spanish, "mal" is a prefix that means "bad," making the term "bad ware" .Malware includes viruses, worms, Trojan horses, and spyware. Viruses, for example, can cause havoc on a computer's hard drive by deleting files or directory information. Spyware can gather data from a user's system without the user knowing it. This can include anything from the Web pages a user visits to personal information, such as credit card numbers.
The history of cybercrime goes back to 1971 and the first computer virus called the Creeper which was created by Bob H. Thomas, who was a BBN engineer (Dalakov, Meltzer, and Phillips). BBN which stands for Bolt, Beranek and Newman, is now Raytheon BBN Technologies (“About”, Dalakov). A computer virus is a program that is created to cause damage to a computer or perform other malicious acts (204). The Creeper virus was designed to infect the ARPANET network. The ARPANET, which stands for Advance Research Projects Agency was set up by the U.S. Government as an agency in 1969 to provide a network of computers that would connect various academic and research organizations; it was the predecessor of the Internet (“Internet”, Morley, and Parker).
Malicious software in short known as Malware. It is also known as computer Contaminant. Similar to biological parasite, malware also reside in a Host. Malware will get installed on host without user’s consent. Generally a software is considered malware based on the intent of the creator...
Virus is one of the most common malware. Unlike spyware, virus is largely designed to harm useful programs or wreck down an entire operating system. There are many ways through which virus may enter a computer. The most common way is via email attachments. A...
Nazario, Jose “Defense and Detection Strategies against Internet Worms”, Artech House Computer Security Library, 2004
In 500 B.C. the abacus was first used by the Babylonians as an aid to simple arithmetic. In 1623 Wihelm Schickard (1592 - 1635) invented a "Calculating Clock". This mechanical machine could add and subtract up to 6 digit numbers, and warned of an overflow by ringing a bell. J. H. Mueller comes up with the idea of the "difference engine", in 1786. This calculator could tabulate values of a polynomial. Muellers attempt to raise funds fails and the project was forgotten. Scheutz and his son Edward produced a 3rd order difference engine with a printer in 1843 and their government agreed to fund their next project.
Thousands of years ago calculations were done using people’s fingers and pebbles that were found just lying around. Technology has transformed so much that today the most complicated computations are done within seconds. Human dependency on computers is increasing everyday. Just think how hard it would be to live a week without a computer. We owe the advancements of computers and other such electronic devices to the intelligence of men of the past.