• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Viruses -The So Called Threat

Extracts from this document...

Introduction

Computer Viruses - The So Called Threat Computer Viruses, what are they? Deadly programs wrote by the best of the best, or super weapons used by powerful countries against their enemies? Or, just harmless (mostly) little creations made by bored programmers? I think the latter is more correct. Most viruses are harmless, only a very small percentage causes harm to a computer, either deliberately or due to errors in the code. But, it is certainly due to the media that everyone is scared of them. All most all just spread and do something annoying, not format your hard drive. Take the Stoned virus for example, all it does is infect the boot sector of a disk then loads itself in memory. When the Stoned virus is in memory, it waits for the 13^th of any month then displays on your screen "Your computer is now stoned". While in memory it infects any disk that is in your computer and any entered after that. In this essay I intend to describe the different types of viruses, how they work, how they are written, how to get rid of them and how to find out if you have one. ...read more.

Middle

Macro viruses only infect MS Word and MS Excel. MS Word and MS Excel have their own programming language built into them, Visual Basic. VB (Visual Basic) enables programmers to write programs to automate tasks in Word Documents or Excel Spreadsheets. But it also enables virus writers to create viruses that can spread through the most popular package documents by just reading the documents. And, MS Word and MS Excel has another stupid feature, it comes by the name of normal.dot. It enables the user to put macros in it so that they are run every time you open any document or create a new one. You can also put viruses there. Microsoft at their best as usual. Worms are not actually viruses. Normal computer viruses have to be run by the user somehow to spread, but worms spread all by themselves, with no human intervention at all. They almost always spread through either networks or the Internet. You probably have heard of the second most famous worm ever, the I_Love_You letter worm that took the worlds media by storm in late 1999, early 2000. ...read more.

Conclusion

4) Read, read and read - Keep up to date on all security issues and virus information. Good sites include [2]www.bugtraq.com, [3]www.rootshell.com and [4]www.microsoft.com (Hmmm, isn't that the source of all the problems? Well, they do have all the updates for Windoze and Microsoft products). Basically viruses aren't as big a threat as the media makes them out to be. I personally have a collection of around twenty or more viruses, some harmful, some not. In the finally edit / copy of this essay there will be a floppy disk containing the source code for some of the most famous and not so (but just a dangerous) famous viruses. But, before you go mental at me for giving out viruses to anyone, I have edited them so that they don't do any damage unless you know good programming then you could change it back. But, I leave that choice to you, and remember, if you use the source (edited or not) and get caught, then don't blame me, I didn't tell you to do it. (PS. You can get the full unedited source code and a few of my own at my website. I'll tell you where it is in the next edit / copy). ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Major drawback is that it can cause network congestion which then results in network performance, the speed and many other things. Peer-to-Peer Network In a Peer-to-peer network a couple of computers are connected together without the use of a server and they share the resources.

  2. Visual basic

    Sub End If If sp2 = True And X5.Visible = False Then O5.Visible = True sp1 = True sp2 = False Exit Sub End If End Sub Private Sub Image6_Click()'When you click on the image6 box image appears and it show you "O or X" If sp1 = True And

  1. Ways of Promoting a Website

    However, there are features to this which are ultimately considered undesirable to the every day user. It has been found the JavaScript language has aided computer hackers in their attempts to corrupt and miss-use computers, this is a significant problem.

  2. Program Code Program DVD_Program; Uses Menuunit, CRT, dos; ...

    Add_Menu ('Add a video record', 1, 5); Add_Menu ('-', 1, 6); Add_Menu ('Locate member record', 1, 7); Add_Menu ('Locate video record', 1, 8); Add_Menu ('-', 1, 9); Add_Menu('View all member records', 1, 10); Add_Menu('View all video records', 1, 11); Add_Menu ('Edit', 2, 1); Add_Menu ('Edit a member record', 2, 2);

  1. Flexible Architectures in Communication Security Application

    key private key private key Lisa Wu Page 10 4/22/01 Public-key ciphers have the advantage of being able to establish a secure communication channel without an unsafe exchange of keys. Private-key ciphers, on the other hand, require a shared private key before secure communication can commence.

  2. Investigating Visual Programs

    * The project is made up of modules. * Each module is made up of Procedures. * 4 type of Procedures: o Event Procedures (e.g., button click) o VB Procedures and Functions (e.g., IsNumeric) o User Defined Sub Programs o User Defined Functions Objects make programming much easier * Instead of having to do everything through statements, Objects make programming much easier.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    However, it would take a lot longer to code a program in low-level language and experience and skill would be required. All the code is in one procedure and therefore maintainability would be extremely difficult. Low-level languages are also dependent on hardware so if one program works on one type

  2. Computer Aided Design Package

    a CAD package that I justify and anything else that is needed to run this application. With this budget I will also need to buy an A0 plotter, two graphics tablets, networking equipment and training for the employees on using the CAD package.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work