• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Introduction to Viruses

Extracts from this document...

Introduction

Introduction to Viruses Computer viruses may seem mysterious, even frightening, but are actually quite easy to understand. I'll try to shed some light on: how viruses work, what they really are, and some steps you can take to keep you and your information safe. Viruses are simple, once you understand what they can and can't do; it'll be that much easier to protect against them. Do you have anti-virus software on your computer? You should. If you don't get some, if you do, why should you need to understand any of this? The best reason is an informed consumer has the knowledge to judge if the anti-virus software they're using is giving the protection you think it is. Another reason is that viruses are only one threat to your programs and data; we'll explore how to protect ones self fully. Are viruses a serious threat, our just hype? Viruses and anti-virus programs are not the complex, hard to understand software they're made out to be. Not only can the programs be understood by anyone, but these days, it's critical that we all grasp how they work so we can protect ourselves. If you have a virus, you are no longer in control of your PC. Almost all viruses can cause damage to your files- mostly because the viruses themselves are poorly written programs. If a virus destroys nothing else, it does destroy your trust in your PC- you feel violated. Virus Types and What They Infect Viruses come in many types; written using many different infection strategies. ...read more.

Middle

02/15/2202 Virus-Worm "CoolNow": A new internet worm going by the name of "CoolNow" that infects computers upon visiting malicious Web sites, and spreads using the popular MSN Messenger Internet-pager. The new virus exploits a security hole in the Internet Explorer browser that Microsoft made public on Feb. 11 along with a bug fix, just two days before the worm appeared. Of great concern is the speed with which instant messages can be sent, and the amount of damage that could be caused by a well placed virus. The Wall Street Journal reported one of the patches Microsoft provided to users to fix security holes in Windows XP is vulnerable to the same type of virus it's designed to prevent. 01/31/2002 Linux.RST: This is a Linux virus that also implements several backdoor facilities, allowing an attacker to take control of the system infected with it. 01/28/2002 Myparty: The internet worm "Myparty" Poses as a web-site link. Not everything starting with "www" and ending in ".com" is a website! This virus spreads by E-mail. Appearing as a file attached to an E-mail message file and is a Windows application 30kb in length written in Microsoft Visual C++ and compressed in a XP utility. 01/17/2002 I-Worm.Gigger: This is a dangerous worm! It replicates using Outlook, Outlook Express, and mlRC. Is a worm written in Java Script and Visual Basic Script (VBS). It contains a destructive payload of routines that are able to format the user's hard disk after reboot, and can delete all files on all available disks. ...read more.

Conclusion

It cost megabucks to run those slow- moving hunks of metal; programmers had limited access to the dinosaurs. So the smarter ones created what they called "hacks" - programming shortcuts - to complete computing tasks more quickly. Sometimes their shortcuts were more elegant than the original program. Maybe the best hack of all time was created in 1969, when two employees at Bell Labs' think tank came up with an open set of rules to run machines on the computer frontier. Dennis Ritchie and Ken Thompson called their new standard operating system UNIX. It was a thing of beauty. Hackers View Latest Attacks with Scorn Longtime members of the computer hacker community- many of whom are now becoming well- regarded security consultants - are looking on the recent spate of attacks on the World Wide Web sites with distaste. The recent attacks are crude and amateurish say long time hackers. A denial- of- service attack is akin to killing an ant with a baseball bat- a crude and amateurish way of taking down a web site. Most hackers would rather infiltrate the site's security. Some deface Web pages with jokes, messages, or political statements but others seek to obtain sensitive data. Still others do nothing at all once they've broken into a system, treating the exercise as a test of skill. These attacks are worthless and childish; there is no grace, no skill and no intellect behind these attacks. There is definitely software out there that can filter out these attacks; unfortunately sites don't want to use it because it makes the pages load slower. It all boils down to profit versus protection. Which would you prefer? 2 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    or keying in his/her pin number at an ATM, a card reader may have been installed onto the ATM giving the criminal the relevant card/user details. The criminal may wait for a receipt that the victim may leave behind which may show all of part of the victims bank or card account numbers.

  2. Visual basic

    false goright = False End If End Sub TicTacToe game Dim sp1 As Boolean 'Player 1 Var Dim sp2 As Boolean 'Player 2 Var Dim p1p As Integer 'Player 1 Points Dim p2p As Integer 'Player 2 Points Function lösch()

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    No one else can read it as only the data receiver has the decoder. Once the data receiver receives the encrypted data, it can be decoded by applying the decoder to the message and then it can be read normally.

  2. Analysis of Johnson Music

    This allows information to be gathered about the way the company currently runs. A great advantage about this is that if the company's documents are mainly paper-based then a lot of information can be gathered. Group discussion A group discussion involves a group of people who are involved in the situation (in this case, the running of the company)

  1. Ways of Promoting a Website

    To do so I will make a link that when clicked, stored my link in to the users favourites, thus there will never be any trouble of the user finding his or her way back to my site. An example of this can be seen on the following page.

  2. Free essay

    Setting up and E-Commerce Site

    If so then we need to consider a creation of a P.O Box address. This can be setup by going to the local post office and paying a small fee, from here we have a postal address that avoids conflicting to neighbours.

  1. AQA Computing CPT3

    will also reset the fuel timer / dispensed total (variable - fuelClock), the to pay total (variable - totalToPay), the pump will add the pay total for the current transaction to the total takings for the day (variable - totalTakings), and the pump will add the dispensed total for the

  2. Hardware and Software

    Task One (M1) I have outlined the following two hardware and stated the limitations of each hardware in terms of capture, manipulation and storage of graphics. 1. LCD (Liquid Crystal Display) Monitors 2. Inkjet Printer LCD (Liquid Crystal Display) Monitors: LCD (Liquid Crystal Display)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work