• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Introduction to Viruses

Extracts from this document...

Introduction

Introduction to Viruses Computer viruses may seem mysterious, even frightening, but are actually quite easy to understand. I'll try to shed some light on: how viruses work, what they really are, and some steps you can take to keep you and your information safe. Viruses are simple, once you understand what they can and can't do; it'll be that much easier to protect against them. Do you have anti-virus software on your computer? You should. If you don't get some, if you do, why should you need to understand any of this? The best reason is an informed consumer has the knowledge to judge if the anti-virus software they're using is giving the protection you think it is. Another reason is that viruses are only one threat to your programs and data; we'll explore how to protect ones self fully. Are viruses a serious threat, our just hype? Viruses and anti-virus programs are not the complex, hard to understand software they're made out to be. Not only can the programs be understood by anyone, but these days, it's critical that we all grasp how they work so we can protect ourselves. If you have a virus, you are no longer in control of your PC. Almost all viruses can cause damage to your files- mostly because the viruses themselves are poorly written programs. If a virus destroys nothing else, it does destroy your trust in your PC- you feel violated. Virus Types and What They Infect Viruses come in many types; written using many different infection strategies. ...read more.

Middle

02/15/2202 Virus-Worm "CoolNow": A new internet worm going by the name of "CoolNow" that infects computers upon visiting malicious Web sites, and spreads using the popular MSN Messenger Internet-pager. The new virus exploits a security hole in the Internet Explorer browser that Microsoft made public on Feb. 11 along with a bug fix, just two days before the worm appeared. Of great concern is the speed with which instant messages can be sent, and the amount of damage that could be caused by a well placed virus. The Wall Street Journal reported one of the patches Microsoft provided to users to fix security holes in Windows XP is vulnerable to the same type of virus it's designed to prevent. 01/31/2002 Linux.RST: This is a Linux virus that also implements several backdoor facilities, allowing an attacker to take control of the system infected with it. 01/28/2002 Myparty: The internet worm "Myparty" Poses as a web-site link. Not everything starting with "www" and ending in ".com" is a website! This virus spreads by E-mail. Appearing as a file attached to an E-mail message file and is a Windows application 30kb in length written in Microsoft Visual C++ and compressed in a XP utility. 01/17/2002 I-Worm.Gigger: This is a dangerous worm! It replicates using Outlook, Outlook Express, and mlRC. Is a worm written in Java Script and Visual Basic Script (VBS). It contains a destructive payload of routines that are able to format the user's hard disk after reboot, and can delete all files on all available disks. ...read more.

Conclusion

It cost megabucks to run those slow- moving hunks of metal; programmers had limited access to the dinosaurs. So the smarter ones created what they called "hacks" - programming shortcuts - to complete computing tasks more quickly. Sometimes their shortcuts were more elegant than the original program. Maybe the best hack of all time was created in 1969, when two employees at Bell Labs' think tank came up with an open set of rules to run machines on the computer frontier. Dennis Ritchie and Ken Thompson called their new standard operating system UNIX. It was a thing of beauty. Hackers View Latest Attacks with Scorn Longtime members of the computer hacker community- many of whom are now becoming well- regarded security consultants - are looking on the recent spate of attacks on the World Wide Web sites with distaste. The recent attacks are crude and amateurish say long time hackers. A denial- of- service attack is akin to killing an ant with a baseball bat- a crude and amateurish way of taking down a web site. Most hackers would rather infiltrate the site's security. Some deface Web pages with jokes, messages, or political statements but others seek to obtain sensitive data. Still others do nothing at all once they've broken into a system, treating the exercise as a test of skill. These attacks are worthless and childish; there is no grace, no skill and no intellect behind these attacks. There is definitely software out there that can filter out these attacks; unfortunately sites don't want to use it because it makes the pages load slower. It all boils down to profit versus protection. Which would you prefer? 2 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    The metropolitan police report an incidence of members of the homeless community being paid upwards of �5 per useful document obtained by bin raiding. * Obtaining your useful documents The criminal can obtain the victims documents via burglary, by

  2. Visual basic

    false goright = False End If End Sub TicTacToe game Dim sp1 As Boolean 'Player 1 Var Dim sp2 As Boolean 'Player 2 Var Dim p1p As Integer 'Player 1 Points Dim p2p As Integer 'Player 2 Points Function lösch()

  1. Analysis of Johnson Music

    After consulting them, my staff also agree that there are problems with the system. I am conscious that my customers may grow weary of the amount of time it takes to conduct a single sale, especially if purchasing more than one product, therefore I will allow you to research further

  2. Ways of Promoting a Website

    When there is a scripting language to be run within the body of a website the first thing that needs to occur is an interpreter is run to enable the programme or text to be compiled in to machine language, this obviously then allows the programme to be executed.

  1. Free essay

    Setting up and E-Commerce Site

    Marketing comes in useful for e-commerce sites as it lets people no it exists, the more people that find out about it the better. There are a number of ways this can be done, from Radio broadcasts to television adverts, to simply getting affiliates to brand your logo on their page for a small subscription cost.

  2. AQA Computing CPT3

    This function then converted the parameter into a 'String' and then analysed each character to individually set each digit. Then I am able to call this digit whenever I need to update a collection of digits. Below explains, using screen dumps, on how the movie frames have been developed through 7 line segments.

  1. Hardware and Software

    They can be expensive to operate if you do a lot of printing and it can be slow, and the output is faded. 4. Cartridges need to be changed more frequently and the special coated paper required to produce high-quality output is very expensive.

  2. Firewall Protection

    from tracking sites. Sometimes, the pictures are visible and provide some statistics about the site. Those tracking sites will try to save a small text either as a small file in a special directory, or as a line in a special file (depending on what is your browser), and your browser will usually

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work