...Computer viruses have been aroud for many years, since about 1986. Who invented computer viruses? Where were they created? Can you create them? All of these questions will be answered, as well as a short timeline of virus history and highlight of some recent major viruses. First, What is a computer virus? And how do you protect yourself from them? Then, A short timeline of virus' history. And, finally a few recent major viruses. What is a computer virus? A computer virus is a program or piece of software that copies itself to your PC, or attaches itself to a document. For example, when you open an infected document it replicates and attaches to other files on your hard drive. The process goes unnoticed until it is too late and your computer crashes. There are 3 types of computer viruses; E-Mail Viruses, Worms, and Trojan Horses. E-Mail Viruses- Many Hackers use E-Mail Viruses to reek havock on the E-World. (According to WWW.HACKERS.COM-Hackers are evil people who have nothing better to do with their vast knowledge of computers than destroy them.) An E- Mail Viruse is sent from person to person via E-Mail. Once the infected E-Mail is opened it replicates by sending itself to everyone in your address book. Thus resulting, the people in your address book open the E-Mail and are then infected. Any simple Virus scaning software should be able to stop and remove E-Mail viruses. Norton Anti-Virus is one of the best choices for defense. ...
Words: 992 - Pages: 4
...System Attacks As computer users, we often just go about our lives, using our computers and networks and not even worrying about what may be out there waiting to attack our systems. Many attacks occur and the user has no idea that it is occurring or has occurred until something goes wrong with the system. System attacks occur when a hacker finds ways to take advantage of any vulnerability that your computer may have to gain access to the user’s system. One of the main ways that they do this is by delivering a Web page or an e-mail that contains a Trojan horse better known as a computer virus, which comes in several different forms. Denials of service attacks are another type of system attack that can attack a system via a computer site. In order to implement these attacks, the hackers use certain tools in order to get into the systems, and manipulate them. Although these attacks occur often on a daily basis, there are ways to protect our systems from these things whether it’s physical or some type of antivirus software. A virus is defined as “a small program that alters the way a computer operates without the knowledge of the computers users and often does different types of damage by deleting and corrupting data and program files, or by altering operating systems components, so that any computer operations are impaired or halted” (White) When the computer is infected with a virus, sometimes there is indication that it is there and sometimes it’s not. All viruses tend to...
Words: 1319 - Pages: 6
...According to the article”What is a Computer Virus” computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. Computer virus can attack computers in many ways and are often damaging to the computer. These viruses often spread without a persons knowledge about the virus and can be specially damaging to computers and expensive to those who own the computers to repair. Viruses can also affect program and the performance of the computer and cause severe harm. The main component in describing a virus is the viruses’ ability to replicate itself through computers or the internet. The first computer virus was created by Dr. Cohen, 26 yrs ago at the University of Southern California. Dr. Cohen realized that if a Trojan horse copied itself into other programs, then all those programs would be infected, and then everybody that ran any of those programs would get infected and so forth (Lee). From here, Dr. Cohen has since developed many ways to remove viruses and is one of the leading experts in that field. One of the most difficult things with viruses are they come in all different forms and are often disguised to the user. One type of virus is a direct action virus. According to the article “Different Types of Computer Viruses” on buzzle.com, the purpose of a direct action virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and...
Words: 570 - Pages: 3
...To create a virus, a user or attacker needs to create a code. In this code the attacker needs to express what type of virus, he/ or she wants to use. Once the attacker determines what type of virus is going to be used, then they must determine who they want to attack. Lastly, ask what type of data they want to gain from the attack. People write computer viruses. The person has to write the code, test it to make sure it spreads properly and then release it. A person also designs the virus's attack phase, whether it's a silly message or the destruction of a hard disk. . There are at least four reasons why this is done. The first is the same psychology that drives vandals and arsonists. For some people, that seems to be a thrill. If that sort of person knows computer programming, then he or she may funnel energy into the creation of destructive viruses. Secondly the reason has to do with the thrill of watching things blow up. Some people have a fascination with things like explosions and car wrecks. Creating a virus is a somewhat like that, it creates a virtual bomb inside a computer, and the more computers that get infected; the more "fun" the explosion. The third reason involves bragging rights; some people enjoy the status it holds. Certain types of programmers see security holes that could be exploited, and are compelled to exploit the hole themselves before someone else beats them to it. The reason that drives many people on a day-to-day basis to commit crimes, get easy cash...
Words: 963 - Pages: 4
...So, your surfin' the net when poof! Your computer screen goes blank and nothing on your keyboard works. You curse several times loudly, while smacking the monitor. Nothing happens, your computer has just crashed due to a virus. And no it's not West Nile, Small Poxs or Polio. Computer viruses have been aroud for many years, since about 1986. Who invented computer viruses? Where were they created? Can you create them? All of these questions will be answered, as well as a short timeline of virus history and highlight of some recent major viruses. First, What is a computer virus? And how do you protect yourself from them? Then, A short timeline of virus' history. And, finally a few recent major viruses. What is a computer virus? A computer virus is a program or piece of software that copies itself to your PC, or attaches itself to a document. For example, when you open an infected document it replicates and attaches to other files on your hard drive. The process goes unnoticed until it is too late and your computer crashes. There are 3 types of computer viruses; E-Mail Viruses, Worms, and Trojan Horses. E-Mail Viruses- Many Hackers use E-Mail Viruses to reek havock on the E-World. (According to WWW.HACKERS.COM-Hackers are evil people who have nothing better to do with their vast knowledge of computers than destroy them.) An E- Mail Viruse is sent from person to person via E-Mail. Once the infected E-Mail is opened it replicates by sending...
Words: 1040 - Pages: 5
...VIRUS TECHNOLOGY view Presentation The term virus is as old as hills are now in the world of computer technologies. A virus basically is software that is made to run automatically usually used for destructive purpose by the computer experts. Though virus is a well known but not known well. Definition : A computer virus is a coded program that is written in Assembly or a system programming language such as ‘C’ to deliberately gain entry into a host system and modify existing programs and/or perform a series of action, without user consent. In this paper we would like to throw light on some of the unturned stones of the world of virus. We would start from history of the virus i.e. who created the first virus, for what purpose and hoe it affect to the computer. Then classification of viruses by to different methods: Ø General classification of the virus. Ø Behavioral classification of the virus. We covered the topic how nowadays viruses affects to the Mobiles, how they come to the mobile. The small and most important topic that we covered is the ‘Positive Virus’. We covered how the virus actually works in the host computer along with one example as they would enlighten our knowledge about viruses, this is because we want to secure of viruses and actually need to known how are they programmed and executed automatically. We also covered some information about the most popular viruses with some vital information i.e. how they work, how much harmful to...
Words: 5536 - Pages: 23
...THE FUTURE OF TECHNOLOGY BY DEBRA JAMES WIU IT-330 Abstract Once before there was a business profit speed breaker called Macro Virus, and today it is still prevalent to a lesser extent, even though; Microsoft did do something about it, to where it is under control, but; still very much around. (Brightub articles 2011) .explains the well knows macro virus was a stark reminder of its disastrous power. In today’s world of technology computer viruses attack the software of a computer- the operating system usually attacks the software. (Microsoft /TechNet 2011), states the macro virus is known as a written virus in the internal macro language of applications. In some cases macro virus can cause no damage to the data, however; in other cases, macros viruses have been written that can cause damage to your work. This paper explains. What macro viruses are? How they spread. What affect they have? How to avoid a macro virus How to protect your computer What are Macro viruses…..? A macro virus is a computer infraction written in macro language, which is commonly built into word processing applications. (Goggle 2011, pg., 1) In general, Marcos viruses are a series of commands and executions that help automate specific tasks. Regardless of how many they create, they must be executed by a system that is able to interpret stored commands. There are some macro systems that are actually self-contained utilities while others are built into more advanced applications for users...
Words: 2341 - Pages: 10
...In this assignment, I will be addressing a few topics about computer virus . I will explain the difficulty of creating a computer virus and its frequency and also explaining the differences between a virus and a worm, along with their threat level. According to Microsoft, computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation (Microsoft, 2013). Computer viruses are difficult to create because you have to know the proper coding and determine what you are trying to attack. Many computer programmers or hackers have coding set up online as a start up, but majority of them don’t function correctly. There is constantly many people trying to hack into computers on a daily. Some are fortunate to succeed and some are not. A virus consists of self-propagating program codes that’s triggered by a specific time or event (Bidgoli, 2012). A virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Viruses can be transmitted through an email attachment or through a network. A computer virus severity varies. It can be mild like a prank, displaying images on a user’s screen or while others can damage your hardware, software or files. According to Cisco, all viruses are attached to an executable file, which means the virus may exist on a system but will not be able to active until a user runs or opens the malicious host file or...
Words: 568 - Pages: 3
...1. What is the main difference between a virus and a Trojan? A virus is a program that is capable of replicating with little or no user intervention, and the replicated programs also replicate further. There is typically a piece of code that causes an unexpected, usually malicious, event (payload) to occur. Viruses are often disguised as games or images with clever marketing titles. A Trojan horse is a program that either pretends to have, or is described as having, a set of useful or desirable features, but actually contains a damaging payload. True Trojan horses are not technically viruses, since they do not replicate, however many viruses and worms use Trojan horse tactics to infiltrate a system. Although Trojans are not technically viruses, they can be just as destructive. 2. A virus or malware can impact which of the three tenets of information systems security (CIA)? Describe how it impacts it as well. Virus maybe can send files to other people that don’t allow reading these files. It will affect Confidentiality. Some virus will break program. Then these programs cannot run. This wills effect Availability. Some virus will change some file in a program. This wills effect Integrity. 3. Once a malicious file is found on your computer, what are the default settings for USB/removable device scanning? What should an organization do regarding use of USB hard drives and slots on existing computers and devices? Besides Vendor IDs and Product IDs, some devices also have...
Words: 1736 - Pages: 7
...Computer Viruses: Detection, Removal & Protection Methods 1. [pic]Anti-Virus Programs 2. [pic]Detection of an Unknown Virus 3. [pic]Prophylaxis of Computer Infection 4. [pic]Recovery of Affected Objects 5. [pic]Virus Algorithm Analysis 6. Protection Methods Anti-Virus Programs 1. [pic]Types of Anti-Viruses 2. [pic]Which Anti-Virus Program is Better? 3. [pic]Tips on Usage of Anti-Virus Programs "Working with bad data implies good code" Andrew Krukov, AVP Team Types of Anti-Viruses Anti-virus programs are the most effective means of fighting viruses. But I would like to point out at once that there are no anti-viruses guaranteeing 100 percent protection from viruses. Any declarations about their existence may be considered to be either an advertising trick or a sign of incompetence. Such systems do not exist, because, for each anti-virus algorithm, it is always possible to suggest a virus counter algorithm, making this particular virus invisible for this particular anti-virus (fortunately, the opposite is also true: for any anti-virus algorithm, it is always possible to create an anti-virus). Moreover, the impossibility of the existence of the absolute anti-virus has been mathematically proved based on the theory of finite slot machines - the author of this proof is Fred Cohen. It is also necessary to pay attention to some terms used in anti-virus program discussion: False Positive - when an uninfected object (file, sector or system memory)...
Words: 4870 - Pages: 20
...Howard Mayo NT1230 4/3/12 8 Common Types of Computer Viruses Dictionary.com defines a computer virus as “a segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network (“Virus,” 2012).” The term virus has become more generic over the years and has come to represent any type of malware, or malicious software. There are many types of malware that can be classified as viruses but it is the intention of this paper to examine 8 of the most common types. These types are virus, worms, trojans, adware/pop-up ads, spyware, keyloggers, rootkits, and scareware. * Virus- as defined above, a virus is self-replicating code planted in a computer program. This malware’s sole purpose is to destroy or shut down systems and networks. (“Virus,” 2012). * Worms- These are standalone programs whose sole purpose is to replicate and spread themselves to other computers. Their main use is to search for and delete certain files from computers. * Trojans- This malware is designed to look like a useful program while giving control of the computer to another computer. It can be used for several malicious things: * As part of a botnet to use automated spamming or distribute denial-of-service attacks. * Electronic money theft * Data theft * Downloading or uploading of files to the computer * Deletion or modification of files * Crashing the computer * Watching the viewer’s screen * Anonymous...
Words: 642 - Pages: 3
...the end. Q: From your local computer, use your favorite Internet browser to research the threat identified on this screen and the possible remediation steps and document your findings in your Lab Report file. Viruses found: 1. Win32/DH{eR4UTxVzG3U} 2. Win32/DH{eR4UTxVzG3U} 3. Win32/DH{HhMXFE8Vcxt1} 4. Trojan horse Dropper.Generic4.BVMA 5. Trojan horse Hider.BNG 6. Trojan horse PSW.Generic11.NYJ 7. Potentially harmful program Logger.IAC 8. Potentially harmful program RemoteAdmin.IH 9. Potentially harmful program Tool.IT Assessment: 1. It seems that the first three are all the same type of virus. A “Win/DH is a malicious software that once it is executed has the capability of replicating itself and infect other files and programs”( Win/DH). They “can steal hard disk space and memory that slows down or completely halts your PC, corrupt or delete data, erase your hard drive, steal personal information, hijack your screen and spam your contacts to spread itself to other users” (Win/DH). To avoid the possibility of one, you should be careful of e-mail attachments especially if they are from an outside source, as well as download links on websites. Having a virus removing application such as AVG is essential to being able to remove these viruses before they spread. AVG is capable of detecting this virus while surfing the web and block its download, but should it already be on the computer a simple scan and remove process...
Words: 1494 - Pages: 6
...Antivirus is used to detect and remove virus in a computer, smartphones, tablets and other technical devices. Before knowing about the antivirus lets first study why antivirus is use and how it is used and what it is. Now the first question arise is what is the need to use antivirus so the answer is computer virus yes because of computer virus we use antivirus. A computer virus is a mischievous computer program. It enters in the computer without the permission or without the knowledge of user and even run without the permission of user in the computer. Computer virus are very dangerous and mischievous that they automatically copy the date and pasted it to memory over memory its transferring power is to much that it copy the data over network and network very quickly it sometime damage the computer program also computer virus is too dangerous it can create lots of loss to the user. The user who don’t pay attention to the virus and don’t listen about it it’s a great mistake they are doing. The person who are working on the computer whether the small work or the big should have the knowledge of computer virus. Virus is like our enemy and pre protection from enemy is good. And to protect computer from virus antivirus is use. Virus are off different type boot sector virus, macro...
Words: 1444 - Pages: 6
...ASPECTS OF COMPUTER L I T E R A C Y Violence and Technology, are never good bed fellows. 1 2 6/6/2013 Aspects of computer literacy What is a computer? what are its limitations what is a program (not necessarily how to program) what is a known as hardware? What is known as software? what a computer can and cannot do How computer illiterate am I? 3 6/6/2013 Aspects of computer literacy One problematic element of many (though not all) "computer literacy" or computer education programs is that they may resort too heavily on rote memorization. Students may be taught, for example, how to perform several common functions (e.g.: Open a file, Save a file, Quit the program) in very specific ways, using one specific version of one specific program. 1 06/06/2013 4 6/6/2013 Aspects of computer literacy When a graduate of such a program encounters a competing program, or even a different version of the same program, they may be confused or even frightened by the differences from what they learned. 5 6/6/2013 Aspects of computer literacy This is one reason why major computer and software firms such as Apple Computer and Microsoft consider the educational market important: The often time-limited computer education provided in schools most often lends itself to note memorization, creating a sort of vendor lock-in effect whereby graduates are afraid to switch to competing computer systems. 6 6/6/2013 Aspects of computer literacy ...
Words: 2401 - Pages: 10
...Intercontinental University Abstract Computers are part of almost everyone’s life. They are use in school, offices, and in small as well as in big companies. It has become a store place for their important data and records. Therefore we need to have something to keep the data in the computer save. Away from dangerous viruses that may corrupt or delete data on your computer, and e-mail program to spread the virus to other computers. My research paper is about the best anti-virus program that can protect your system from any virus. Title of Paper People used computer everyday all day it had become a part of one life, in school, business, home, and in our local stores. From the desk top to the lap top now on the cell iPod we are in touch with the world. Paying bills looking for what is new and just playing games the computer is important to us. Well keep in mind that there are some people that would like to close you (your computer) down. So here come the viruses into your computer and how we have a big problem. Not just in your home computer, but around the world this is a global problem. So we are looking for an anti-virus program that can stop the virus and clear up the computer too. There are so many programs that o the market and we trying to see which one was be the best for us. Some anit-virus program only can do some of clearing up and stopping the virus and other are better than other. Computer can catch all kind of virus, worms Trojan horse and other malicious...
Words: 816 - Pages: 4