Wednesday, March 20, 2019
Solutions to Computer Viruses :: Computer Viruses Software Technology Essays
Solutions to Computer VirusesTable Of ContentsI displayII Computer Virus Componentsa.Wormsb.Trojan supplysc.Logic bombsIII Types of Virusesa.Boot field estimator computer computer virusb.File virusc.Macro virusd.Multipartite viruse.Polymorphic virusf.Stealth virusIV How Viruses Worka.Virus introduced to organizationb.Trojan activatedc.Logic bomb activatedd.Destructive part of virus activatedV Most Common Virusesa.Jerusalem virusb.Cascade virusc.Brain virusd.Italian viruse.New Zealand virusVI Macro Virusa.What ar they?b.How do they work seven-spot How to Avoid Virusesa.Removing floppies from driveb.Dont use pirated softwarec.Backup datad.Run virus check program periodicallyVIII Anti-virus Softwarea.Why would you use?b.Virus electronic scannerc.Types of Anti-virus softwareIn this growing technological world, in that location is a habituation on computer systems. With the wide pervade use of computer systems comes the brat of short programs that damage the system and other prog rams on that system. These short programs are called computer viruses. There are many computer viruses out there to infect unsuspecting system and programs. Along with these threats of infection comes the opportunity to consume these viruses before they infect systems. There are programs called anti-virus protection to help take note and fix problems before they damage computer systems (Encyclopedia.com).Computer Virus and ComponentsA computer virus can be defined as a rogue computer program, usually short in nature, designed to pervade copies of itself to other computers and disrupt the computers normal operation. These viruses usually attach or precede themselves in or to a program or boot sector of a disk. It is spread through floppy disk, network, or routine on-line(a) services. There are some viruses that are harmless, but others can unmake or corrupt data and cause an operating system or application program to malfunction. The three most common types of destructive compu ter programs are the Trojan vaulting horse, logic bombs, and the worm. A virus is considered to be a worm with a logic bomb or Trojan horse component (PC Upgrade).Worms are programs that copy themselves. They create images of themselves in a saddle or a certain part of a disk. The main moderateness for including a worm component in a virus is to spread the virus via floppy dick. Now everytime you format a disk or copy a disc, the worm now infects you floppy disk. The Trojan horse is a program hidden inside another useful sounding program. When the useful program is running the Trojan horse is doing something like erasing your blue and directory. The last of this triangle is the bomb. The bomb is a piece of code insert in a program or the operating system that waits for a particular event to occur.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment