Sunday, March 17, 2019
Computer Viruses :: essays research papers
Computer VirusesA virus is a program that copies itself without the knowledge of the reckoneruser. Typically, a virus spreads from one computer to another by adding itselfto an existing piece of operable code so that it is executed when its hostcode is run. If a virus if found, you shouldnt panic or be in a hurry, andyou should work systematically. Dont rushA Viruse whitethorn be classified by its method of concealment (hiding). Some argoncalled stealth viruses because of the way that they hide themselves, and somepolymorphic because of the way they potpourri themselves to avoid scanners fromdetecting them.The most common classification relates to the sort of executable code which thevirus attaches itself to. These are Partition Viruses Boot Viruses File Viruses Overwriting VirusesAs well as replicating, a virus may carry a Damage routine.There is alike a set of programs that are relate to viruses by virtue of theirintentions, appearances, or users likely reactions. For exa mple Droppers Failed viruses Packagers Trojans Jokes Test filesTHE maltreat ROUTINEDamage is defined as something that you would prefer not to set out happened. It ismeasured by the amount of time it takes to reverse the slander.Trivial damage happens when all you realise to do is get rid of the virus. Theremay be some audio or visual effect very much there is no effect at all.Minor damage occurs when you have to replace some or all of your executablefiles from clean backups, or by re-installing. Remember to run FindVirus againafterwards.Moderate damage is through when a virus trashes the hard disk, scrambles the FAT,or low-level formats the drive. This is recoverable from your resist backup. Ifyou take backups every day you lose, on average, half a days work. study damage is done by a virus that gradually corrupts info files, so that youare unaware of what is happening. When you discover the problem, these corruptedfiles are also backed up, and you might have to restore a very doddering backup to getvalid data.Severe damage is done by a virus that gradually corrupts data files, but youcannot see the corruptness (there is no simple way of knowing whether the data isgood or bad). And, of course, your backups have the same problem.Unlimited damage is done by a virus that gives a third party access to yournetwork, by take the supervisor password. The damage is then done by thethird party, who has bidding of the network.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.