Professional Documents
Culture Documents
ò Computer viruses are small software programs
that are designed to spread from one computer
to another and to interfere with computer
operation.
ò A virus might corrupt or delete data on your
computer, use your e-e-mail program to spread
itself to other computers, or even erase
everything on your hard disk.
ò Viruses can be disguised as attachments of
funny images, greeting cards, or audio and
video files.
ò Viruses are most easily spread by attachments in
e-mail messages or instant messaging
messages. That is why it is essential that you
never open e-e-mail attachments unless you know
who it's from and you are expecting it.
ò Viruses also spread through downloads on the
Internet. They can be hidden in illicit software or
other files or programs you might download.
á
ò
are most predominant
viruses until the mid-
mid-90s.They infects boot sectors
on diskettes and hard disks. On diskettes, the boot
sector normally contains code to load the operating
system files.
ò ·
,
, the second type of
computer viruses, infect executable
programs; usually .COM and .EXE files, but
they sometimes also infect overlay files,
device drivers or even object files.
á
ò á
viruses, which do not infect normal programs,
but instead spread as "macros" in various types
of files. This type of viruses can easily spread
through E-E-mail, when users unknowingly
exchange infected documents.
á
ò A program or algorithm that replicates
itself over a computer network and usually
performs malicious actions.
ò
ò
!
ò ³pam is flooding the Internet with many
copies of the same message, in an attempt to
force the message on people who would not
otherwise choose to receive it.
á
ò
"#
ò o not carry a harmful payload, but do waste an
incredible amount of time.
ò
Any program or file that is
harmful to a computer user.
ò Installs backdoors
ò here do viruses come from?
ò Every virus is created by an author with a
different motiveƜ
motiveƜbut all virus builders feel their
actions are justified. For some, a killer virus is
the ultimate technical challenge, like climbing a
mountain. For others, creating viruses is a form
of self-
self-expression. ³ome disgruntled employees,
consumers or citizens turn to virus building as
revenge for perceived injustices.
&
&
ò Todayƞs viruses are far more potent than the
beginner versions we saw several decades ago.
Viruses may be sent by opening email
attachments, clicking on spam, visiting corrupt
websites and links online, opening spreadsheets
or even the original methodƜ
methodƜinfected disks. But
the Internet is now the superhighway for virus
transmission.
&
&
ò A frightening prospectƜ
prospectƜopening an email
from someone you trust to be greeted by a
virus, and thatƞs exactly what the author is
counting on, your trust.
The damage caused by these viruses varies
from minor delays in computer function to
complete destruction of your hard drive. For
companies, the price is far higher. A
downed website can cost a company
millions of dollars a day.
''
ò Clean your computer with ° software.
If your computer is still not functioning and you
have data you are concerned about recovering,
consider hiring a trusted expert. Often data can
be successfully extracted from an injured hard
drive, but the process is complex and will involve
another computer, special software, and a
technician with a lot of experience in data
recovery.
"
ò Even for an expert, removing a virus from a
computer can be a daunting task without the
help of tools designed for the job.
ò ³ome viruses and other unwanted software
(including spyware
spyware)) are even designed to
reinstall themselves after they have been
detected and removed.
ò Fortunately, by updating your computer and
using free, trial-
trial-period, or low
low--cost antivirus
tools,, you can help permanently remove (and
tools
prevent) unwanted software
*
*
ò .Visit web site 4 Update and install the
latest updates.
ò 2.If you currently use antivirus software,
visit the manufacturer's eb site, update
your software, and then perform a thorough
scan of your computer. If you don't use
antivirus software, subscribe to a service
and scan your computer immediately.
ò 3.ownload, install, and run the Malicious
³oftware Removal Tool (for Microsoft
indows XP or indows 2000 users).
ò .Use an Internet firewall
ò (Note* indows XP with ³P2 has a firewall
already built-
built-in and turned on by default).
ò 2.Visit any web site like Microsoft Update and
turn on automatic updating.
updating.
ò Note* If you've installed Office 2003 or Office
XP, Automatic Updates will also update your
Office programs.
ò If you have an earlier version of Office, use
Office Update.
Update.
"
ò Nothing can guarantee the security of your
computer 00 percent.
ò You can continue to improve your computer's
security and decrease the possibility of infection
by using a firewall
firewall,, keeping your system up-
up-to
to--
date, maintaining a current antivirus software
subscription, and following a few best practices
"
ò onƞtautomatically open email and
email attachments.
ò Immediately delete emails from unknown sources.
ò
It is also a good idea to
manually scan files you receive from an outside
source before opening them.
ò This includes*
ò ³aving and scanning email attachments or web
downloads rather than selecting the option to
open them directly from the source
ò ³canning floppy disks, Cs, or Vs for viruses
before opening any of the files
á %
%
ò epending on the installation method of the
Anti--Virus these can be in the following forms*
Anti
,, &
° ,
& , and °
°.
°
°.
& check for viruses
ò &
when files or floppy disks are "accessed". They
are designed to run transparently in the
background. hen well implemented they
should be invisible to the user - they shouldnƞt
even realize they are running an anti-
anti-virus
product until it intercepts a virus. It has been
our experience that on-
on-access scanners are the
most popular type of anti-
anti-virus product.
á %
%
ò & only execute when the
&
user tells them to execute. In other words they
only scan for viruses when the user tells them,
for example, to scan the floppy disk they have
just inserted. The drawback with this method is
that users have to remember to scan files and
disks for viruses.
á %
%
ò "
"
tend to be
unpopular. The reason for this is that it is
considerably harder to install a hardware
card into many hundreds of PCs than it is to
install computer software. Furthermore,
difficulties may arise if the hardware anti-
anti-
virus needs to be updated to deal with new
threats (macro viruses for example).
á %
%
ò epending on the way they fix viruses these can
be in the following forms* ,
,
°,, and
° ° Applications.
ò %
%
ò Antivirus software consists of computer
programs that attempt to identify, thwart and
eliminate computer viruses and other malicious
software (mal-
(mal-ware).
ò Antivirus software typically uses two different
techniques to accomplish this*
á %
%