Information systems

  • Beranda
  • Blogging
    • Template
    • Blogging
  • Downloads
    • Software
    • Game
  • Blogging
  • Template
  • SSH Gratis
Home → Tanpa Kategori → what is a virus computer

what is a virus computer

Add Comment
Minggu, 24 Juli 2011
What Is A Computer Virus, Anyway?


Combating infections and removing viruses is now big business. Lesson one is 'knowing the enemy'.

THE ENEMY - Crackers and Hackers

Geeks make a distinction between crackers, who break into systems to do damage, and hackers who enjoy taking programs apart just to see how they tick. We'll stick with the more common, though less accurate, term of hacker. (The term 'hacker' originally meant 'someone who makes furniture' with an axe. Crude, but effective - like most computer viruses.)

Viruses are actually a particular type of computer 'malware' - a general term covering all types of malicious software. The most common types are viruses, worms and Trojan horses.

VIRUSES

A virus is usually hidden inside another program such as an installation program delivered via e-mail attachment. (Biological viruses require a host organism to live and reproduce, hence the name.) When the 'host' program is run, the virus program also runs. Once it's in memory the virus is able to do its dirty work, which usually includes infecting other programs.

After the infection stage of the virus, there's a destructive stage. The virus waits for a pre-determined trigger (such as a specific date or a certain number of times the virus has replicated itself) before delivering its 'payload'. Payloads range from simple messages to file deletion commands to destruction of the core operating system.

When first developed, computer viruses were commonly distributed on floppy disks. With the growth of the Internet downloaded files and e-mail are the preferred delivery mechanisms. E-mail can contain attachments which can be any kind of computer file. Any executable file can be infected with a virus, and shouldn't be run unless you're confident they're virus free. 

WORMS

Worms are similar to viruses in that they're self-replicating. They reproduce themselves across networks without human assistance, such as e-mail sending. A worm, though, doesn't need another executable program to be distributed.

Worms usually affect networks more than individual computers on the network. Their self-replicating behavior can overload network resources, causing slowdowns in data transmission by consuming massive bandwidth normally used to forward normal traffic. Network systems that route Internet traffic are just specialized computer hardware and software. They, too, can be affected by malware.

Worms can also be designed to carry a payload, using a 'backdoor' installation program. A backdoor is a hidden access point to a computer that bypasses the normal login procedure. They're commonly used by spammers to distribute junk e-mail, for example.

TROJAN HORSES

Trojan horses are the third common type of malware. A 'trojan' is a program that pretends to do one thing but actually does something different. (The term comes from the story of the Greeks who built a large wooden horse in which to hide. Their enemies, the Trojans persuaded they'd receive a gift, took the horse inside their compound giving the Greeks easy access to wreak havoc.) Unlike viruses or worms, a Trojan doesn't replicate itself.

Trojans may be hidden in otherwise useful software. Once started they can do almost anything including erasing data, corrupting files, installing backdoors and logging keystrokes so that hackers can steal information such as credit card numbers and passwords.

FIGHTING MALWARE

Elsewhere in the series, we'll discuss what is and can be done to combat the spread of malware. In the interim, just remember not to be passive and expect the problem to be solved by others. Fighting viruses requires active participation from vendors, webmasters AND users.

Share this article :
Tweet
✚

Gunakanlah komentar dengan sebaiknya jangan membuat spam, mohon maaf jika ada komentar anda yang tidak kami publish

Posting Lebih Baru
Posting Lama
Beranda
Langganan: Posting Komentar (Atom)
  • Beranda
  • Sitemap
  • cara aktivasi windows vista

Translate

gampang banget cari duit disini Buruan... Daftar!!!

Entri Populer

  • software audio 3dimensi 3D
  • cara cepat menggabungkan file part .001
  • Flash Speed dengan serial number keygen
  • java emulator
  • Windows 7 Start Button Changer 2.6
  • Playstation (PS) 2 in computer
  • Find Money Search Paid 2 dollars on Youtube
  • enhanced write filter (ewf tool)
  • make friends for free
  • download fast di 4shared

Label

  • android (2)
  • Bengkel Windows (24)
  • Cari dolar tanpa modal (1)
  • Cari duit di blog (17)
  • Free Seo (20)
  • GPS (17)
  • Information (18)
  • Lowongan Kerja (11)
  • obat (2)
  • Smartfren Tips Trik (12)
  • Software (52)
  • Tips And Trick (43)

Arsip Blog

  • ►  2014 (1)
    • ►  Oktober (1)
  • ►  2013 (13)
    • ►  Mei (1)
    • ►  April (1)
    • ►  Maret (5)
    • ►  Februari (6)
  • ►  2012 (66)
    • ►  November (1)
    • ►  Juli (2)
    • ►  Juni (27)
    • ►  Mei (15)
    • ►  April (6)
    • ►  Maret (7)
    • ►  Februari (3)
    • ►  Januari (5)
  • ▼  2011 (215)
    • ►  Desember (47)
    • ►  November (23)
    • ►  Oktober (2)
    • ►  September (2)
    • ►  Agustus (28)
    • ▼  Juli (55)
      • many blog visitors
      • back to seo
      • get the rank these day
      • seo down
      • trick keyword
      • adsense formula
      • make money with google adsense
      • succeeding with adsense
      • protecting your pc
      • preventing password hackers
      • my computer is attack
      • What To Do If Your Computer Is Attacked
      • keep children safe online
      • how to avoid by adware and spaware
      • how to protect your computer
      • be fair
      • Strand And STORIES FOR A WORD MEANING And BENEFITS
      • love story Peter and Tina Peter
      • TIPS TO BE HAPPY MOST WOMEN
      • i want to be loved because of GOD
      • beautiful woman when
      • i love you mother
      • syurga expert women and its characteristics
      • reflections of life
      • virus function
      • what is spam
      • virus hoaxes
      • trojan horse virus
      • worm virus
      • fight virues
      • what is a virus computer
      • control spyware infection
      • the best password
      • How To Block Pop-Up In Your PC
      • How To Protect Yourself
      • How To Avoid Keyloggers
      • How To Keep Your PC Healthy
      • How To Password-Protect Documents
      • How To Get Rid Of Computer Viruses: A Step By Step...
      • The Full Adsense Formula Adsense is the best incom...
      • How To Make Money With Google ADSense
      • Succeeding With AdSense Is More Than Just A Fantasy
      • How To Install Games From The Internet Onto Your PSP
      • software cari chord otomatis
      • smadav 8.6 full
      • dijual murah mercy e230
      • source code translate google
      • approve in google adsense
      • learning forex trading online
      • Increase Blog Traffic
      • 2 Best Promotion Techniques, SEO or PPC
      • Tips Securing Email Address
      • Food for pregnant women
      • Let's make the web faster
      • merge subtitle into movie
    • ►  Juni (13)
    • ►  Mei (16)
    • ►  April (2)
    • ►  Maret (2)
    • ►  Februari (18)
    • ►  Januari (7)
  • ►  2010 (54)
    • ►  Desember (19)
    • ►  November (15)
    • ►  Juni (8)
    • ►  April (2)
    • ►  Februari (5)
    • ►  Januari (5)
  • ►  2009 (10)
    • ►  November (10)

Tags

Copyright 2014 Information systems
Template By Ridwan Hex And Game Gratis