.

Friday, February 8, 2019

Solutions to Computer Viruses :: Computer Viruses Software Technology Essays

Solutions to Computer Vir pulmonary tuberculosiss accede Of ContentsI IntroII Computer Virus Componentsa.Wormsb.trojan horse horsesc.Logic miscarrys cardinal Types of Virusesa.Boot sector ready reckoner virusb.File virusc.Macro virusd.Multi divorceite viruse.Polymorphic virusf.Stealth virusIV How Viruses Worka.Virus introduced to systemb.Trojan activatedc.Logic bomb activatedd.Destructive portion of virus activatedV Most Common Virusesa.Jerusalem virusb.Cascade virusc.Brain virusd.Italian viruse.New Zealand virusVI Macro Virusa.What be they?b.How do they workVII How to Avoid Virusesa.Removing floppies from driveb.Dont use pirated softw bec.Backup datad.Run virus check course periodically octad Anti-virus Softwargona.Why would you use?b.Virus Scannerc.Types of Anti-virus softwareIn this growing technological world, there is a dependency on computer systems. With the wide overspread use of computer systems comes the threat of bunco programs that damage the system and early(a) programs on that system. These short programs are called computer viruses. There are many a(prenominal) computer viruses out there to infect unsuspecting system and programs. on with these threats of infection comes the opportunity to eradicate these viruses before they infect systems. There are programs called anti-virus protection to help find and fix problems before they damage computer systems (Encyclopedia.com).Computer Virus and ComponentsA computer virus can be defined as a rogue computer program, ordinarily short in nature, designed to spread copies of itself to other computers and disrupt the computers normal operation. These viruses usually attach or insert themselves in or to a program or boot sector of a disk. It is spread through floppy disk disk, network, or routine on-line services. There are some viruses that are harmless, but others can destroy or corrupt data and set an operating system or application program to malfunction. The three or so common types of de structive computer programs are the Trojan horse, logic bombs, and the worm. A virus is considered to be a worm with a logic bomb or Trojan horse component (PC Upgrade).Worms are programs that copy themselves. They fix images of themselves in a file or a certain part of a disk. The main reason for including a worm component in a virus is to spread the virus via floppy dick. Now everytime you data format a disk or copy a disc, the worm today infects you floppy disk. The Trojan horse is a program hidden wrong another useful looking program. When the useful program is running the Trojan horse is doing something like erasing your Fat and directory. The last of this triangle is the bomb. The bomb is a piece of code embedded in a program or the operating system that waits for a particular event to occur.

No comments:

Post a Comment