Computer Virus Spread And Defense Computer Science Essay

Published:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Computer Virus is a progam that copy itself, Computer virus can infect your computer and slowing down your computer . And virus also can spreads computer to computer. The person who sends out the computer virus may use networking of the internet. The computer virus alson can be spread by via disk, CD,DVD or flash drive or other devices.

Usually A virus is written to target a network file system or shared filet in order to to spread from computer to computer using network. Worm or Trojan is slightly different from other virus it appears harmless, This is the type of virus which enters the programs exploits security holes thau may have spread through other networks or Internet users. Computer virus is usually small small which are design to spread from one computer to other computer and to enter and interfere Computer operation.

Virus might corrupt your windows or might delete the important data on your computer, Normaly virus can be spread through e-mails program to other computer which can even delete everything on the hard disk.

Often Computer viruses can be spread by attachments by e-mail massages or even can be instant massaging . that is why must never one a email which we dont know where it came from and who send it we may never know it could be virus.

Virus can be as attachments of funny images or video or files it can spread when u download to your computer from the internet.

HOW COMPUTER VIRUSES WORK

Virus can infect a small section of software or it will be there when the user open the program or runs the programs . It could be attached word or excel or other software programs it can be in any form or in any types of files.

Email viruses are totally different from the virus which uses email to infect computers. An attachment or files in a email that open or download from your email will be launch infection allowing to spread. An email virus cannot ifnfect your compur unless the malicious file is open.

A virus called Trojans can work by claiming a game file or other file to get inside.It could then erase the content that stored on your hard drive or other drives. Trojans do not replicate like a virus but worms is able to attack the security holes and then replicate in the network to spread to other computer which uses network.

COMPUTER IFFECTION

first thing you might not realize win32,kido,conficker,trojans orviruses have not got into your computer if u dont have Internet Security and other antivirus software.the ability of the program to get inside an operation system undetected . Depending on the infection, you may be greeted with a black or blue screen when the OS is unable to load; you will not be able to access any files, documents or other information on the computer.

If there is only one file infected, the computer may not be able to open the file . when shut down you may get massages that a program is still running but the program may have numbers and letters only. IT is most often not a program that you recongnise, even though it might state it is in the part of a system operation.

Task manager is to stop the program without result since the virus,trojan or malicious entity has the control it to continue the infecting the computer until it has run its course,rendering your computer ineffective.

WAYS TO SOLVE COMPUTER VIRUSES

THE WAYS TO PROTECT YOUR COMPUTER

Understanding what a virus is and how it works is the first step to obtaining the necessary protection for your computer. Computers with Windows 7 have firewalls, security updates/ patches and Windows Defender. These three devices are the first stage to protecting your computer. They work as PC virus protection, but they are not enough to stop all problems.

You need to find additional antivirus protection. Antivirus software such as Mac antivirus or Windows 7 antivirus are further protection programs that will stop computer viruses. They are a second line of defence, if you will. Antivirus software tends to block holes left by PC virus protection.

A hacker that encounters antivirus software will have to work harder to get through with their computer viruses. Furthermore, you do not have to worry about spending additional money to purchase the virus internet security protection. There are free antivirus programs available to download right from a secure Internet site.

The free antivirus is designed to run an initial scan of the computer to see if your computer is already infected. It will then remove any infections you might have. It may be unable to remove the entire infection, in which case it will quarantine the virus in a place where it can no longer affect other files on your computer. It will also try to repair any damage.

Other Protection Methods

Downloading an antivirus software helps, but there are also other measures you can enact on your own to keep out malicious viruses. First, never open an email attachment if you do not recod the sender. Also, have your antivirus software run a scan on the attachment in the event that the sender’s computer has been infected.

Second, never download items from a site you do not trust or that does not have the secured server symbol - a lock. Download only files you recognize, including music, movies and other online media.

Third, set up your wireless network security and obtain a mobile antivirus. An unsecure Internet connection is an invitation to hackers to try to download malicious threats. A mobile antivirus is also set up for wireless networks, whereas other antivirus software is meant for secured connections.

TYPE OF VIRUSES

Resident Viruses

This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.

Examples include: Randex, CMJ, Meve, and MrKlunky.

Direct Action Viruses

The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.

Overwrite Viruses

Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.

The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.

Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.

Boot Virus

This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive.

Examples of boot viruses include: Polyboot.B, AntiEXE.

Macro Virus

Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.

Directory Virus

Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus. Once infected it becomes impossible to locate the original files.

PICTURE

CONCLUSION

To keep our computer safe we need to anti â€" virus programs that stores the definition known as virus and malware program. To keep our anti-virus active we need to update and scan our computer every time we use computer.

Now it should be clear that how important to use a computer and keep it safe from viruses. and u should always full scan your computer for virus to prevent the loss of data. when ever u use a pendrive or external hard disk you must scan for viruses to keep your computer safe.

Loading comments...

 

Problems loading Disqus?

Writing Services

Essay Writing
Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing
Service

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision
Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.