Disclaimer: This is an example of a student written essay.
Click here for sample essays written by our professional writers.

Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UKEssays.com.

The Prevention Of Computer Viruses Computer Science Essay

Paper Type: Free Essay Subject: Computer Science
Wordcount: 1644 words Published: 1st Jan 2015

Reference this

What is a computer virus? A computer virus is a computer program that can copy itself[1] and infect a computer. The term “virus” is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.

How are viruses transmitted

can be transmitted person to individual by bodily fluids like HIV. Viruses approaching the common cold can be transported through the upper air we breathe. Viruses can also be transferred from your pets to you. Fortunately our body has an immunodefense workings that is intricately designed to row these pathogens.

How do you prevent viruses? List the software’s name.

The internet is an amazing place that allows each and every one of us easy access to a wide variety of resources. Unfortunately, there is an increasing amount of viruses, worms, spyware and spam that can easily infect your computer. Your computer in fact may already be infected and you may not even know it. If your computer is unusually slow or crashes periodically, it may be infected. In fact, if you do not address the problem with this computer it may in fact infect other computers on your network. The result of a virus or worm attack can include an inability to access the internet, missing icons on your desktop, missing files and many other potential problems. There are ways, however, that you can fight back. Of course before making any changes to your computer, it is always a good idea to make a backup.

FIGHT BACK

1. Run Microsoft Windows Update often.

With new viruses and worms constantly being created, it is important to keep the Microsoft Windows operating system up to date. Go to http://windowsupdate.microsoft.com and follow the instructions on screen. By installing the critical updates found on the Windows Update website, you are greatly reducing the chances of your computer from becoming infected.

2. Update the virus pattern of your Anti-Virus software frequently.

Almost all Anti-Virus software programs update automatically, but you will want to check to make sure that this process is taking place. If a new virus is introduced and your pattern file is out of date, you will not be adequately protected against this new threat. I highly recommend the use of Trend Micro PC-Cillin. Unlike other antivirus software programs, it does not tap your system resources by taking up a lot of memory. It also works in a very transparent fashion with continuous pattern updates.

3. Remove Spyware and Adware.

When you visit websites or install new software, you may be inadvertently installing Spyware and Adware onto your computer. Spyware and Adware allows third parties to: (a) monitor the use of your computer over the internet and (b) market specific products to you on the internet based upon the use of your computer. Go to http://www.download.com in order to download and install: (1) Ad-aware and (2) Spybot – Search & Destroy. Properly updated, both of these programs will remove all known Spyware and Adware.

4. Prevent Spam.

A large number of worms and viruses are distributed through spam email. The first step in preventing spam is to not post your email address on a website. If you need to provide a means for contacting you via email, you will want to create a submission form that does not display your MAILTO in the code/page source of your webpage. You may need to contact a web designer in order to properly implement this process into your website. Another method is to use the Master Spambot Buster which works just like a MAILTO link but without displaying your email address in the code for bots to pick up.

Get Help With Your Essay

If you need assistance with writing your essay, our professional essay writing service is here to help!

Essay Writing Service

In addition, you should always use Private Registration when registering a domain name for a website. If you go to http://www.netsol.com and do a WHOIS on your website, you do not want to see your email address publicly displayed in your domain record. Automated programs called robots regularly crawl websites such as this looking to pick up email addresses for use by companies that spam. If robots on the internet have already picked up your email address, you will of course want to use some form of spam prevention. Many web based mail programs already allow you the ability to prevent spam. However, many mail clients on business networks do not have this functionality. There are a variety of products in the marketplace to address this problem, but one of the most popular is http://www.spamarrest.com. By using Spamarrest.com, you manage who you allow or do not allow to receive email from. When someone sends you an email for the first time, they must verify that they sent you an email. If they do not, the email is placed in your unverified folder on Spamarrest.com’s web servers. All blocked mail is then placed in Spamarrest.com’s spam folder. Meanwhile all approved mail is sent as it normally would directly to your computer’s Inbox.

CONSULT A PROFESSIONAL

Although the software described here is easily used, different hardware and software configurations can lead to unexpected results that may damage your computer. If you are experiencing difficulties with viruses, worms, spyware or spam, you may want to consult a professional.

How do you know that your computer is infected by a virus?

If you suspect or confirm that your computer is infected with a computer virus, obtain the current antivirus software. The following are some primary indicators that a computer may be infected:

The computer runs slower than usual.

The computer stops responding, or it locks up frequently.

The computer crashes, and then it restarts every few minutes.

The computer restarts on its own. Additionally, the computer does not run as usual.

Applications on the computer do not work correctly.

Disks or disk drives are inaccessible.

You cannot print items correctly.

You see unusual error messages.

You see distorted menus and dialog boxes.

There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension.

An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted.

An antivirus program cannot be installed on the computer, or the antivirus program will not run.

New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.

Strange sounds or music plays from the speakers unexpectedly.

A program disappears from the computer even though you did not intentionally remove the program

Why virus-scanning software needs to be updated regularly ?

computer virus is a computer program that can copy itself[1] and infect a computer. The term “virus” is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.[2]

Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[3][4]

As stated above, the term “computer virus” is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system’s data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.

The Academic Integrity and Plagiarism Policy:

You should be ready to prove the authenticity of your work. If any form of plagiarism/reproduction of answers/work discovered, you will be awarded zero mark.

Late submission of the assignment:

If any late submission of your work, mark will be reduced.

Your are expected to cover the following outcomes

Outcome 4.

You are expected to practice the skills that are related to the following graduate attribute:

Recognize the importance of lifelong learning and are committed to self development

Declaration by student (Hand written)

TO MY LECTURER Mr. Sheik Mohammed

I CERTIFY THAT ALL OF THIS WORK IS:

(a) DONE BY MYSELF

(b) PRINTED BY MYSELF

Student’s signature…Mahmood Khalfan Ali……………………….. Submit ion Date: ..22j1047……………

 

Cite This Work

To export a reference to this article please select a referencing stye below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Related Services

View all

DMCA / Removal Request

If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please: