“Computer Virus”
What is a Computer Virus ?
“A Software program able of reproducing itself and usually capable of causing great harm to files or other programs on the same .”
OR
“A virus is a program that may disturb the normal working of a computer virus .”
How is a Computer Virus created?
The following are the points through which the computer virus is created:
History
* Computer viruses are created by programmers who write code that builds a program with replication and destructive abilities. They do this because they are either malicious for the sake of being destructive or are malicious and driven by corporate disruption or financial gain. Virus code is written to allow a program to hide, wait and attach itself to other files and programs. Virus creation has its roots in the Cold War era, when former computer scientists and espionage agents were suddenly out of work and began to create destructive code to be released. Early viruses were born from jilted and disgruntled employees.
Purpose
* Viruses can destroy data. They can cause a shutdown of information technology, and they can cause loss of information. Viruses differ from worms in that worms exist solely for replication and inhibit machines due to massive resource consumption. Viruses are similar to Trojan programs in that they are both created with malicious intent. However, Trojan programs function mainly in opening up “back doors” on systems for unauthorized users.
The Term Paper on Computer Viruses Virus Program Programs
... hidden inside the complex computer code for an applications program, such as a payroll package. The virus writer would create a program that in a way ... appending the malicious code to the boot sector, the virus is irrefutably assured of being executed. Both boot sector viruses and executable viruses are still ...
Infection
* Viruses enter computers through either Internet connections or virus-infected programs being loaded or run within a healthy computer. Viruses come in many designs. There are polymorphic viruses, which shift their detectable traits as they copy and infect a machine. Camouflaging viruses mask themselves, giving the appearance of standard programs. Viruses with stealth have the ability to hide from anti-virus software. A special case is the virus dropper, programs that carry viral code and spread viruses as they move through a system. This type is a viral carrier rather than a virus itself.
Targets
* Viruses target specific objects inside a computer system. They go after files or other programs that exist on the PC or laptop to help the computer function properly. Viruses attack files that have the .com, .sys or .exe extensions. Viruses attack batch files, which are programs that run a series of steps desired by a user. Viruses also seek to destroy highly important areas on a computer, known as boot sectors, which are areas of the hard drive the computer sets aside for launching its important core programming.
Where is the Computer Virus present ?
* Computer Virus is present on the disk of the computer .
* It can also be present in the boot sector of the computer.
* It is present in the folders or the files of the computer.
* A file containing virus is called Infected file.
* Computer Virus is present in online games .
* The harmful virus are present on the side of the web page also.
How Computer Virus damages our data ?
Computer Virus damages the data in different ways .These different ways are as follow:
I) The second name of the virus is the “destruction”.
II) It destroy the data step by step.
III) It hides itself inside the files.
IV) Once the infected file is opened it starts to spread in all the computer .
V) Computer Virus starts deleting the files one by one.
The Term Paper on Anti Virus Viruses Computer Law
No Security: A Ethical Look At Computer ViriNottingham iOutlineThesis: There is no way to stop people from writing viruses and there shouldn't be, however penalties need to be employed for those who damage or cause harm in any way to other people and computers. I. The Australian Taxation Office (ATO) had to close down due to a computer virus infection. A. Australian computer vandals are believed ...
VI) And at last the whole file is completely finished.
VII) The virus remains inside the disks until we formats the disks.
How does Viruses Enter in our Computer ?
The main path which provides the virus to enter inside the computer is the Internet.
The virus enters the computer by sharing networks also.
Inserting the Floppyies ,pen drivers, or CD which consist of virus.
By playing online games.
Watching online movies , plays.
Using any online website or conversation.
By downloading the online and free softwares.
Using artificial windows .
Using the torrent software for downloading.
These all possibilities are also known as Vulnerabilites.
Computer First Virus :
The First Computer Virus made by the programmer is :
Elk Cloner — is one of the first known microcomputer viruses that spread “in the wild,” i.e., outside the computer system or lab in which it was written. It was written around 1982 by a 15-year-old high school student named Richard “Rich” Skrenta for Apple II systems.
The virus infected thousands of machines, but was harmless: It merely displayed a poem across the user’s screen.
Rich Skrenta is a computer programmer and Silicon Valley entrepreneur who created the search engine blekko.
Here the display into an infected computer — short poem on every 50th boot:
Elk Cloner: The program with a personality
It will get on all your disks
It will infiltrate your chips
Yes, it’s Cloner!
It will stick to you like glue
It will modify RAM too
Send in the Cloner!
And the other is Creeper.
Creeper virus is a computer virus that is most commonly recognized as the first computer virus. In 1971, Bob Thomas at BBN created Creeper as an experimental self-duplicating program.
he Creeper virus located a computer on the network, transferred itself to the computer, started to print a file (and stopped), displayed a message on the screen and then started over again. One significant difference between Creeper and other major viruses was that the Creeper erased its older versions as it duplicated itself.
The Essay on Computers Are Reality Operating System
If you ask people to name one of the most important technologies of the twentieth century, one of the answers would most certainly be the computer. A computer, however, is not a technology all to itself. Many other technologies went into the modern home computers of today, including the mouse. Douglas C. Engelbart, a worker at the SRI (Stanford Research Institute), invented the mouse in 1964. ...
While it is now widely credited as being the first computer virus, the concept of a computer virus did not yet exist at the time of its creation in the 1970s.
Types Of Virus:
There are 10 important types of Computer Virus .They are as follow :
i. Storm Virus.
ii. Sasser Virus.
iii. Nimda Virus.
iv. Melissa Virus.
v. Code Red I and II computer Viruses.
vi. Morriss Computer Virus.
vii. I Love You Virus.
viii. Brain computer Virus.
ix. Conficker
x. Elk Cloner Virus.
Worm Virus :
Another important type of a virus is a Worm Virus .
A computer worm is a standalone malware that replicates itself in order to spread to other computers. Many worms that have been created are designed only to spread, and do not attempt to change the systems they pass through.
Virus Hoax.
virus hoax is the wrong information about the virus .This virus is usually chain e-mail. Virus hoaxes are usually harmless and accomplish nothing more than annoying people who identify it as a hoax and waste the time of people who forward the message. Nevertheless, a number of hoaxes have warned users that vital system files are viruses and encourage the user to delete the file. possibly damaging the system. The examples of virus hoax are as follow
i. Antichrist
ii. Bud weiser Frogs
iii. Jdbgmgr .exe
iv. SULFNBX.EXE
Advantages of a Computer Virus :
* Of Course there is not any advantage of Computer Virus at all . It is a destructive thing and it can not be never used as a helpful thing .
* Hackers usually use the virus for their purposes.
* They send the virus programs to their e-mail id using different names.
.
Composed By:Aisha Iqbal
: