How computer viruses work Computer viruses are not understood very well, but they get your attention. Viruses show us how vulnerable we are, but they also show how open and worldly human beings have become. Microsoft and other large companies had to shut down all their e-mail systems when the “Melissa” virus became a worldwide event. A computer virus is passed on from one computer to another computer. A virus must ride on top of some other program to document in order to perform an instruction. After it is running, it can then infect other programs.
Viruses were first seen in the late 1980 s; the first factor was the spread of personal computers. Before the 1980’s home computers were non-existent or they were used for toys, and the real computers were very rare and they were locked away to only be used by the “experts.” The second factor was the se of the “bulletin boards”; any one could get to a bulletin board if they had a modem and download programs. Bulletin boards led to the precursor of the virus known as the Trojan Horse. It is a program that sounds really cool when you read it, so then people download it, and when people run the program, however, it does something uncool like erasing your disk, so people think that they are getting something neat, but it wipes out their system. The third factor to viruses is the floppy disk. Programs were small and they could fit the operating system, or a word processor onto the floppy disk, and then turn on the machine and it would load the operating system and everything else off the disk.
The Business plan on Computer Information Systems
INFORMATION SYSTEM CASE STUDY Great-West Life & Annuity Insurance Company is an indirect wholly-owned subsidiary of The Great-West Life Assurance Company the largest stockholder-owned insurance company in Canada, and a member of the Power Financial group of companies. We are searching for a new enterprise system. We are looking for a structured approach that eliminates the guesswork and makes ...
Viruses took advantage of these three facts to create the first self-replicating programs! Early viruses were pieces of code attached to programs like games or word processors. People could download an infected game from a bulletin board and run it, and a virus like this is a small piece of code embedded in a larger, legitimate program. The virus loads its self to memory and looks around to see if it can find any programs on the hard disk. When it finds one it modifies it to the virus’s code to the program. Then the virus launches the “real program,” and the user has no way of knowing that it is infected. The next time this program is executed, they infect other programs, and the cycle continues.
The spreading part is the “infection” phase of the virus, and it would not be so violently despised if all it did was replicate themselves. Some viruses might print silly messages on the screen to erase all of your data, and the trigger might be a specific date, or the number of times the virus has been replicated, or something like that. The other trick to replicate themselves is to infect the boot sector on the floppy disk and the hard disks. The boot sector is a small program that is the first part of the operating system that the computer loads, and it contains tiny programs that tell the computer how to load the rest of the operating system. By the virus putting its code on the boot it can guarantee that it gets executed and loads itself into the memory and is able to run whenever the computer is on.
Executable and boot sector viruses are not as threatening as they were before because the decline in the huge size of today’s programs. Almost every program people buy today comes on a compact disc, and they cannot be modified which makes the viral infection of a CD impossible. Boot sector viruses have declined because operating systems now protect the boot sector. Both are still possible, but now they don’t spread as fast as they once did. The newest virus is called macro virus and Melissa virus. Melissa was created as a word document and someone uploaded it to the Internet.
The Term Paper on Computer Viruses Virus Program Programs
... virus programs exist (8). The four most universally encountered malevolent programs are computer viruses, worms, Trojan horses and logic bombs. A computer virus ... reasons. Some of these people are mischievous or ... boot sector, the virus is irrefutably assured of being executed. Both boot sector viruses and executable viruses ... program. If one of the corrupted programs is then handed to another person ...
A person who downloaded the document would trigger the virus. The virus would sent the document in an e-mail message to the first 50 people in a person’s address book. The message contained a note that included the person’s name, so the recipient would open the document thinking it was harmless. Then the virus would create 50 more new messages from the recipient’s machine and the cycle would continue. Microsoft applications have a feature called macro virus protection built in to them to prevent this sort of thing. Unfortunately, many people don’t know what macro or mac o viruses are, and either they ignore the warning or the turn the protection off.
A person has to write the code, test it to make sure it spreads properly and then release the virus. So why do people do it? . For some people it seems to e a thrill, and if the person knows anything about computer programming, then he or she may funnel energy into the creation of destructive viruses… Many people have a fascination with watching things blow up. Crating a virus that spreads quickly is a little like creating a bomb inside a computer, and the more computers that get infected, the more the “fun” the explosion… Bragging rights, or the thrill of doing it.
If he is a certain type of programmer and he sees a security hole that could be exploited, he might be compelled to exploit the hole himself before someone else beats him to it. Virus creators don’t understand that destroying everything on a person’s hard disk is real damage, or even forcing large companies to waste thousands of hours cleaning up after a virus. For these reasons, the legal system is getting tougher in punishing people who create viruses. You can protect yourself from viruses using these steps:” u If you are worried about viruses, you should run Windows NT because these operating systems have security features that keep viruses (and unwanted human visitors) away from the hard disk.” u By virus protection software. Avoid programs from unknown sources on the Internet, and buy the software on CDs, and disable floppy disk booting. Information gotten from.
The Essay on Influenza Virus Flu People Epidemic
Influenza virus is something most people get at least once in their lifetime. It is commonly known as the flu. It contains single stranded RNA. It attacks both human and animals. It reproduces in a lytic cycle. It is inhaled and comes in contact with cells of the upper air passage. It penetrates the cells that line these passages and reproduce. New viruses are released from the infected cells and ...
web.