Essay, Research Paper
Truth and Lies About the Computer Virus
Walk into any computer store today and there will be at least twenty or
thirty computer virus programs. From the looks of it computer viruses have
gotten out of hand and so has the business of stopping it. The computer user
must cut through the media hype of apocoliptic viruses and shareware programs
and discover the real facts.
Before we even start the journey of exploring the computer virus we must
first eliminate all the “fluff.” The computer user needs to understand how
information about viruses reaches the public. Someone creates the virus and
then infects at least one computer. The virus crashes or ruins the infected
computer. A anti-virus company obtains a copy of the virus and studies it. The
anti-virus company makes an “unbiased” decision about the virus and then
disclose their findings to the public. The problem with the current system is
that there are no checks and balances. If the anti-virus company wants to make
viruses seem worse all they have to do is distort the truth. There is no
organization that certifies wheather or not a virus is real. Even more
potentially harmful is that the anti-virus companies could write viruses in
order to sell their programs. Software companies have and do distort the truth
about viruses. “Antivirus firms tend to count even the most insignificant
variations of viruses for advertising purposes. When the Marijuana virus first
appeared, for example, it contained the word “legalise,” but a miscreant later
modified it to read “legalize.” Any program which detects the original virus can
detect the version with one letter changed — but antivirus companies often
count them as “two” viruses. These obscure differentiations quickly add up.”
kumite/myths/myth005.htm Incidentally the Marijuana virus is also
called the “Stoned” virus there by making it yet another on the list of viruses
that companies protect your computer against.
I went to the McAfee Anti-virus Web site looking for information on the
Marijuana virus but was unable to obtain that information. I was however able
to get a copy of the top ten viruses of their site. On specific virus called
Junkie: “Junkie is a multi-partite, memory resident, encrypting virus. Junkie
specifically targets .COM files, the DOS boot sector on floppy diskettes and the
Master Boot Record (MBR). When initial infection is in the form of a file
infecting virus, Junkie infects the MBR or floppy boot sector, disables VSafe
(an anti-virus terminate-and-stay-resident program (TSR), which is included with
MS-DOS 6.X) and loads itself at Side 0, Cylinder 0, Sectors 4 and 5. The virus
does not become memory resident, or infect files at this time. Later when the
system is booted from the system hard disk, the Junkie virus becomes memory
resident at the top of system memory below the 640K DOS boundary, moving
interrupt 12’s returns. Once memory resident, Junkie begins infecting .COM files
as they are executed, and corrupts .COM files. The Junkie virus infects
diskette boot sectors as they are accessed. The virus will write a copy of
itself to the last track of the diskette, and then alter the boot sector to
point to this code. On high density 5.25 inch diskettes, the viral code will be
located on Cylinder 79, Side 1, Sectors 8 and 9.” Junkie’s description is that
of a basic stealth/Trojan virus which have been in existance for 10 years. They
also listed Anti-exe as one of the top ten viruses but did not acknowlege the
fact that it has three aliases. It’s no wonder that the general public is
confused about computer viruses!
I decided to investigate the whole miss or diss-information issue a
little further. I went to the Data Fellows Web site to what the distributors of
F-prot had to say about viruses. It is to no surprise that I found them trying
to see software with the typical scare tactics: Quite recently, we read in the
newspapers how CIA and NSA (National Security Agency) managed to break into the
EU Commission’s systems and access confidential information about the GATT
negotiations. The stolen information was then exploited in the negotiations.
The EU Commission denies the allegation, but that is a common practice in
matters involving information security breaches. At the beginning of June, the
news in Great Britain told the public about an incident where British and
American banks had paid 400 million pounds in ransom to keep the criminals who
had broken into their systems from publicizing the systems’ weaknesses [London
Times, 3.6.1996]. The sums involved are simply enormous, especially since all
these millions of pounds bought nothing more than silence. According to London
Times, the banks’ representatives said that the money had been paid because
“publicity about such attacks could damage consumer confidence in the security
of their systems”. Criminal hackers are probably encouraged by the fact that,
in most cases, their victims are not at all eager to report the incidents to the
police. And that is not all; assuming that the information reported by London
Times is correct, they may even get paid a “fee” for breaking in? a computer is
broken into in Internet every 20 seconds? Whatever the truth about these
incidents may be, the fact remains that current information systems are quite
vulnerable to penetration from outside. As Internet becomes more popular and
spreads ever wider, criminals can break into an increasing number of systems
easily and without a real risk of being caught.”
Then the next paragraph stated:
“Even at their initial stages, Data Fellows Ltd’s F-Secure products meet
many of these demands. It is the goal of our continuing product development to
eventually address all such information security needs.” In other words nothing
is safe unless you buy their products.
Now that we have cleared the smoke on viruses we know that there are
only roughly 500 basic viruses. These viruses are tweaked, renamed, and re-
cycled.
So, what is a virus? First of all, we must be aware that there is no
universally accepted naming practice or discovery method for viruses. Therefore
all virus information is subjective and subject to interpretation and constant
dispute.
To define a virus we must ask an expert. According to Fred Cohen a
computer virus is a computer program that can infect other computer programs by
modifying them in such a way as to include a (possibly evolved) copy of itself.
This does not mean that a virus has to cause damage because a virus may be
written to gather data and obtain hidden files in your system.
Now that you are aware of the hoaxes and miss-information about viruses
you will be better equipped to deal with viral information. The next time you
hear of a killer virus just remember what you have learned. You know that all
viruses have the same roots.
Другие работы по теме:
Ebola Essay Research Paper Your have sudden
Ebola Essay, Research Paper Your have sudden fever, weakness, muscle pains, headache, and a sore throat, and that is just what?s happening to you before the really bad symptoms of this virus kicks in. These are followed by vomiting, diarrhea, and rash, and that are just some of the bad symptoms of this horrible virus know as the Ebola virus.
Aids And Teens Essay Research Paper AIDS
Aids And Teens Essay, Research Paper AIDS and TeensKids and young adults are the fastest rising group for HIV transmission today. People are beginning to experiment sexually contact at a young age. Unsafe sex is both stupid anddeadly. By deadly I mean the Human Immunodeficiency Virus, the virus that causes AIDS(Acquired Immune Deficiency Syndrome).
Loophole Or A Conspiracy Essay Research Paper
Loophole Or A Conspiracy? Virus, Hmmm I am sure that you have heard this word before. I am not talking about the living virus like an influenza virus. I am talking about the computer virus. According to the New York Times, Microsoft, Compaq, and Hewlett Packards computers are at a great risk. I wonder why we the consumer, are in this position? I cannot come up with one straight answer.
Melissa Virus Essay Research Paper On Friday
Melissa Virus Essay, Research Paper On Friday March 26, 1999 an e-mail virus named “Melissa” slipped into systems via e-mail and forcing computers to fire off dozens of infected messages to friends and colleagues. Once opened, the virus immediately reads the user’s e-mail address book and sends an infected message to the first 50 entries.
The Great Gatsby Tragedy From Lies Essay
, Research Paper The Great Gatsby: Tragedy From Lies In the world people try to hide things from each other but one way or another they find out what they are hiding. In the Great Gatsby by F. Scott
Hepatitis B Virus Essay Research Paper The
Hepatitis B Virus Essay, Research Paper The Hepatitis B Virus (HBV) HBV is a mostly double-stranded DNA virus in the Hepadnaviridae family. HBV causes hepatitis in human and related virus in this family cause hepatitis in ducks, ground squirrels and woodchucks. The HBV genome has four genes: pol, env, pre-core and X that respectively encode the viral DNA-polymerase, envelope protein, pre-core protein (which is processed to viral capsid) and protein X.
You Might Be A Nerd Essay Research
Paper You Might Be a Computer Nerd if… written by Nosferatu ? Your web page is more popular than you. ? Your favorite sport is Tetris. ? You know what fuzzy logic is.
Y2k The Truth Shall Set You Free
Essay, Research Paper It s certain that the beginning of the year 2000 we will have computer problems related with the Y2K bug. The Y2K bug will affect services we use everyday such as, Communications, Electric power, Oil and Gas, Transportation, and Water supply. Unfortunately many people are skeptical and believe the Y2k bug is going to cause the end of the world, as we know it.
Aids And Teens Essay Research Paper Kids
Aids And Teens Essay, Research Paper Kids and young adults are the fastest rising group for HIV transmission today. People are beginning to experiment sexually contact at a young age. Unsafe sex is both stupid and
Lying Essay Research Paper The whole truth
Lying Essay, Research Paper The whole truth and nothing but the truth. If these were words to live by then some of us be in trouble. Most people make a habit out of lying on a daily basis. Everyone tells a lie every now and then. Most lies are those little white lies, the ones to keep out of trouble, and the stupid ones that make no sense.
Aids Epidemic Essay Research Paper The Aids
Aids Epidemic Essay, Research Paper The Aids epidemic continues to grow globally. According to this article “33.6 million people are expected to be living with virus this year.” Also an expected 2.6 million people will die from the virus this year. This is the most people that will die from the virus since the epidemic was discovered around two decades ago.
AIDS Essay Research Paper AIDS VIRUS
AIDS Essay, Research Paper AIDS VIRUS The AIDS disease is a complicated illness that involves several phases. It is caused by a virus that can be passed from person to person.
Another Computer Essay Essay Research Paper The
Another Computer Essay Essay, Research Paper The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence
Computer Net Crime Essay Research Paper Computer
Computer Net Crime Essay, Research Paper Computer crimes are terrorism of the present day. Everything from Website attacks, viruses, and cyber sex. People have even been charged for rape over the internet. Government computers have been an easy target for hackers for decades. According to Defense Information Systems Agency s data, the military may have experienced about 250,000 attacks in 1995 with 2/3 s of the intrusions being successful.
Hackers Essay Research Paper In the article
Hackers Essay, Research Paper In the article that I read was about Hackers. It talked about the aspects of how the youths of today commit this crime. Hacking overall requires the utmost intelligent. These people that become Hackers have special knowledge and skills in computer programming, Internet use, overwhelmingly bright in mathematics and other important factors.
Lying
– Is Lying Morally Wrong? Essay, Research Paper Lisa RiceEnglish 101-03 Lupica-Scott Essay # 5Lying Is lying morally wrong? If you ask most people if they lie, the answer is answered quickly as ?No? but is that a lie in itself. We like to think of ourselves as honest, righteous people, therefore, we lie to ourselves about lying.
Lying To Children Essay Research Paper Lying
Lying To Children Essay, Research Paper Lying to Children The environment children grow in is a major contributor in shaping their behavior. Parents must be good role models for their children. If a parent lies to his child, the child will eventually assume that it is OK to tell lies. They will start lying and use more lies to cover up for them selves or for friends.
Why Tim O
’brien Lies Essay, Research Paper Why Tim O Brien Lies All of us are guilty of lying at one time or another. Whether it was a little white lie like whether the toothfairy is real or not, or if it was something significant, such as if you committed a serious crime, we have all done it. Lying is definitely a part of society, and no one really likes it or appreciates it.
Can The Y2K Cost You K
’s? Essay, Research Paper Can the Y2K cost you K’s? The Y2K bug is a computer virus that will plague all major computer systems as we move into the next millenium. People of the 20th century are taking this bug too lightly. It possesses the potential to deliver havoc and spread worldwide chaos in a collection of ways.
Ebola Virus Essay Research Paper The virus
Ebola Virus Essay, Research Paper The virus is active in monkeys and they acquire it every second fall. The virus is not deadly to the monkeys. In Africa many people eat monkey meat as a source of protein and this is how they get the Ebola virus in their systems. There have been theories that the Ebola virus can be transmitted from bats to people and that the bats have the Ebola virus in them.
Computer Viruses Essay Research Paper A computer
Computer Viruses Essay, Research Paper A computer virus is a program that attaches itself to, overwrites and/or otherwise replaces another program in order to reproduce itself without the knowledge of the computer user. Generally, the first thing a virus does is attach itself to other executable files in such a way that the virus code is in effect when the infected files are run.
Do Not Open This Email Essay Research
Paper Do Not Open This Email “Warning: New virus—Do not delete!” is probably the most common phrase in the subject line of email today. If not those words exactly, then something similar warning people of the most recent viruses circulating through the Internet. There are several ways viruses can be downloaded, but viruses are not the only downloadable nemeses.
Computer Viruses Essay Research Paper Almost every
Computer Viruses Essay, Research Paper Almost every End-user in the world has heard of computer viruses and/or has had one at one point in time. Don?t worry if you haven?t heard about them, you won?t find it in your bloodstream. Unfortunately you may find one in your computer memory or disk storage. ? Some may be as benign as the common cold and others as deadly to your hard drive as the Ebola virus ?.
Computer Viruses Essay Research Paper Anna L
Computer Viruses Essay, Research Paper Anna L. Porter Professor J. Brown Information Systems 201 December 1, 1998 Computer Viruses A computer virus is an illegal and potentially damaging computer program designed to infect other software by attaching itself to any software it contacts. In many cases, virus programs are designed to damage computer systems maliciously by destroying or corrupting data.
Intro To Computer Virus Essay Research Paper
Virus What is a Virus? The computer virus is something that has been around almost as long as the Personal Computer (PC) and certainly since the advent of the affordable home computer, but what exactly is a virus? And how does it affect your PC? Is there any way to prevent your hard drive becoming infected and just where do they come from anyway?
A Look Into The Computer Virus Essay
, Research Paper A Look Into The Computer Virus by, Michael Ross Engineering 201.02 January 22, 1997 Most of us swap disks with friends and browse the Net looking for downloads.
Herpes Essay Research Paper
Herpes is the number 1 STD in the World. At least seven herpes viruses are in the world today. The most common viruses are Herpes Simplex 1 and 2. Other types are Epstein-Barr virus(EBV), Varicella Zoster Virus(VZV), which also causes Chicken Pox and Shingles, Cytomegalovirus(CMV), And Human Herpes Virus(HHV).
Computer Viruses And Their Effects On Your
Pc Essay, Research Paper Computer Viruses and their Effects on your PC This page intentionally left blank Table of Contents What is a Virus? 1 HOW A VIRUS INFECTS YOUR SYSTEM: 2
Aids 4 Essay Research Paper AIDS Acquired
Aids 4 Essay, Research Paper AIDS (Acquired Immune Deficiency Syndrome) is a deadly disease for which there is no cure. This disease was first recognized in the mid 1980’s. The cause of AIDS is the HIV virus, and is most commonly spread by venereal routes or exposure to contaminated blood or blood products.
How To Maintain A Computer System Essay
, Research Paper How to Maintain A Computer System Start a notebook that includes information on your system. This notebook should be a single source of information about your entire system, both hardware