Computer Viruses Essay, Research Paper
Anna L. Porter
Professor J. Brown
Information Systems 201
December 1, 1998
Computer Viruses
A computer virus is an illegal and potentially damaging computer program designed to infect other software by attaching itself to any software it contacts. In many cases, virus programs are designed to damage computer systems maliciously by destroying or corrupting data. If the infected software is transferred to or accessed by another computer system, the virus spreads to the other system. Viruses have become a serious problem in recent years, and currently, thousands of known virus programs exist (Reed 85-102).
Three types of viruses are a boot sector viruses, file virus, and Trojan horse virus. A boot sector virus infects the boot program used to start the system. When the infected boot program executes, the virus is loaded into the computer?s memory. Once a virus is in memory, it can spread to any floppy disk inserted into the computer. A file virus inserts virus code into program files. The virus then spreads to any program that accesses the infected file. A Trojan horse virus (named after the Greek myth) hides within or is designed to look like a legitimate program.
Some viruses interrupt processing by freezing a computer system temporarily and then displaying sounds or messages. Other viruses contain time bombs or logic bombs. A time bomb is a program that performs an activity on a particular date. A logic bomb is a program that performs an activity when a certain action occurs, such as an employee being terminated. A worm, which is similar to a virus, copies itself repeatedly until no memory or disk space remains.
To detect computer viruses, antivirus programs have been developed. Besides the detecting of the viruses, antivirus programs also have utilities to remove or repair infected programs or files. Some damaged files cannot be repaired and must be replaced with uninfected backup files. The table below outlines some techniques used to protect computer systems.
Table
Techniques for Virus Protection and System Backup
Using Virus Protection SoftwareBacking Up Your System
Install virus protection software on every computer system.Develop a regular plan for copying and storing important data and program files.
Before use, scan every floppy disk with a virus scan program to check for viruses.Implement a backup plan and adhere to its guidelines.
Check all programs downloaded from the Internet or bulletin boards for viruses.Keep backup copies of files in fireproof safes or vaults or off-site
If your system becomes virus infected and you have questions, contact the National Computer Security Association (NCSA) for low-cost assistance (Elmhurst, 6 Nov. 1998).
Works Cited
Chambers, Anita R., and Zachary W. Peters. ?Protecting Against Virus Attacks.? Computers May 1998: 45-62.
Elmhurst, Mark. ?Virus Infection: Where to Obtain Assistance? Word 97, Project 3. scsite/wd97/pr3.htm (6 Nov. 1998).
Reed, Margaret E. An Introduction to Using Computers. Chicago: West Davidson Jones Publishing Company , 1998.
Chambers, Anita R., and Zachary W. Peters. ?Protecting Against Virus Attacks.? Computers May 1998: 45-62.
Elmhurst, Mark. ?Virus Infection: Where to Obtain Assistance? Word 97, Project 3. scsite/wd97/pr3.htm (6 Nov. 1998).
Reed, Margaret E. An Introduction to Using Computers. Chicago: West Davidson Jones Publishing Company , 1998.
Другие работы по теме:
Descriptive Essay About A Comp Essay Research
Paper The Computer A computer is a very unique machine. It has many different parts and a lot of different noises. Some parts are hot, and some are cold. Computers have many different sounds that they make. Depending on the sound it makes, it could have a problem. When your computer beeps at you. It normally means that an error has occurred and that it needs to be fixed.
Texas Revolution Essay Essay Research Paper Have
Texas Revolution Essay Essay, Research Paper Have you ever done something solely to build or save your pride? In the Texas Revolution a strong and proud general named Antonio Lopez de Santa Anna tightened control over Texas in order to repopulate Texas with Mexicans, since the dominating race had become non- Mexicans.
Computer Education Essay Research Paper Back to
Computer Education Essay, Research Paper Back to the 1940s, the modern electronic computer was developed at U.S. universities; however, in the year, there was no computer education yet. It needed more 10 years to have computer education. The period of the computer revolution was 1950 in the U.S.. Computer education began in the middle of the 1950s with an organized body of knowledge.
Computer Essay Research Paper Computer is useful
Computer Essay, Research Paper Computer is useful for finding the information. As long as the Internet is installed in the computer, the people can be able to what they want to find. Of course, they have to waste the time for doing. Acquiring the information, they feel that it is valuable. Renctly years, the number of people is increased by using computer.
Anna Karenina By Leo Tolstoy
(1828 – 1910) Essay, Research Paper Leo Tolstoy is considered one of Russia’s greatest nineteenth-century novelists, an honor he shares with Dostoievsky.
Hard Times Essay Research Paper hard timesBook
Hard Times Essay, Research Paper hard times Book Report Author: Anita Lobel Annas family was a typical Polish family in the 1930’s. Thier story is that the nazis came to poland in 1939. They took all of the Jewish families Anna’s family happend to be jewish. Annas family split up to make it harder for the nazis to catch them.
Tina Turner Essay Research Paper Tina Turner
Tina Turner Essay, Research Paper Tina Turner Tina Turner was born Anna Mae Bullock In 1939 on a small farm in Nutbush, Tennessee. At the age of 13, she was left with out a mother and a father. Anna went to live with her cousin in St. Louis. When she was 16 she would go to clubs with her sister in St. Louis. While in these clubs she saw a band called The Kings of Rhythm .
Computer Engineering Essay Research Paper Since birds
Computer Engineering Essay, Research Paper Since birds could fly and fish could swim there has always been questions, problems, and answers. This it what I am interested in. The questions and more importantly the answers. I have been seeking answers all my life. The one question I have always had is How do things work.
Another Computer Essay Essay Research Paper The
Another Computer Essay Essay, Research Paper The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence
Are Viruses Alive Essay Research Paper Are
Are Viruses Alive Essay, Research Paper Are Viruses Alive? By Bo Howes The word virus means “poi-son” in Latin. Viruses are submicro-scopic intracellular parasites that consist of either RNA or DNA, and a protective coat of protein. It has caused countless diseases in vari-ous organisms. The term virus was first used in the 1890s to describe agents that caused diseases that were smaller than bacteria.
Printer Technology Essay Research Paper Since the
Printer Technology Essay, Research Paper Since the introduction of computers into our society, there have been countless advancements in this technology. One of the most frequently used output devices in the computer system is the printer. Like all other components of the computer, this piece of equipment has been developed and improved over time.
Computer Net Crime Essay Research Paper Computer
Computer Net Crime Essay, Research Paper Computer crimes are terrorism of the present day. Everything from Website attacks, viruses, and cyber sex. People have even been charged for rape over the internet. Government computers have been an easy target for hackers for decades. According to Defense Information Systems Agency s data, the military may have experienced about 250,000 attacks in 1995 with 2/3 s of the intrusions being successful.
Another Hole In The Wall Essay Research
Paper ANOTHER HOLE IN THE WALL Opinion: This was a very interesting article because it seems that everybody That owns a computer has the fear of hackers and viruses. It’s a big issue
Essay On Hacking Essay Research Paper Essay
Essay On Hacking Essay, Research Paper Essay On Hacking by Philip Smith A topic that i know very well is computers and computer hacking. Computers seem very complicated and very hard to learn, but, if given time a
Virii Essay Research Paper Viruses are
Virii Essay, Research Paper Viruses are not truly alive. They are much smaller and less complex than cells. Most viruses multiply exclusively inside living host cells. Viruses
Viruses Essay Research Paper Why are Viruses
Viruses Essay, Research Paper Why are Viruses considered an exception to the Cell Theory? Viruses are prolific. They have been found in almost all parts of the Earth, including the Arctic. They infect nearly every form of life from the simplest unicellular organism (bacteria) to complex mammals, such as humans.
Windows 30 Essay Research Paper Windows 30
Windows 3.0 Essay, Research Paper Windows 3.0 With window’s 3.0, you can unleash the power of your 286 or 386 computer’s protected mode. Unlike earlier releases that made you purchase separate versions
Computer Viruses Essay Research Paper A computer
Computer Viruses Essay, Research Paper A computer virus is a program that attaches itself to, overwrites and/or otherwise replaces another program in order to reproduce itself without the knowledge of the computer user. Generally, the first thing a virus does is attach itself to other executable files in such a way that the virus code is in effect when the infected files are run.
Do Not Open This Email Essay Research
Paper Do Not Open This Email “Warning: New virus—Do not delete!” is probably the most common phrase in the subject line of email today. If not those words exactly, then something similar warning people of the most recent viruses circulating through the Internet. There are several ways viruses can be downloaded, but viruses are not the only downloadable nemeses.
Computer Crimes Essay Research Paper Computer CrimeComputer
Computer Crimes Essay, Research Paper Computer Crime Computer crime is a very broad term. It could mean anything from a total invasion by a hacker into the federal government or just the simple fact of one person letting another borrow a copy of his favorite flying game. Computers are defined in the dictionary as a machine that computes (WBD vol. 23).
A Look Into The Computer Virus Essay
, Research Paper A Look Into The Computer Virus by, Michael Ross Engineering 201.02 January 22, 1997 Most of us swap disks with friends and browse the Net looking for downloads.
Do Viruses Help Essay Research Paper HOW
Do Viruses Help? Essay, Research Paper HOW ABOUT VIRUSES? Just like bacteria viruses are one of the microbes that are winning the match against the humans. Viruses were the toughest one to tackle for the scientist. The shape, contents and their protective shields were the most challenging part of the fight.
Computer Viruses And Their Effects On Your
Pc Essay, Research Paper Computer Viruses and their Effects on your PC This page intentionally left blank Table of Contents What is a Virus? 1 HOW A VIRUS INFECTS YOUR SYSTEM: 2
The Computer Mouse Essay Research Paper The
The Computer Mouse Essay, Research Paper The Computer Mouse The computer mouse is a common pointing device, popularized by its inclusion as standard equipment with the Apple Macintosh. With the rise in
How To Maintain A Computer System Essay
, Research Paper How to Maintain A Computer System Start a notebook that includes information on your system. This notebook should be a single source of information about your entire system, both hardware
Computer Violence Essay Research Paper Violent Computer
Computer Violence Essay, Research Paper Violent Computer Games A lot of adults say violent computer games make you violent. I disagree. When you are mad you can take out your anger while playing that game. Lots of kids I know have violent computer games and none of them are violent. Pretty much everything in this world has violence in it.