SlideShare una empresa de Scribd logo
1 de 3
Yadav 1


Pahdi Yadav

Professor Milton

English 101

5 May 2008

                                            Antivirus Programs

        Today, people rely on computers to create, store, and manage critical information, many times

via a home computer network. Information transmitted over networks has a higher degree of security

risk than information kept in a user’s home or company premises. Thus, it is crucial that they take

measures to protect their computers and data from loss, damage, and misuse resulting from computer

security risks. Antivirus programs are an effective way to protect a computer against viruses.


        An antivirus program protects a computer against viruses by identifying and removing any

computer viruses found in memory, on storage media, or on incoming files. 1 When you purchase a new

computer, it often includes antivirus software. Antivirus programs work by scanning for programs that

attempt to modify the boot program, the operating system, and other programs that normally are read

from but not modified. In addition, many antivirus programs automatically scan files download from

the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer

(Karanos 201-205).


        One technique that antivirus programs use to identify a virus is to look for virus signatures, or

virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman

(Antivirus Programs), many vendors of antivirus programs allow registered users to update virus

signature files automatically from the Web at no cost for a specified time. Updating the antivirus




        1
         Bulowski points out that most antivirus programs also protect against worms and Trojan
horses (55-61).
Yadav 2


program’s signature files regularly is important, because it will download any new virus definitions that

have been added since the last update.


        Methods that guarantee a computer or network is safe from computer viruses simply do not

exist. Installing, updating, and using an antivirus program, though, is an effective technique to safeguard

your computer from loss.
Yadav 3


Works Cited
Bulowski, Dana. "Protection and Precaution: Keeping Your Computer Healthy." Computing Today
February 2008: 55-61.

Karanos, Hector. Internet Security. Indianapolis: City wide Cyber Press, 2008.

Shelly, Gary B., and Thomas J. Cashamn. Antivirus Programs. Course Technology. 7 February 2008
<www.scsite.com/wd2007/pr2/wc.htm>.




        1
         Bulowski points out that most antivirus programs also protect against worms and Trojan
horses (55-61).

Más contenido relacionado

La actualidad más candente

Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paperJennifer Cataluña
 
Zamayla chap 2 lab 2
Zamayla chap 2 lab 2Zamayla chap 2 lab 2
Zamayla chap 2 lab 2zamayla143
 
Dungogan chap 2 lab 2
Dungogan chap 2 lab 2Dungogan chap 2 lab 2
Dungogan chap 2 lab 2ricky098
 
(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2maranan_alexa
 
Antivirus program ----neri
Antivirus program  ----neriAntivirus program  ----neri
Antivirus program ----neriaejay_neri
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2maranan_zyra
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attackBhavesh soni
 
Osdc presentation (15 cs175)
Osdc presentation (15 cs175)Osdc presentation (15 cs175)
Osdc presentation (15 cs175)Mahnoor Masroor
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresAlexander Benoit
 
Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Tammy Clark
 
Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0Ayed Al Qartah
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees OPSWAT
 

La actualidad más candente (20)

Lab 2
Lab 2Lab 2
Lab 2
 
Chap 2 lab 2
Chap 2 lab 2Chap 2 lab 2
Chap 2 lab 2
 
Yadav 1(2)
Yadav 1(2)Yadav 1(2)
Yadav 1(2)
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
 
Hamilton lara 2011
Hamilton lara 2011Hamilton lara 2011
Hamilton lara 2011
 
Cataluña antivirus program
Cataluña antivirus programCataluña antivirus program
Cataluña antivirus program
 
Zamayla chap 2 lab 2
Zamayla chap 2 lab 2Zamayla chap 2 lab 2
Zamayla chap 2 lab 2
 
Dungogan chap 2 lab 2
Dungogan chap 2 lab 2Dungogan chap 2 lab 2
Dungogan chap 2 lab 2
 
(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2
 
Antivirus program ----neri
Antivirus program  ----neriAntivirus program  ----neri
Antivirus program ----neri
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
Osdc presentation (15 cs175)
Osdc presentation (15 cs175)Osdc presentation (15 cs175)
Osdc presentation (15 cs175)
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
 
Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!
 
Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0
 
Virus
VirusVirus
Virus
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 

Similar a Chap 2 lab2 (Ej Guevarra)

Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...UltraUploader
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basicsjeeva9948
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 

Similar a Chap 2 lab2 (Ej Guevarra) (17)

Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Mjtanasas
MjtanasasMjtanasas
Mjtanasas
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
Policy report barrat &amp; associates ltd
Policy report  barrat &amp; associates ltdPolicy report  barrat &amp; associates ltd
Policy report barrat &amp; associates ltd
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
185
185185
185
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 

Más de Enriquee Guevarra

Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Enriquee Guevarra
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalitiesEnriquee Guevarra
 
Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)Enriquee Guevarra
 
Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)Enriquee Guevarra
 
Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Enriquee Guevarra
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Enriquee Guevarra
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalitiesEnriquee Guevarra
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Enriquee Guevarra
 
Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)Enriquee Guevarra
 
Music for life (Ej Guevarra)
Music for life (Ej Guevarra)Music for life (Ej Guevarra)
Music for life (Ej Guevarra)Enriquee Guevarra
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Enriquee Guevarra
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Enriquee Guevarra
 
Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )Enriquee Guevarra
 
Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )Enriquee Guevarra
 
Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )Enriquee Guevarra
 

Más de Enriquee Guevarra (20)

Chap 2 lab 3 (Ej Guevarra)
Chap 2 lab 3 (Ej Guevarra)Chap 2 lab 3 (Ej Guevarra)
Chap 2 lab 3 (Ej Guevarra)
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalities
 
Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)
 
Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
 
Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalities
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
 
Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)
 
Music for life (Ej Guevarra)
Music for life (Ej Guevarra)Music for life (Ej Guevarra)
Music for life (Ej Guevarra)
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )
 
Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )
 
Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )
 
Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )
 
Craft barn ( Ej Guevarra )
Craft barn ( Ej Guevarra )Craft barn ( Ej Guevarra )
Craft barn ( Ej Guevarra )
 
Craft barn
Craft barnCraft barn
Craft barn
 
Autumn festival
Autumn festivalAutumn festival
Autumn festival
 

Último

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Chap 2 lab2 (Ej Guevarra)

  • 1. Yadav 1 Pahdi Yadav Professor Milton English 101 5 May 2008 Antivirus Programs Today, people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses. An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. 1 When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files download from the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201-205). One technique that antivirus programs use to identify a virus is to look for virus signatures, or virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman (Antivirus Programs), many vendors of antivirus programs allow registered users to update virus signature files automatically from the Web at no cost for a specified time. Updating the antivirus 1 Bulowski points out that most antivirus programs also protect against worms and Trojan horses (55-61).
  • 2. Yadav 2 program’s signature files regularly is important, because it will download any new virus definitions that have been added since the last update. Methods that guarantee a computer or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus program, though, is an effective technique to safeguard your computer from loss.
  • 3. Yadav 3 Works Cited Bulowski, Dana. "Protection and Precaution: Keeping Your Computer Healthy." Computing Today February 2008: 55-61. Karanos, Hector. Internet Security. Indianapolis: City wide Cyber Press, 2008. Shelly, Gary B., and Thomas J. Cashamn. Antivirus Programs. Course Technology. 7 February 2008 <www.scsite.com/wd2007/pr2/wc.htm>. 1 Bulowski points out that most antivirus programs also protect against worms and Trojan horses (55-61).