SlideShare una empresa de Scribd logo
1 de 3
Yadav 3


Pahdi Yadav

Professor Milton

English 101

5 May 2008



                                                  Antivirus Programs

          Today, People rely on computers to create, store, and manage critical information, many

times via a home computer network. Information transmitted over networks has a higher degree of

security risk than information kept in a user’s home or company premises. Thus, it is crucial that they

take measures to protect their computers and data from loss, damage, and misuse resulting from

computer security risks. Antivirus programs are an effective way to project a computer against viruses.


          An antivirus program protect a computer against viruses by identifying and removing any

computer viruses found memory , on storage media, or on incoming files. When you purchase a new

computer , it often includes antivirus software. Antivirus programs work by scanning for programs that

attempt to modify the boot program, the operating system, and other programs that normally are read

from but not modified. In addition, many antivirus programs automatically scan files downloaded from

the Web, e-mail attachments, open files, and al types of removable media inserted in the computer

(Karanos 201-205).


          One technique that antivirus programs use to identify a virus is to look for virus signatures, or

virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman

(Antivirus Programs), many vendors of antivirus programs allow registered users to update virus

signatures files automatically from the Web at no cost for a specified time. Updating the antivirus
Yadav 3


Bulowski points out that most antivirus programs also protect against worms and Trojab horses (55-61)

programs signature files regularly is important, because it will download any new virus definitions that

have been added since the last update.


  Methods that guarantee a computer or network is safe from computer viruses simply do not exist.

Installing updating, and using an antivirus program, though, is an effective technique to safeguard your

computer from loss.
Yadav 3


                                         Work Cited
Bulowski, Dana. "Protection and Precaution: Keeping Your Computer Healthy." Computing
Today February 2008: 55-61.

Karanos, Hector. Internet Security. Indianapolis: Citywide Cyber Press, 2008.

Shelly, Gary B., and Thomas Cashman. Antivirus Programs. Course Technology. 7 February 2008
<www.scsite.com/wd2007/pr2/wc.htm>.

Más contenido relacionado

La actualidad más candente

Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
Arber Hoxhallari
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}
richbryansalvo
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
Hemant Nagwekar
 

La actualidad más candente (19)

Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
Data Security
Data SecurityData Security
Data Security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firm
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
 

Destacado

Canaan cover letter (1)
Canaan cover letter (1)Canaan cover letter (1)
Canaan cover letter (1)
kent neri
 
K ent philip neri (1st year high.)
K ent philip neri (1st year high.)K ent philip neri (1st year high.)
K ent philip neri (1st year high.)
kent neri
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
kent neri
 
Kent philip neri(1styear high.)
Kent philip neri(1styear high.)Kent philip neri(1styear high.)
Kent philip neri(1styear high.)
kent neri
 
Gingoog city 2
Gingoog city 2Gingoog city 2
Gingoog city 2
mehhhh
 

Destacado (8)

Canaan cover letter (1)
Canaan cover letter (1)Canaan cover letter (1)
Canaan cover letter (1)
 
K ent philip neri (1st year high.)
K ent philip neri (1st year high.)K ent philip neri (1st year high.)
K ent philip neri (1st year high.)
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Kent philip neri(1styear high.)
Kent philip neri(1styear high.)Kent philip neri(1styear high.)
Kent philip neri(1styear high.)
 
Gingoog city 2
Gingoog city 2Gingoog city 2
Gingoog city 2
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & Textspeak
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Similar a Kent philip neri (lab 2) (20)

R esearch report with footnote
R esearch report with footnoteR esearch report with footnote
R esearch report with footnote
 
llagas j.
llagas j.llagas j.
llagas j.
 
antivirus
antivirusantivirus
antivirus
 
Yadav 1(2)
Yadav 1(2)Yadav 1(2)
Yadav 1(2)
 
Chap 2 lab 2
Chap 2 lab 2Chap 2 lab 2
Chap 2 lab 2
 
Dungogan chap 2 lab 2
Dungogan chap 2 lab 2Dungogan chap 2 lab 2
Dungogan chap 2 lab 2
 
Zamayla chap 2 lab 2
Zamayla chap 2 lab 2Zamayla chap 2 lab 2
Zamayla chap 2 lab 2
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
Lab 2
Lab 2Lab 2
Lab 2
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
 
Cataluña antivirus program
Cataluña antivirus programCataluña antivirus program
Cataluña antivirus program
 
Hamilton lara 2011
Hamilton lara 2011Hamilton lara 2011
Hamilton lara 2011
 
Chap 2 lab2 (Ej
Chap 2 lab2 (EjChap 2 lab2 (Ej
Chap 2 lab2 (Ej
 
Antivirus program ----neri
Antivirus program  ----neriAntivirus program  ----neri
Antivirus program ----neri
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Policy report barrat &amp; associates ltd
Policy report  barrat &amp; associates ltdPolicy report  barrat &amp; associates ltd
Policy report barrat &amp; associates ltd
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...
 

Más de kent neri

Leading different personalities 1
Leading different personalities 1Leading different personalities 1
Leading different personalities 1
kent neri
 
Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)
kent neri
 
Working together(k entneri )
Working together(k entneri )Working together(k entneri )
Working together(k entneri )
kent neri
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)
kent neri
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)
kent neri
 
Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)
kent neri
 
Shop for sale(kent neri)
Shop for sale(kent neri)Shop for sale(kent neri)
Shop for sale(kent neri)
kent neri
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lot
kent neri
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)
kent neri
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)
kent neri
 
Airplane rides
Airplane ridesAirplane rides
Airplane rides
kent neri
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
kent neri
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
kent neri
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
kent neri
 
Autumn festival
Autumn festivalAutumn festival
Autumn festival
kent neri
 

Más de kent neri (18)

Leading different personalities 1
Leading different personalities 1Leading different personalities 1
Leading different personalities 1
 
Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)
 
Craft barn
Craft barnCraft barn
Craft barn
 
Working together(k entneri )
Working together(k entneri )Working together(k entneri )
Working together(k entneri )
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)
 
Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)
 
Shop for sale(kent neri)
Shop for sale(kent neri)Shop for sale(kent neri)
Shop for sale(kent neri)
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lot
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)
 
Airplane rides
Airplane ridesAirplane rides
Airplane rides
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
 
Play ball
Play ballPlay ball
Play ball
 
Play ball
Play ballPlay ball
Play ball
 
Autumn festival
Autumn festivalAutumn festival
Autumn festival
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Kent philip neri (lab 2)

  • 1. Yadav 3 Pahdi Yadav Professor Milton English 101 5 May 2008  Antivirus Programs Today, People rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to project a computer against viruses. An antivirus program protect a computer against viruses by identifying and removing any computer viruses found memory , on storage media, or on incoming files. When you purchase a new computer , it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, e-mail attachments, open files, and al types of removable media inserted in the computer (Karanos 201-205). One technique that antivirus programs use to identify a virus is to look for virus signatures, or virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman (Antivirus Programs), many vendors of antivirus programs allow registered users to update virus signatures files automatically from the Web at no cost for a specified time. Updating the antivirus
  • 2. Yadav 3 Bulowski points out that most antivirus programs also protect against worms and Trojab horses (55-61) programs signature files regularly is important, because it will download any new virus definitions that have been added since the last update. Methods that guarantee a computer or network is safe from computer viruses simply do not exist. Installing updating, and using an antivirus program, though, is an effective technique to safeguard your computer from loss.
  • 3. Yadav 3 Work Cited Bulowski, Dana. "Protection and Precaution: Keeping Your Computer Healthy." Computing Today February 2008: 55-61. Karanos, Hector. Internet Security. Indianapolis: Citywide Cyber Press, 2008. Shelly, Gary B., and Thomas Cashman. Antivirus Programs. Course Technology. 7 February 2008 <www.scsite.com/wd2007/pr2/wc.htm>.