SlideShare una empresa de Scribd logo
1 de 13
COMPUTER
VIRUS
COMPUTER VIRUS
A computer virus is a computer program that can replicate itself and spread
from one computer to another. The term "virus" is also commonly, but
erroneously, used to refer to other types of malware, including but not limited to
adware and spyware programs that do not have a reproductive ability.
Malware includes computer viruses, computer worms, Trojan horses, most root
kits, spyware, dishonest adware and other malicious or unwanted software,
including true viruses. Viruses are sometimes confused with worms and Trojan
horses, which are technically different. A worm can exploit security vulnerabilities
to spread itself automatically to other computers through networks, while a Trojan
horse is a program that appears harmless but hides malicious functions. Worms
and Trojan horses, like viruses, may harm a computer system's data or
performance. Some viruses and other malware have symptoms noticeable to the
computer user, but many are surreptitious or simply do nothing to call attention to
them. Some viruses do nothing beyond reproducing themselves.
An example of a virus which is not a malware, but is putatively benevolent, is
Fred Cohen's theoretical compression virus. However, antivirus professionals do
not accept the concept of benevolent viruses, as any desired function can be
implemented without involving a virus (automatic compression, for instance, is
available under the Windows operating system at the choice of the user). Any
virus will by definition make unauthorized changes to a computer, which is
undesirable even if no damage is done or intended.
SCIENCE FICTION
The actual term "virus" was first used to denote a self-reproducing program in a
short story by David Gerald in Galaxy magazine in 1969—and later in his 1972
novel, When HARLIE Was One. In that novel, a sentient computer named HARLIE
writes viral software to retrieve damaging personal information from other
computers to blackmail the man who wants to turn him off. The Terminal Man, a
science fiction novel by Michael Crichton (1972), told (as a sideline story) of a
computer with telephone modem dialing capability, which had been programmed
to attempted to program the answering computer with its own program, so that the
second computer randomly dial phone numbers until it hit a modem that is
answered by another computer. It then would also begin dialing random numbers,
in search of yet another computer to program. The program is assumed to spread
exponentially through susceptible computers.
The first IBM PC virus in the wild was a boot sector virus dubbed (c)Brain,
created in 1986 by the Farooq Alvi Brothers in Lahore, Pakistan, reportedly to deter
piracy of the software they had written.
Before computer networks became widespread, most viruses spread on
removable media, particularly floppy disks. In the early days of the personal
computer, many users regularly exchanged information and programs on floppies.
Some viruses spread by infecting programs stored on these disks, while others
installed themselves into the disk boot sector, ensuring that they would be run
when the user booted the computer from the disk, usually inadvertently. Personal
computers of the era would attempt to boot first from a floppy if one had been left
in the drive. Until floppy disks fell out of use, this was the most successful
infection strategy and boot sector viruses were the most common in the wild for
many years.
SCIENCE FICTION
Traditional computer viruses emerged in the 1980s, driven by the spread of
personal computers and the resultant increase in BBS, modem use, and software
sharing. Bulletin board–driven software sharing contributed directly to the
spread of Trojan horse programs, and viruses were written to infect popularly
traded software. Shareware and bootleg software were equally common vectors
for viruses on BBSs.[citation needed] Viruses can increase their chances of spreading
to other computers by infecting files on a network file system or a file system
that is accessed by other computers. Macro viruses have become common since
the mid-1990s. Most of these viruses are written in the scripting languages for
Microsoft programs such as Word and Excel and spread throughout Microsoft
Office by infecting documents and spreadsheets. Since Word and Excel were
also available for Mac OS, most could also spread to Macintosh computers.
Although most of these viruses did not have the ability to send infected email
messages, those viruses which did take advantage of the Microsoft Outlook COM
interface.
Some old versions of Microsoft Word allow macros to replicate themselves
with additional blank lines. If two macro viruses simultaneously infect a
document, the combination of the two, if also self-replicating, can appear as a
"mating" of the two and would likely be detected as a virus unique from the
"parents".
A virus may also send a web address link as an instant message to all the
contacts on an infected machine. If the recipient, thinking the link is from a friend
(a trusted source) follows the link to the website, the virus hosted at the site may
be able to infect this new computer and continue propagating.
Viruses that spread using cross-site scripting were first reported in 2002, and
were academically demonstrated in 2005. There have been multiple instances of
the cross-site scripting viruses in the wild, exploiting websites such as MySpace
and Yahoo!.
CLASSIFICATION
In order to replicate itself, a virus must be permitted to
execute code and write to memory. For this reason, many
viruses attach themselves to executable files that may be
part of legitimate programs. If a user attempts to launch an
infected program, the virus' code may be executed
simultaneously. Viruses can be divided into two types based
on their behavior when they are executed. Nonresident
viruses immediately search for other hosts that can be
infected, infect those targets, and finally transfer control to
the application program they infected. Resident viruses do
not search for hosts when they are started. Instead, a
resident virus loads itself into memory on execution and
transfers control to the host program. The virus stays active
in the background and infects new hosts when those files are
accessed by other programs or the operating system itself.
INFECTION STRATEGIES
In order to avoid detection by users, some viruses employ
different kinds of deception. Some old viruses, especially on the
MS-DOS platform, make sure that the "last modified" date of a
host file stays the same when the file is infected by the virus.
This approach does not fool antivirus software, however,
especially those which maintain and date cyclic redundancy
checks on file changes.
Some viruses can infect files without increasing their sizes or
damaging the files. They accomplish this by overwriting unused
areas of executable files. These are called cavity viruses. For
example, the CIH virus, or Chernobyl Virus, infects Portable
Executable files. Because those files have many empty gaps,
the virus, which was 1 KB in length, did not add to the size of
the file.
Some viruses try to avoid detection by killing the tasks
associated with antivirus software before it can detect them.
AVOIDING BAIT FILES & OTHER
UNDESIRABLE HOSTS
A virus needs to infect hosts in order to spread further. In some
cases, it might be a bad idea to infect a host program. For example,
many antivirus programs perform an integrity check of their own
code. Infecting such programs will therefore increase the likelihood
that the virus is detected. For this reason, some viruses are
programmed not to infect programs that are known to be part of
antivirus software. Another type of host that viruses sometimes
avoid are bait files. Bait files (or goat files) are files that are
specially created by antivirus software, or by antivirus professionals
themselves, to be infected by a virus. These files can be created for
various reasons, all of which are related to the detection of the
virus:
Antivirus professionals can use bait files to take a sample of a virus
(i.e. a copy of a program file that is infected by the virus). It is more
practical to store and exchange a small, infected bait file, than to
exchange a large application program that has been infected by the
virus.
AVOIDING BAIT FILES & OTHER
UNDESIRABLE HOSTS
Antivirus professionals can use bait files to study the behavior
of a virus and evaluate detection methods. This is especially useful
when the virus is polymorphic. In this case, the virus can be made
to infect a large number of bait files. The infected files can be used
to test whether a virus scanner detects all versions of the virus.
Some antivirus software employ bait files that are accessed
regularly. When these files are modified, the antivirus software
warns the user that a virus is probably active on the system.
Since bait files are used to detect the virus, or to make detection
possible, a virus can benefit from not infecting them. Viruses
typically do this by avoiding suspicious programs, such as small
program files or programs that contain certain patterns of "garbage
instructions". A related strategy to make baiting difficult is sparse
infection. Sometimes, sparse infectors do not infect a host file that
would be a suitable candidate for infection in other circumstances.
For example, a virus can decide on a random basis whether to
infect a file or not, or a virus can only infect host files on particular
days of the week.
ANTIVIRUS SOFTWARE & OTER
PREVENTIVE MEASURES
Many users install antivirus software that can detect and eliminate
known viruses after the computer downloads or runs the executable.
There are two common methods that an antivirus software application
uses to detect viruses. The first, and by far the most common method
of virus detection is using a list of virus signature definitions. This works
by examining the content of the computer's memory (its RAM, and boot
sectors) and the files stored on fixed or removable drives (hard drives,
floppy drives), and comparing those files against a database of known
virus "signatures". The disadvantage of this detection method is that
users are only protected from viruses that pre-date their last virus
definition update. The second method is to use a heuristic algorithm to
find viruses based on common behaviors. This method has the ability
to detect novel viruses that anti-virus security firms have yet to create a
signature for.
Some anti-virus programs are able to scan opened files in addition to
sent and received email messages "on the fly" in a similar manner. This
practice is known as "on-access scanning". Antivirus software does not
change the underlying capability of host software to transmit viruses.
Users must update their software regularly to patch security holes.
Antivirus software also needs to be regularly updated in order to
recognize the latest threats.
ANTIVIRUS SOFTWARE & OTER
PREVENTIVE MEASURES
One may also minimize the damage done by viruses by
making regular backups of data (and the operating systems)
on different media, that are either kept unconnected to the
system (most of the time), read-only or not accessible for
other reasons, such as using different file systems. This way,
if data is lost through a virus, one can start again using the
backup (which should preferably be recent).
If a backup session on optical media like CD and DVD is
closed, it becomes read-only and can no longer be affected
by a virus (so long as a virus or infected file was not copied
onto the CD/DVD). Likewise, an operating system on a
bootable CD can be used to start the computer if the
installed operating systems become unusable. Backups on
removable media must be carefully inspected before
restoration. The Gammima virus, for example, propagates
via removable flash drives.
RECOVERY METHODS
AND VIRUS REMOVAL
A number of recovery options exist after a computer has a virus. These
actions depend on the virus. Some may be safely removed by functions
available in most antivirus software products. Others may require reinstallation of damaged programs. It is necessary to know the
characteristics of the virus involved to take the correct action, and anti-virus
products will identify known viruses precisely before trying to "dis-infect" a
computer; otherwise such action could itself cause a lot of damage. New
viruses that anti-virus researchers have not yet studied therefore present an
ongoing problem, which requires anti-virus packages to be updated
frequently.
A number of recovery options exist after a computer has a virus. These
actions depend on the virus. Some may be safely removed by functions
available in most antivirus software products. Others may require reinstallation of damaged programs. It is necessary to know the
characteristics of the virus involved to take the correct action, and anti-virus
products will identify known viruses precisely before trying to "dis-infect" a
computer; otherwise such action could itself cause a lot of damage. New
viruses that anti-virus researchers have not yet studied therefore present an
ongoing problem, which requires anti-virus packages to be updated frequently.
OPERATING SYSTEM
REINSTALLED
Reinstalling the operating system is another approach to
virus removal. It involves either reformatting the
computer's hard drive and installing the OS and all
programs from original media, or restoring an earlier
"clean" (virus-free) copy of the entire partition from a
cloned disk, a disk image, or a backup. User data can be
recovered by booting from a live CD, or putting the hard
drive into another computer and booting from its operating
system, taking great care not to infect the second
computer by executing any infected programs on the
original drive. Once the system has been restored,
precautions must be taken to avoid reinfection from
restored executable files.
These recovery methods are relatively simple to do,
usually remove any malware, and may be faster than
disinfecting
the
computer—or
reinstalling
and
reconfiguring the operating system and programs from
scratch, then restoring user preferences.
How computer works against thevirus or any threat

Más contenido relacionado

La actualidad más candente

Virus09
Virus09Virus09
Virus09
defler
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
adni_shadah
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
drewz lin
 

La actualidad más candente (20)

Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer viruses
 
Assignment of virus
Assignment of virusAssignment of virus
Assignment of virus
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran university
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Virus09
Virus09Virus09
Virus09
 
Computer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan ChakravarthyComputer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan Chakravarthy
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Viruses
VirusesViruses
Viruses
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Survey on Computer Worms
Survey on Computer WormsSurvey on Computer Worms
Survey on Computer Worms
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 

Destacado

Mobile operating system..
Mobile operating system..Mobile operating system..
Mobile operating system..
Aashish Uppal
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system ppt
Santosh Kumar
 

Destacado (13)

DATAS for Oracle FSGBU Partner Advisory Board
DATAS for Oracle FSGBU Partner Advisory BoardDATAS for Oracle FSGBU Partner Advisory Board
DATAS for Oracle FSGBU Partner Advisory Board
 
Animal Cell Analogy
Animal Cell Analogy Animal Cell Analogy
Animal Cell Analogy
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
 
Introduction to Firebase [Google I/O Extended Bangkok 2016]
Introduction to Firebase [Google I/O Extended Bangkok 2016]Introduction to Firebase [Google I/O Extended Bangkok 2016]
Introduction to Firebase [Google I/O Extended Bangkok 2016]
 
Mobile Operating Systems
Mobile Operating SystemsMobile Operating Systems
Mobile Operating Systems
 
Mobile operating system..
Mobile operating system..Mobile operating system..
Mobile operating system..
 
Android vs Others Operating System
Android vs Others Operating SystemAndroid vs Others Operating System
Android vs Others Operating System
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system ppt
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Firebase Dev Day Bangkok: Keynote
Firebase Dev Day Bangkok: KeynoteFirebase Dev Day Bangkok: Keynote
Firebase Dev Day Bangkok: Keynote
 
Mobile Operating System
Mobile Operating SystemMobile Operating System
Mobile Operating System
 
Mobile ppt
Mobile pptMobile ppt
Mobile ppt
 
Mobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalMobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigital
 

Similar a How computer works against thevirus or any threat

Computer Virus
Computer Virus Computer Virus
Computer Virus
bebo
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
Joy Chakraborty
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
KRT395
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
amoY91
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 

Similar a How computer works against thevirus or any threat (20)

Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Virus
VirusVirus
Virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Presentation2
Presentation2Presentation2
Presentation2
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 

Más de Sadaf Walliyani

Más de Sadaf Walliyani (20)

Letters and Phonics
Letters and Phonics Letters and Phonics
Letters and Phonics
 
Culture of pakistan
Culture of pakistanCulture of pakistan
Culture of pakistan
 
Culture of pakistan game
Culture of pakistan gameCulture of pakistan game
Culture of pakistan game
 
Imam ghazali philosophy of education
Imam ghazali philosophy of educationImam ghazali philosophy of education
Imam ghazali philosophy of education
 
Traffic rules
Traffic rulesTraffic rules
Traffic rules
 
I am a start right kid
I am a start right kidI am a start right kid
I am a start right kid
 
Student council
Student council Student council
Student council
 
Take care of animals
Take care of animalsTake care of animals
Take care of animals
 
Habitat ppt games
Habitat ppt games Habitat ppt games
Habitat ppt games
 
Habitat games
Habitat games Habitat games
Habitat games
 
Animal home quick match
Animal home  quick match Animal home  quick match
Animal home quick match
 
Millionaire verbs
Millionaire verbsMillionaire verbs
Millionaire verbs
 
City and village
City and village City and village
City and village
 
Professions
Professions  Professions
Professions
 
Allah created everything
Allah created everythingAllah created everything
Allah created everything
 
City and village
City and village City and village
City and village
 
Goods and services
Goods and servicesGoods and services
Goods and services
 
Interactive white board PPT
Interactive white board PPTInteractive white board PPT
Interactive white board PPT
 
Population
Population Population
Population
 
City life Village life
City life Village life City life Village life
City life Village life
 

Último

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

How computer works against thevirus or any threat

  • 2. COMPUTER VIRUS A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most root kits, spyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to them. Some viruses do nothing beyond reproducing themselves. An example of a virus which is not a malware, but is putatively benevolent, is Fred Cohen's theoretical compression virus. However, antivirus professionals do not accept the concept of benevolent viruses, as any desired function can be implemented without involving a virus (automatic compression, for instance, is available under the Windows operating system at the choice of the user). Any virus will by definition make unauthorized changes to a computer, which is undesirable even if no damage is done or intended.
  • 3. SCIENCE FICTION The actual term "virus" was first used to denote a self-reproducing program in a short story by David Gerald in Galaxy magazine in 1969—and later in his 1972 novel, When HARLIE Was One. In that novel, a sentient computer named HARLIE writes viral software to retrieve damaging personal information from other computers to blackmail the man who wants to turn him off. The Terminal Man, a science fiction novel by Michael Crichton (1972), told (as a sideline story) of a computer with telephone modem dialing capability, which had been programmed to attempted to program the answering computer with its own program, so that the second computer randomly dial phone numbers until it hit a modem that is answered by another computer. It then would also begin dialing random numbers, in search of yet another computer to program. The program is assumed to spread exponentially through susceptible computers. The first IBM PC virus in the wild was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi Brothers in Lahore, Pakistan, reportedly to deter piracy of the software they had written. Before computer networks became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of the personal computer, many users regularly exchanged information and programs on floppies. Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector, ensuring that they would be run when the user booted the computer from the disk, usually inadvertently. Personal computers of the era would attempt to boot first from a floppy if one had been left in the drive. Until floppy disks fell out of use, this was the most successful infection strategy and boot sector viruses were the most common in the wild for many years.
  • 4. SCIENCE FICTION Traditional computer viruses emerged in the 1980s, driven by the spread of personal computers and the resultant increase in BBS, modem use, and software sharing. Bulletin board–driven software sharing contributed directly to the spread of Trojan horse programs, and viruses were written to infect popularly traded software. Shareware and bootleg software were equally common vectors for viruses on BBSs.[citation needed] Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers. Macro viruses have become common since the mid-1990s. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel and spread throughout Microsoft Office by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most could also spread to Macintosh computers. Although most of these viruses did not have the ability to send infected email messages, those viruses which did take advantage of the Microsoft Outlook COM interface. Some old versions of Microsoft Word allow macros to replicate themselves with additional blank lines. If two macro viruses simultaneously infect a document, the combination of the two, if also self-replicating, can appear as a "mating" of the two and would likely be detected as a virus unique from the "parents". A virus may also send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend (a trusted source) follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating. Viruses that spread using cross-site scripting were first reported in 2002, and were academically demonstrated in 2005. There have been multiple instances of the cross-site scripting viruses in the wild, exploiting websites such as MySpace and Yahoo!.
  • 5. CLASSIFICATION In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs. If a user attempts to launch an infected program, the virus' code may be executed simultaneously. Viruses can be divided into two types based on their behavior when they are executed. Nonresident viruses immediately search for other hosts that can be infected, infect those targets, and finally transfer control to the application program they infected. Resident viruses do not search for hosts when they are started. Instead, a resident virus loads itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed by other programs or the operating system itself.
  • 6. INFECTION STRATEGIES In order to avoid detection by users, some viruses employ different kinds of deception. Some old viruses, especially on the MS-DOS platform, make sure that the "last modified" date of a host file stays the same when the file is infected by the virus. This approach does not fool antivirus software, however, especially those which maintain and date cyclic redundancy checks on file changes. Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files. These are called cavity viruses. For example, the CIH virus, or Chernobyl Virus, infects Portable Executable files. Because those files have many empty gaps, the virus, which was 1 KB in length, did not add to the size of the file. Some viruses try to avoid detection by killing the tasks associated with antivirus software before it can detect them.
  • 7. AVOIDING BAIT FILES & OTHER UNDESIRABLE HOSTS A virus needs to infect hosts in order to spread further. In some cases, it might be a bad idea to infect a host program. For example, many antivirus programs perform an integrity check of their own code. Infecting such programs will therefore increase the likelihood that the virus is detected. For this reason, some viruses are programmed not to infect programs that are known to be part of antivirus software. Another type of host that viruses sometimes avoid are bait files. Bait files (or goat files) are files that are specially created by antivirus software, or by antivirus professionals themselves, to be infected by a virus. These files can be created for various reasons, all of which are related to the detection of the virus: Antivirus professionals can use bait files to take a sample of a virus (i.e. a copy of a program file that is infected by the virus). It is more practical to store and exchange a small, infected bait file, than to exchange a large application program that has been infected by the virus.
  • 8. AVOIDING BAIT FILES & OTHER UNDESIRABLE HOSTS Antivirus professionals can use bait files to study the behavior of a virus and evaluate detection methods. This is especially useful when the virus is polymorphic. In this case, the virus can be made to infect a large number of bait files. The infected files can be used to test whether a virus scanner detects all versions of the virus. Some antivirus software employ bait files that are accessed regularly. When these files are modified, the antivirus software warns the user that a virus is probably active on the system. Since bait files are used to detect the virus, or to make detection possible, a virus can benefit from not infecting them. Viruses typically do this by avoiding suspicious programs, such as small program files or programs that contain certain patterns of "garbage instructions". A related strategy to make baiting difficult is sparse infection. Sometimes, sparse infectors do not infect a host file that would be a suitable candidate for infection in other circumstances. For example, a virus can decide on a random basis whether to infect a file or not, or a virus can only infect host files on particular days of the week.
  • 9. ANTIVIRUS SOFTWARE & OTER PREVENTIVE MEASURES Many users install antivirus software that can detect and eliminate known viruses after the computer downloads or runs the executable. There are two common methods that an antivirus software application uses to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. This works by examining the content of the computer's memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives), and comparing those files against a database of known virus "signatures". The disadvantage of this detection method is that users are only protected from viruses that pre-date their last virus definition update. The second method is to use a heuristic algorithm to find viruses based on common behaviors. This method has the ability to detect novel viruses that anti-virus security firms have yet to create a signature for. Some anti-virus programs are able to scan opened files in addition to sent and received email messages "on the fly" in a similar manner. This practice is known as "on-access scanning". Antivirus software does not change the underlying capability of host software to transmit viruses. Users must update their software regularly to patch security holes. Antivirus software also needs to be regularly updated in order to recognize the latest threats.
  • 10. ANTIVIRUS SOFTWARE & OTER PREVENTIVE MEASURES One may also minimize the damage done by viruses by making regular backups of data (and the operating systems) on different media, that are either kept unconnected to the system (most of the time), read-only or not accessible for other reasons, such as using different file systems. This way, if data is lost through a virus, one can start again using the backup (which should preferably be recent). If a backup session on optical media like CD and DVD is closed, it becomes read-only and can no longer be affected by a virus (so long as a virus or infected file was not copied onto the CD/DVD). Likewise, an operating system on a bootable CD can be used to start the computer if the installed operating systems become unusable. Backups on removable media must be carefully inspected before restoration. The Gammima virus, for example, propagates via removable flash drives.
  • 11. RECOVERY METHODS AND VIRUS REMOVAL A number of recovery options exist after a computer has a virus. These actions depend on the virus. Some may be safely removed by functions available in most antivirus software products. Others may require reinstallation of damaged programs. It is necessary to know the characteristics of the virus involved to take the correct action, and anti-virus products will identify known viruses precisely before trying to "dis-infect" a computer; otherwise such action could itself cause a lot of damage. New viruses that anti-virus researchers have not yet studied therefore present an ongoing problem, which requires anti-virus packages to be updated frequently. A number of recovery options exist after a computer has a virus. These actions depend on the virus. Some may be safely removed by functions available in most antivirus software products. Others may require reinstallation of damaged programs. It is necessary to know the characteristics of the virus involved to take the correct action, and anti-virus products will identify known viruses precisely before trying to "dis-infect" a computer; otherwise such action could itself cause a lot of damage. New viruses that anti-virus researchers have not yet studied therefore present an ongoing problem, which requires anti-virus packages to be updated frequently.
  • 12. OPERATING SYSTEM REINSTALLED Reinstalling the operating system is another approach to virus removal. It involves either reformatting the computer's hard drive and installing the OS and all programs from original media, or restoring an earlier "clean" (virus-free) copy of the entire partition from a cloned disk, a disk image, or a backup. User data can be recovered by booting from a live CD, or putting the hard drive into another computer and booting from its operating system, taking great care not to infect the second computer by executing any infected programs on the original drive. Once the system has been restored, precautions must be taken to avoid reinfection from restored executable files. These recovery methods are relatively simple to do, usually remove any malware, and may be faster than disinfecting the computer—or reinstalling and reconfiguring the operating system and programs from scratch, then restoring user preferences.