This essay Computer Viruses has a total of 468 words and 3 pages.
A computer virus is an illegal and potentially damaging computer program designed to infect other
software by attaching itself to any software it contacts. In many cases, virus programs are designed to
damage computer systems maliciously by destroying or corrupting data. If the infected software is
transferred to or accessed by another computer system, the virus spreads to the other system. Viruses have
become a serious problem in recent years, and currently, thousands of known virus programs exist (Reed
Three types of viruses are boot sector virus, file virus, and Trojan horse virus. A boot sector virus
infects the boot program used to start the system. When the infected boot program executes, the virus is
loaded into the computers memory. Once a virus is in a memory, it can spread to any floppy disk inserted
into the computer. A file virus inserts virus code into program files. The virus then spreads to any program
that accesses the infected file. A Trojan horse virus (named after a Greek myth) hides within or is designed
to look like a legitimate program.
Some viruses interrupt processing by freezing a computer system temporarily and then displaying
sounds or messages. Other viruses contain time bombs or logic bombs. A time bomb is a program that
performs an activity on a particular date. A logic bomb is a program that performs an activity when a
certain action occurs, such as an employee being terminated. A worm, which is similar to a virus, copies
itself repeatedly until no memory or disc space remains.
To detect computer viruses, antivirus programs have been developed. Besides detecting viruses,
antivirus programs also have utilities to remove or repair infected programs and files. Some damaged files
cannot be repaired and must be replaced with uninfected backup files. The table below outlines some
techniques used to protect computer systems.
Techniques for Virus Protection and System Backup
Using Virus Protection Software Backing up Your System
Install virus protection software on every computer system. Develop a regular plan for copying and
storing important data and program files.
Before use, scan every floppy disk with a virus scan program to check for viruses. Implement a
backup plan and adhere to its guidelines.
Check all programs downloaded from the Internet or bulletin boards for viruses. Keep backup copies of
files in fireproof safes or vaults off-site.
If your system becomes virus infected and you have questions, contact the National Computer Security
Association (NCSA) for low-cost assistance (Elmhurst, 6 Nov. 1998).
Chambers, Anita R., and Zachary W. Peters. "Protecting Against Virus Attacks."Computers May
Elmhurst, Mark. "Virus Infection: Where to Obtain Assistance"Word 97, Project 3.
http://www.scsite.com/wd97/pr3.htm (6 Nov. 1998).
Reed, Margaret E. An Introduction to Using Computers. Chicago: West Davidson Jones
Publishing Company, 1998.
Topics Related to Computer Viruses
Computer viruses, Internet security, Antivirus software, SCA, Comparison of computer viruses, Multipartite virus
Essays Related to Computer Viruses
Computer VirusesComputerViruses A computer virus is an illegal and potentially damaging computer program designed to infect other software by attaching itself to any software it contacts. In many cases, virus programs are designed to damage computer systems maliciously by destroying or corrupting data. If the infected software is transferred to or accessed by another computer system, the virus spreads to the other system. Viruses have become a serious problem in recent years, and currently, thousands of known
MononucleosisMononucleosis Mononucleosis, also known as Mono, is an illness caused by an infection with a virus. The virus, The Epstein-Barr Virus (EBV) is usually the cause of Mono. Other infectious viruses, like cytomegalovirus (CMV) can also produce illnesses like Mono. Most of the people who get Mono are adolescents and young adults. In developed nations, the majority of the people has been exposed to the Epstein- Barr virus by the age of 18. That means that many adults have had infections as children
Computer Crimes on the InternetComputer Crimes on the Internet Thesis: Emerging with the Internet, a group of elite cyber-surfers have turned into todayís computer hackers. Software piracy is a major crime on the Net. $7.5 billion of American Software is stolen each year. Industrial Espionage is gaining access to remote sites illegally. Stealing of information from corporate sites is extremely illegal. Password Sniffers are used to get someoneís password. IP spoofers changes your identity. Many things can be stolen from compa
The InternetThe Internet Abstract The Internet is a source of more information then most of us know. In this report I highlight some of my favorite things. Also, I highlight some of the things that we as users and buyers need to be cautious of before using. What is the Internet? What comes to a your mind when they think of the Internet? Well, I will tell you what used to come to my mind. When I thought of the Internet, I thought of x-rated Web pages and chat rooms. I envisioned a medium that was so full of
AIDS: Is it a Modern Plague? AIDS: Is it a Modern Plague? Donna Kundu In some parts of the world there are still wars being fought and dictators in power. There are societies which consider themselves at the peak of evolution and progress. They are able to create state of the art automobiles, luxurious homes, efficient and organized industries, complex computerized machinery and atomic weapons. Many societies are governed by a democratic system which herald a belief in freedom. All societies, regardless of their political
Human Immunodeficiency VirusHuman Immunodeficiency Virus The topic of this paper is the human immunodeficiency virus, HIV, and whether or not mutations undergone by the virus allow it to survive in the immune system. The cost of treating all persons with AIDS in 1993 in the United States was $7.8 billion, and it is estimated that 20,000 new cases of AIDS are reported every 3 months to the CDC. This question dealing with how HIV survives in the immune system is of critical importance, not only in the search for a cure for t
Genetic Engineering, history and futureGenetic Engineering, history and future Altering the Face of Science Science is a creature that continues to evolve at a much higher rate than the beings that gave it birth. The transformation time from tree-shrew, to ape, to human far exceeds the time from analytical engine, to calculator, to computer. But science, in the past, has always remained distant. It has allowed for advances in production, transportation, and even entertainment, but never in history will science be able to so deeply af
Title of Paper : Software Piracy : A Worldwide ProTitle of Paper : Software Piracy : A Worldwide Problem Grade Received on Report : 98 Software Piracy: A Worldwide Problem Software piracy is defined as the illegal copying of software for commercial or personal gain. Software companies have tried many methods to prevent piracy, with varying degrees of success. Several agencies like the Software Publishers Association and the Business Software Alliance have been formed to combat both worldwide and domestic piracy. Software piracy is an unresolved