blog




  • Essay / Solutions to Computer Viruses - 2603

    Solutions to Computer VirusesContentsI IntroII Components of Computer Virusesa.Versb.Trojan Horses.Logic BombsIII Types of Virusesa.Boot Sector Virusb.File Virusc.Macrovirusd.Multipartite Virus. Polymorphic virusf.Stealth virusIV How viruses worka.Virus introduced into the systemb.Trojan horse activatedc.Logic bomb activatedd.Destroying part of virus activatedV Most common virusesa.Jerusalem virusb.Cascading virusc.Brain virusd.Italian virus.Virus New ZealandVI Macro Virusa.What is it?b. How they workVII How to avoid virusesa.Remove floppy disks from the driveb.Do not use pirated softwarec.Back up datad.Periodically run a virus checking programVIII Antivirus softwarea.Why would you use?b.Antivirus scannerc.Types of software antivirusIn this growing technological world, there is a dependence on computer systems. With the widespread use of computer systems, there is a threat of short programs that damage the system and other programs on that system. These short programs are called computer viruses. There are many computer viruses that infect unsuspecting systems and programs. With these infection threats comes the ability to eradicate these viruses before they infect systems. There are programs called antivirus protection to help find and fix problems before they damage computer systems (Encyclopedia.com). Computer Virus and Components A computer virus can be defined as a malicious computer program, usually short in nature, designed to spread copies of itself to other computers and disrupt the normal functioning of computers. These viruses usually attach or insert themselves into or on a program or boot sector of a disk. It spreads via floppy disks, network or routine online services. Some viruses are harmless, but others can destroy or corrupt data and cause an operating system or application program to malfunction. The three most common types of destructive computer programs are Trojan horse, logic bomb and worm. “A virus is considered a worm with a logic bomb or Trojan horse” (PC Upgrade). Worms are programs that copy themselves. They create images of themselves in a file or a certain part of a disk. The main reason a worm is included in a virus is to spread the virus via a floppy disk. Now, every time you format or copy a disk, the worm will now infect your floppy disk. The Trojan is a program hidden inside another useful program. When the useful program is running, the Trojan does something like clearing your fat and directory. The last in this triangle is the bomb. The bomb is a piece of code embedded in a program or operating system that waits for a particular event to occur.