This website uses cookies to ensure you have the best experience. Learn more

Love Bug Virus Essay

984 words - 4 pages

To create a virus, a user or attacker needs to create a code. In this code the attacker needs to express what type of virus, he/ or she wants to use. Once the attacker determines what type of virus is going to be used, then they must determine who they want to attack. Lastly, ask what type of data they want to gain from the attack. People write computer viruses. The person has to write the code, test it to make sure it spreads properly and then release it. A person also designs the virus's attack phase, whether it's a silly message or the destruction of a hard disk. .
There are at least four reasons why this is done. The first is the same psychology that drives vandals and arsonists. For ...view middle of the document...

Destroying everything on a person's hard disk is real damage. Forcing a large company to waste thousands of hours cleaning up after a virus attack is real damage. Even a silly message is real damage because someone has to waste time getting rid of it. For this reason, the legal system continues to develop more rigorous penalties for people who create viruses.
Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person.
Unlike a cell, a virus has no way to reproduce by itself. Instead, a biological virus must inject its DNA into a cell. The viral DNA then uses the cell's existing machinery to reproduce itself. In some cases, the cell fills with new viral particles until it bursts, releasing the virus. In other cases, the new virus particles bud off the cell one at a time, and the cell remains alive.
Similar to the way a biological virus must hitch a ride on a cell, a computer virus must piggyback on top of some other program or document in order to launch. Once a computer virus is running, it can infect other programs or documents. The is the analogy between computer and biological viruses.
It is important that antivirus software needs to be update. Types of Viruses: boot sector – sits in the boot sector of hard drive, begins as soon as the machine is booted up. Both MAC and windows can be infected. Program viruses – the virus is embedded into an application, and whenever that application is started the virus spreads. Script Virus – not commonly seen, but is normally found in the java script. Marco virus – commonly affected Microsoft Office, and once any program was ran, the virus attacked the operating systems.
Worms is also a type of malware and replicates itself, as long as your computer is...

Other Papers Like Love Bug Virus

Contingency Planning Essay

4506 words - 19 pages . A bug or glitch may results in hundreds of thousands pounds in lost sales or goodwill. Effective risk management is cyclical in nature. Identifying a risk is only one part of the process. It is also necessary to establish the likelihood or frequency of a risk, as well as its potential impact. The process of risk management requires constant vigilance and careful study. Once a risk is fully understood, it is then possible to develop a

Soc101 Chapter 16 Essay

4759 words - 20 pages REF: Pages 493–494 OBJ: The Global Risk Society (V.D.ii) NOT: Factual 53. When computer specialists speak about the “love bug,” they are referring to: a. the phenomenal international sales of the reintroduced Volkswagen beetle b. the mass wedding of hundreds of couples performed via the Internet by Reverend Sun Myung Moon of the Unification Church c. the upsurge in online orders for flowers during February for Valentine’s Day and during

Principles Of Information Security

3291 words - 14 pages .” Accessed 1 March 2010 from www.murphys-laws.com/. 28. Wolfe, Alexander “Intel Preps Plan to Bust Bugs in Pentium MPUs.” Electronic Engineering Times no. 960 (June 1997): p. 1. 29. Taylor, Roger. “Intel to Launch New Chip Despite Bug Reports.” Financial Times (London), no. 25 (June 1998), p. 52. 30. Trusecure. “Trusecure Successfully Defends Customers Against Goner Virus.” Trusecure Online. 18 December 2001. Accessed 1 March 2010 from

Principles of Information Security

3241 words - 13 pages /. 28. Wolfe, Alexander “Intel Preps Plan to Bust Bugs in Pentium MPUs.” Electronic Engineering Times no. 960 (June 1997): p. 1. 29. Taylor, Roger. “Intel to Launch New Chip Despite Bug Reports.” Financial Times (London), no. 25 (June 1998), p. 52. 30. Trusecure. “Trusecure Successfully Defends Customers Against Goner Virus.” Trusecure Online. 18 December 2001. Accessed 1 March 2010 from www.findarticles.com/ p/articles/mi_m0EIN

Computer System Security

3291 words - 14 pages .” Accessed 1 March 2010 from www.murphys-laws.com/. 28. Wolfe, Alexander “Intel Preps Plan to Bust Bugs in Pentium MPUs.” Electronic Engineering Times no. 960 (June 1997): p. 1. 29. Taylor, Roger. “Intel to Launch New Chip Despite Bug Reports.” Financial Times (London), no. 25 (June 1998), p. 52. 30. Trusecure. “Trusecure Successfully Defends Customers Against Goner Virus.” Trusecure Online. 18 December 2001. Accessed 1 March 2010 from

Freedom And Responsibility

2141 words - 9 pages Built within the Constitution of the United States are specifically defined freedoms that are guaranteed to all citizens. Conversely, with every constitutional freedom there comes a corresponding responsibility. On September 25, 1789, the state legislature’s twelve proposed amendments were transmitted by congress, the first two dealing with congressional representation and congressional pay. The following numbers three through twelve were

Hate Crime Laws

2348 words - 10 pages On June 7, 1998, 49-year-old James Byrd Jr. of Texas accepted a ride from three white men, who then beat him severely, urinated on him, chained him by his ankles to the back of their pick-up truck, dragged him for three miles into the countryside, and dumped his corpse in front of an African-American cemetery (Graczyk). A little over a year later, a jury sentenced ring leader John King to death by lethal injection (“Man Executed for Dragging

Rational Emotional Behavior Therapy Case Study Conceptualization And Treatment Plan

2140 words - 9 pages reevaluating the relationships with her family members following recent events due to her damnation tendency. Lega and Ellis (2001) explain that “damnation or global rating is the tendency to condemn a person based upon one or few of his/her traits or behaviors” (p. 203). Sarah is condemning her grandparents and father based on their lack of unconditional love toward her half brother that was conceived out of wedlock and consequently not recognized as a

Holidays In Albania

1636 words - 7 pages moonlight. In addition to that, Vlora’s seaside is the place where the two seas (Adriatic and Ion) are separated and mixed at the same time. The most wonderful part of Vlora is a place called The Cold Water. Seth Kugel describes diving “into crystal blue water” of one of Vlora’s villages as one of his “top travel moments.” All my friends and relatives love this coastal city. People sunbathe all day long and have fun in the amazing nightclubs in the

A Heart Of Darkness

1748 words - 7 pages In this short story, there are frequent significant subject and ideas that make the story, "A Heart of Darkness," by Joseph Conrad, and haunting novel. The main theme is absolute white power over the natives. The theme validates the corruption, and the dependence caused by the white people as they took over the Congo. White men were giving all the power; they had no self-control, and in the end they did not use wisely. The white men became

The Aspects Of Vulnerability Among The Exploited In Medical Research

2287 words - 10 pages every patient and staff of the institution. The nature of the disease needed to be observed in order to protect the children; even though it was the children that would be intentionally harmed. Since the virus had never been grown in a laboratory, the only option left at that point was to have it exist in live subjects. Many of the residents of Willowbrook were bound to be infected by the virus, seeing as though there was a progressive

Related Essays

Cyber Crimes Essay

1489 words - 6 pages extend beyond national borders. For this reason the advent of computer crime have made the global community smaller. What one hacker does on his computer in another country affects you and I. This can be seen with the recent virus "Love bug", this virus disabled computer systems world-wide (Washington Times, 5/18/2000). Yet, because of the quickly advancing computer technology a cultural lag has been created. A cultural lag is a gap between the

Stage Setter Essay

1815 words - 8 pages divided, at least two people were in charge, the United States and the Soviet Union” (Impact, 2). Today, he asserts, we reach for the Internet, though it may progressively connect us all; however, no one is in charge. Nothing proved this point more than the infamous Love Bug virus, which allowed two college graduates to “melt down ten million computers and ten billion dollars in data. The love bug virus was to the age of globalization what the

Secutiry In Informatics Essay

5428 words - 22 pages ataşamente. Melissa se împrăştie mult mai rapid decât alţi viruşi anteriori, infectând cam 1 milion de calculatoare. * "Bubble Boy" este primul virus care nu mai depinde de deschiderea ataşamentului pentru a se executa. De îndată ce utilizatorul deschide programul de e-mail, Bubble Boy se şi activează. * 2000 "Love Bug", cunoscut şi sub numele de ILOVEYOU, se răspândeşte prin Outlook, asemănător modului de răspândire al Melissei. Acest virus e

Session Hijacking Essay

4514 words - 19 pages shifting of charges is successful when contrasted with the host servers that just has the ability of the completely permit server to communicate with different servers/clients or thoroughly deny the administration (Bharti et al., 2013). 2.3.3 Virus Detection Applications Now and again one peruses of vindictive bugs and infections like Melissa and Love Bug that keep running in email script and focus on the clients by entering their frameworks and wreck