This website uses cookies to ensure you have the best experience. Learn more

Virus Technology Essay

5567 words - 23 pages

VIRUS TECHNOLOGY

 
view Presentation

 
The term virus is as old as hills are now in the world of computer technologies. A virus basically is software that is made to run automatically usually used for destructive purpose by the computer experts. Though virus is a well known but not known well.
Definition :
A computer virus is a coded program that is written in Assembly or a system programming language such as ‘C’ to deliberately gain entry into a host system and modify existing programs and/or perform a series of action, without user consent.
 
 
In this paper we would like to throw light on some of the unturned stones of the world of virus. We would start from history of the ...view middle of the document...

In just over a decade, most of us have been familiar with the term computer virus. Even those of us who don’t know how to use a computer have heard about viruses through Hollywood films such as Independence Day or Hackers (though Hollywood’s depiction of viruses is usually highly inaccurate). International magazines and newspapers regularly have virus-scares as leading stories. There is no doubt that our culture is fascinated by the potential danger of these viruses.
Many people believe the worst a virus can do is format your hard disk. In fact, this type of payload is now harmless for those of us who back up our important data. Much more destructive viruses are those which subtly corrupt data. Consider, for example, the effects of a virus that randomly changes numbers in spreadsheet applications by plus or minus 10% at a stockbroker. Other nasty viruses post company confidential documents in your own name to some of the atlases Internet newsgroups, an act, which can both, ruin your reputation and the company’s confidentiality.
Despite our awareness of computer viruses, how many of us can define what one is, or how it infects computers? This paper aims to demystify the basics of computer viruses, summarizing what they are, how they attack and what we can do to protect ourselves against them.
DEFINITION:-
“A computer virus is a coded program that is written in Assembly or a System programming language such as ‘C’ to deliberately gain entry into a host system and modify existing programs and/or perform a series of action, without user consent. In addition, a virus is designed to replicate copies of itself in order to spread the infection widely among other uninfected programs and systems.”
A virus is nothing more than a program. A virus is a serious problem for everyone in the information technology industry. Viruses range from the harmless programs displaying a character on your screen to the malicious codes which go on to format your entire hard-disk.
Just like a biological virus that takes over a living cell, a computer virus containing a set of coded instructions, also invades a host system and tries to replicate and infect new hosts. A sophisticated virus can spread undetected for a long time, waiting for a signal to begin destroying or altering data. A signal can be in the form of date, or a change in a system resource data, etc.
The difference between a computer virus and other programs is that viruses are designed to self-replicate (that is to say, make copies of themselves). They usually self-replicate without the knowledge of the user. Viruses often contain ‘payloads’, actions that the virus carries out separately from replication. Payloads can vary from the annoying (for example, the WM97/Class-D virus, which repeatedly displays messages such as “I think ‘username’ is a big stupid jerk”), to the disastrous (for example, the CIH virus, which attempts to overwrite the Flash BIOS, which can cause irreparable damage to certain...

Other Papers Like Virus Technology

Computer Science Essay

1621 words - 7 pages technology observers and national security, the emergence of this worm is a risk that threatens or causes harms many activities that are deemed critical to the functioning of the modern society (Theohary, Rollins & Paul, 1). The virus did not affect the functioning of a windows computer performance because it was designed to affect some specific models of programmable logic controllers. Some of the targeted computers were those that were made by

Open Problems In Computer Virus Research

6039 words - 25 pages when and why computer viruses spread. Techniques have been developed to help us estimate the safety and effectiveness of anti-virus technology before it is deployed. Technology for dealing with known viruses has been very successful, and is being extended to deal with previously unknown viruses automatically. Yet there are still important research problems, the solution to any of which significantly improve our ability to deal with the virus

Kg English 2010 Final

3300 words - 14 pages seems like progress on the governments part, unfortunately, it doesn't seem to be enough for the National Institute of Health to sanction the research for ways to stop the virus in relation to cancer. In 1989 a young researcher named Daniel J.Bergsagel at the Cancer Institute in Boston, made the first major breakthrough in finding SV40 in human brain tumor tissue, using a brand new form of research technology called polymerase chain reaction, or

Gene Therapy

583 words - 3 pages expression of a persons genes. However, there are factors that prevent the absolute success of this procedure, but scientists are continuing to work to find cures for genetic disorders and with technology improving will eventual have absolute success. Gene Therapy is a novel approach to treat, cure, or ultimately prevent diseases caused by a persons genes. Gene Therapy can either be targeted to somatic (body) or germ (egg and sperm) cells. In

Common Forms of Attacks on Microsoft Systems

600 words - 3 pages COMMON FORMS OF ATTACKS ON MICROSOFT SYSTEMS Corey Slate ISSC342 Professor Peter Mylonakos American Public University July 13, 2014 COMMON FORMS OF ATTACKS ON MICROSOFT SYSTEMS Ever since the Microsoft Company was founded in 1975, they have been working in the computer industry with one mission on their minds. The ability to enable people and businesses throughout the world to realize their full potential by creating technology that

Cybercrime

1195 words - 5 pages is a good way to protect identity information. Due to the increase in cyber terrorism, the hacking into or crashing of official websites, government officials and Information Technology security experts have recently achieved a significant improvement of critical systems, in order to better protect information sensitive sites. “Many of the attacks are serious and costly. The recent ILOVEYOU virus and variants, for example, was estimated to have

Cyber-Crime

1335 words - 6 pages , and often, not being entirely clearly illegal. A cyber crime that was committed recently is the “Gozi” virus that infected a million computers including NASA computers and bank computers. The Gozi virus is also known as a Trojan. It infiltrated businesses the way a wooden horse rolled into Troy. The wooden horses, in this case, are the employees of businesses who click on suspicious links in an e-mail, or fail to recognize a phony banking

Evolution of New and Old Disease

1735 words - 7 pages it spread to various countries in Europe, North America and South America before it was declared as SARS 2003 global outbreak (Centers for Disease Control and Prevention, 2004). SARS is an acute respiratory tract illness caused by an infectious virus transmitted from person to person. Various pathogens that cause acute respiratory diseases are respiratory syncytical virus, parainfluenza virus, influenza virus and severe acute respiratory

Stuxnet Virus

1219 words - 5 pages Stuxnet Virus According to counterterrorism czar Richard Clarke, Stuxnet was a weaponized malware computer worm. Stuxnet was launched in mid-2009, it did major damage to Iran’s nuclear program in 2010 and then spread to computers all over the world (Clarke, 2012). Type of Breach The Stuxnet is a computer worm, “it is a digital ghost with countless lines of code… it was able to worm its way into Iran’s nuclear fuel enrichment facility in

Attack Prevention Paper

969 words - 4 pages which is based on technology. The secret to avoiding this kind of attack is in the applications and programs which one uses for protection which identifies and informs the user that an attack is certain generally known as Cyber Warfare. As stated in the 1st explanation. However dependence and reliance aren't the only items which technology provides. Or an effort to monitor the online moves of people without their permission as the sophistication of

Data And Privacy

2289 words - 10 pages -92/SP800-92.pdf Norton, P. (2001). Introduction to Computers, Fourth Edition. Singapore: McGraw-Hill. Shelly, Cashman, & Vermaat. (2005). Discovering Computers 2005. Boston: Thomson Course Technology. TechiesGuide. (2011). How does a Computer Virus Work . Retrieved July 13, 2011, from http://www.techiesguide.com/how-does-a-computer-virus-work.html

Related Essays

Prophylactic Hepatitis B Virus Vaccines Market : Global Industry Analysis And Forecast 2016 2024

1004 words - 5 pages Prophylactic Hepatitis B Virus Vaccines Market : Global Industry Analysis and Forecast 2016 - 2024 Persistence Market Research Prophylactic Hepatitis B Virus Vaccines Market : Global Industry Analysis and Forecast 2016 - 2024 Persistence Market Research 1 Prophylactic Hepatitis B Virus Vaccines Market : Global Industry Analysis and Forecast 2016 - 2024 Persistence Market Research Released New Market Report on “Prophylactic Hepatitis B

History Pf Malware Essay

1068 words - 5 pages displays a message from time to time. In December, a well-meaning American student crippled e-mail communication and networks worldwide with the first computer worm. The "Christmas tree" worm draws a Christmas tree on the screen while in the background, it sends itself to all the e-mail addresses it can find on the system. in "c't" (German computer technology magazine), an article appears about computer viruses for the Atari ST, in which a source code listing is also printed. The virus can easily be adapted by the non-specialist. The subsequent wave of new viruses triggers a discussion about the publication of virus source codes.

Computer Viruses Essay

1614 words - 7 pages produces only a slight clicking noise once a month, overwrites one disk directory sector in a way that is harmless to older PCs but lethal to newer ones that arrange disk information differently. Antivirus Technology. Antiviral software has existed since shortly after computer viruses first appeared. Generic virus-detection programs can monitor a computer system for virus like behaviour (such as modification of certain crucial files or parts of

All About Computer Viruses Essay

2346 words - 10 pages , Answers Corporation (2008), All Rights Reserved, Retrieved October 2008 from http://www.answers.com/topic/computer-virusQUT | ITS | Virus & Spyware Protection | Types of Viruses, Retrieved October 2008 from http://www.its.qut.edu.au/virus/types.jspComputer Virus FAQ for New Users, Retrieved October 2008 from http://www.faqs.org/faqs/computer-virus/new-users/Protecting your computer from viruses, UW Technology, Retrieved November 2008, from http