Friday, January 4, 2019
What are computer viruses and how do they work?
A computing device estimator computer computer computer virus is nothing but a weapons platformme that is built to infect most other programs by making certain changes in that programme that render it unable to happen upon its designated function.During this procedure of infection, the virus too self perpetuates, in that it makes many a(prenominal) copies of itself, so that it brush aside then further infect other programmes, much homogeneous the viral infections that affect human beings.Surprisingly, there is so much similarity between the tow, in that during the replication process the copies atomic number 18 make exactly like the original, with no posttranslational modifications.Depending on what the virus was created to do, it can either rub out the programmes it infects, or it can make it on the whole useless, and whitethorn itself turn it into an infecting programme also.Major categories of viruses ar1 parasitic virus these atomic number 18 the most normal f orm of virus, it attaches itself to executable files and replicates when the infected program is executed.2 Memory-resident virus this virus attacks the main hive up memory of the dodge, and gains access to all(prenominal) the programmes that ar executed.3 Boot sector virus this virus infects the boot segment, and then infects all the files that are executed from the disc4 Stealth virus like the stealth machine, is virtually immune from anti virus softwares5 Polymorphic virus afterward each infection, the virus changes its character, thus making scouring or treatment in truth difficult6 Metamorphic virus unlike the previous, the virus completely changes itself after every infection. .In the lifespan of the virus, a number of legs have been determine that allow the identification and possible clean up of the virus.1 Dormant build virus is not attacking in this phase. It waits for a ad hoc trigger for which it has been programmed. It may be a particular date or a specific p rogramme that is required. These are specific viruses, while not all viruses have been programmed to follow this phase2 Propagation phase virus makes multiple copies of itself to infect many files at the same time. Thus the virus may enter the files or the system areas itself.3 Triggering phase the virus gets its signal to wrick activated. Having received its signal, it then assumes a seat from which it can attack easily.4 Execution phase this is the final tone of voice, when the virus actually performs the step it was made to do. Thus the virus may delete the file, make the programme corrupt, make multiple copies of itself, or whatever it was programmed to perform.Viruses are operating system specific and some even only attack specific hardwares. For example the linux operating system has not yet faced a virus attack, while the microsoft system is continuously bat many virus attacks, even the orchard apple tree OS is not immune from these attacksAnother identity is a worm. Thi s is a program that can replicate itself (like a virus), but it has the supererogatory ability to send copies from one computer to another computer across intercommunicate connections, via e-mails or VPN systemsReferances1 Heidari M. Malicious Codes in Depth. Accessed from www.securitydocs.com. on 13 June, 20082 Brain M. How computer viruses worl. Accessed from www.howstuffworks.com/virus.htm on 13 June, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment