Computer Support System

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 16 November 2011

Anatomy of Viruses

Posted on 17:12 by Unknown

What is a computer Virus and how do they work?
Viruses can create a technological holocaust for millions of computers around the world. Businesses fret over the potential for a catastrophic meltdown of networks. Individual consumers worry about zapping their computer's hard drive simply by clicking the wrong e-mail attachment. Experts say such worries are well-founded, but emphasize that a combination of the latest anti-virus software and common sense will drastically reduce the odds of being infected. The cost of not taking such precautions can be high.
How they work, and what to look for.
Dreaded computer viruses, you hear all about these nasty nasties, but do you really know what they are and what havoc they can wreak? The mere thought conjures up devastation and turmoil and can get your imagination rolling. Tall tales, such as the Good Times Virus and other hoaxes, have made it hard for most of us non-anti-virus researchers to determine fact from fiction.
The following description seeks to get to the bottom of just what viruses are, how to avoid infestation, how to determine if you've caught one, and what to do if you have.
In the simplest of terms, a virus is a computer program that reproduces itself and attaches that copy to other computer programs. It does so in such a way that its instructions (viral code) are carried forward when the infected program is launched or when an infected disk is left in the disk drive and allowed to boot. The most troubling part about this is that it is done without the consent or knowledge of the computer user.
Viruses can be as benign as a minor case of acne, such as those that display pleasant or annoying messages, or as malignant as a full spread disease, such as those that destroy your data files and system.
Rest assured, only a small percentage of viruses are of the latter type. In fact, there are nearly 20,000 known viruses for the PC (There are a lot less Mac viruses.) of which only 500 are currently "in the wild" (circulating on unsuspecting computers). Of that, only 20-50 are known to cause serious damage. For more information on the prevalence of viruses, visit http://www.virusbtn.com/WildLists.
All viruses follow pretty much the same course of action. When the virus code is run it reproduces and infects other programs. When it starts to spread is usually a characteristic of that particular virus. Some infect each time they are run. Other more tricky ones infect when triggered by a certain time, date, function, or other external event.
Then some have an attack phase, otherwise known as a "payload," associated with them. A payload is the damaging effect of the virus that runs the gamut from deleting files or randomly changing data on your disk to playing music or creating messages or animations on your screen. When the virus inflicts its damage is also characteristic of the particular virus.
But most delay doing so only until after they've had time to spread. Some are written to spread only which is bothersome as well because they take up space and slow down your system.
A graduate student at MIT, as part of a controlled experiment he was conducting, wrote the first virus in 1986. A year later, hackers caught on and began writing and spreading viruses. By 1990-1991 the number of viruses found in the wild started to flourish. There are several types of viruses: Boot Sector, File, Macro, Polymorphic, Stealth and Resident viruses. Some viruses can possess characteristics of more than one of these types.
"Many people will get a virus at one point or another, and some of them will be harmed by it," said Bruce Peters, a anti-virus and data recovery expert. "Some will lose data, some will suffer no damage other than the time, effort, and stress it takes to remove the virus. Some will spread the virus to others and damage the most valuable thing: their reputations."


Anatomy of a Virus
Though most computer users have learned to fear viruses, few really know what they are. Viruses are programs that replicate themselves inside a computer. The malicious bug cannot do its damage when a user simply surfs the Web or opens a plain text message such as an e-mail. However, viruses are unleashed when they are hidden in attachments to e-mail messages and someone opens that attachment. After viruses replicate, many carry out damaging instructions that have been programmed into them.
The Melissa virus from March 1999 is a good example of how viruses inflict damage. Melissa lurked inside an e-mail Microsoft Word attachment. The person who received the message had no reason to suspect anything dangerous; in fact, the e-mail's subject line appeared to be from someone the recipient recognized.
However, once the recipient clicked on the attachment, Melissa fused itself to a Word object and began rifling through the poor victim's address book. Soon, Melissa was e-mailing tainted attachments to the first 50 names in the recipients address book.
"Some viruses do nothing except replicate," Peters said. "Some will do damage, but not intentionally. Then again, there are those that attempt - and sometimes succeed - in destroying all files on the computer, or subtly altering data in documents, or whatever nasty thing you can conceive that a computer program is capable of doing."
To make matters worse, those who create viruses continually add new twists to their method of attack. Late in June, the Stages virus struck. Before Stages, computer users were assured that viruses could not be spread through text files. So, when Microsoft Outlook users saw an attachment that appeared as "LIFE_STAGES.TXT," many figured it was safe to open. When they did so, a humorous test file about dating appeared.
What users didn't realize was that the attachment was not a text file but had a hidden .SHS extension, which meant it contained infected computer code. Soon, the virus was on the loose and e-mailing itself to everyone in the recipient's address book.
Peters hopes the recent wave of high-profile viruses will cause lawmakers to treat the problem as the potentially serious crime that it is. However, he said the war on this scourge requires vigilance.
"Yes, we'll become more successful overall," he said. "But yes, things will get worse, too: my prediction is that while more viruses will be prevented on a percentage basis, there will always be a few high profile successes by the virus writers.
"Those successes, however, will be short-lived, because anti-virus companies will be quick to create a solution to each new threat."
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Anatomy Virus, Anti Virus, Definitions of Virus, Virus | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Clearing Hard Drive Space on Windows XP
    Windows XP was released way back in 2001, so what should you do when you’re running out of hard drive space for these 2009 programs? Clearin...
  • What to Look For When Purchasing a Mouse
    The mouse is probably the most essential part of many users experience with computers. Your mouse can affect the ease of browsing around the...
  • How To: Install Windows Mobile 6.5 Right Now
    The bad news:  Windows Mobile 6.5  won't be coming out for a while, and you'll be expected to buy a whole new phone to get it. The g...
  • Windows Explorer Keyboard Shortcut
    Windows Explorer keyboard shortcuts Press To END Display the bottom of the active window. HOME Display the top of the active window. NUM LOC...
  • Automate Windows Maintenance Tasks to Keep Your PC Running Like New
    With a Windows computer there are several maintenance tasks you should run on a regular basis, though most of us forget. Here’s how to autom...
  • Submit googleaddurl.com
    Google adds new sites to our index, and updates existing ones, every time we crawl the web. If you have a new URL, tell us about it here. We...
  • How to Delete Everything on Your Computer
    There are people who want to delete everything in their computer and want to start from scratch again. But the problem is that they do not k...
  • Blogspot vs Wordpress
    WordPress Vs. Blogger: Which Should You Choose for Your Professional Blog? You've made the decision to start a professional blog. Now yo...
  • How to make Elastomer (Botle)
    Material : A. Thermoplastic - Heated melt - Cooled → back to its original kesifat Example : Polyethylene , polypropylene , polyst...
  • Windows Keyboard Shortcut Overview
    General keyboard shortcuts Press To CTRL+C Copy. CTRL+X Cut. CTRL+V Paste. CTRL+Z Undo. DELETE Delete. SHIFT+DELETE Delete selected item per...

Categories

  • Access Media Collection
  • Add HTML facebook on site
  • addurl
  • Administration Tools
  • Adsense
  • Anatomy Virus
  • Animator
  • Anomymity
  • Anti Virus
  • Applications Install
  • BELAJAR PHOTOSHOP
  • Blog
  • Blufftop
  • CA-CLIPPER INTERNAL ERROR
  • Cannot Open Password
  • Celebs
  • Computer Desk
  • Computer Hang
  • Computer Icon
  • Computer Management
  • Computer Repair
  • Computer Set Up
  • Computer Tablet
  • Computer Touch Screen
  • Computer Troubleshooting
  • Cookies
  • Cookies Definitions
  • Crack
  • Create DVD
  • Create DVD Maker
  • Create PDF
  • Create PDF using Smart PDF Creator
  • D-Link
  • D-Link Router
  • Database Format
  • Definitions of Virus
  • Device
  • Device Manager
  • DNS
  • Doc Protect
  • Dongle USB
  • Drive partitions
  • Drive parts
  • Driver Printer HP
  • DVD compress
  • DVD Drive
  • Earn Money
  • Easy Gif Animator
  • Elastomer
  • Eror Format
  • Eror Solution
  • Error Computer
  • ERROR Solutions
  • Error windows explorer
  • External Hard Drive
  • Facebook
  • Facebook and Site
  • File Sharing
  • Football Game
  • Free Articles
  • Free Internet
  • Game Sport
  • Googel
  • Hack Password
  • Hard Drive
  • Hard Drive Partitioning
  • Healty
  • Help and Support
  • Help Support
  • Household Aplieance
  • How to
  • How to Download
  • HP Lapotop Reviews
  • Inside Adsense
  • intall
  • Intall Windows 7 Ultimates
  • Internet
  • Internet Browser
  • Internet Explore
  • Ipad
  • Java Programe
  • Java Script
  • JPEG JPG GIF PNG BMP
  • Keyboard
  • Keygen Smadav 8.7
  • Laptop
  • Laptop Computer Skin
  • Laptop vs PC
  • Life Style
  • Local Area Network
  • Maintanance and Repair
  • Make CD iso
  • Make DVD
  • Make Money with blog
  • Make Your Own Copy-Protected CD with Passive Protection
  • Messenger and Chat
  • Microsoft
  • Mobile Aplications
  • Mobile Phone
  • Modem
  • MotorSport
  • Ms Word Applications
  • MS Word to PDF
  • Ms Words
  • My Computer
  • Network Set Up
  • Networking
  • NVIDIA GeForce
  • Online Shoping
  • Operating System
  • Partitions drive
  • Password Wifi
  • PC Desktop
  • PDF EDITOR
  • PDF Remover
  • Photoshop
  • Picture
  • Prevent Windows XP
  • Print
  • Printer Error
  • Protect CD from Copy
  • Protect Password Folder
  • Protect Your Computer
  • Reboot Application
  • Remove Pasword Excel
  • Restore Windows Registry
  • Router
  • Search Engine Index
  • Search Engines Optimizer
  • Security
  • Security System
  • Shortcut
  • Smadav 8.7
  • Smart PDF Creator
  • Social Networking
  • software Protection
  • Solving Probelm
  • Startup Programs
  • SuperBike
  • System Registry
  • System Restore
  • Table Manager
  • Test DVD
  • Test DVD Drive
  • Troubleshooting all
  • Tutorial Java
  • TUTORIAL PHOTOSHOP
  • Upload File to blogger
  • Upload Files
  • USB Install
  • USB REMOVE
  • USB Repair
  • VGA Card
  • VGA Conector
  • VGA Informations
  • Virtual Memory is to Low
  • Virus
  • Viture Windows 7
  • Watermark
  • What is Cookies
  • Wifi
  • Wifi Pasword Finder
  • Win Pes2011
  • Windows
  • Windows Device
  • Windows DVD Maker
  • windows explorer cannot open
  • Windows Mobile
  • Wireless
  • Wireless router
  • Word Password Remover
  • words documents cannot open
  • Words error
  • XFBML and HTML Facebook

Blog Archive

  • ▼  2011 (70)
    • ▼  November (24)
      • Windows unable to connect to the select Network.
      • Cann't Access Account Yahoo?
      • Protect Folder Files
      • Unrecognized Database Format
      • Why should be NVDIA GeForce?
      • System Restore Windows 7
      • Anatomy of Viruses
      • What is Cookies?
      • Instalasi DosBox dan Windows di Ponsel Symbian
      • Household Appliance Manuals
      • How To: Install Windows Mobile 6.5 Right Now
      • USB device Unrecognized
      • Membuat File Image(iso file) Dari CD Atau DVD
      • Install Windows dengan USB DISK
      • USB Dongle Protection
      • How to Crack a Wi-Fi Network’s WEP Password with B...
      • Submit googleaddurl.com
      • Conected anther computer
      • System Restore Wizard
      • Keygen SmadAV 8.7 Full Version
      • Driver Printer HP D2666
      • Popular of computer Tablet
      • Melilea Greenfield Organic
      • Brenda Song Pregnant? Actress Parties Sans Baby Bu...
    • ►  September (3)
    • ►  August (2)
    • ►  May (1)
    • ►  April (24)
    • ►  March (15)
    • ►  January (1)
  • ►  2010 (168)
    • ►  December (6)
    • ►  November (4)
    • ►  October (124)
    • ►  September (8)
    • ►  August (3)
    • ►  July (2)
    • ►  March (2)
    • ►  February (2)
    • ►  January (17)
Powered by Blogger.

About Me

Unknown
View my complete profile