Damn It!!

Only available on StudyMode
  • Download(s) : 56
  • Published : February 22, 2013
Open Document
Text Preview
1. Computer Viruses
2. What is a Computer Viruses Computer Viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. 3. Why people create computer viruses Computer viruses do not come into existence spontaneously. They are deliberately created by programmers, or by people who use virus creation software. Virus writers can have various reasons for creating and spreading malware. Viruses have been written as research projects, pranks, vandalism , to attack the products of specific companies, to distribute political messages, and financial gain from identity theft , spyware , and cryptoviral extortion . Some virus writers consider their creations to be works of art, and see virus writing as a creative hobby. 4. When computer viruses created A program called " Elk Cloner " is credited with being the first computer virus to appear "in the wild" — that is, outside the single computer or lab where it was created. Written in 1982 by Richard Skrenta , it attached itself to the Apple DOS 3.3 operating system and spread by floppy disk . This virus was originally a joke, created by the high school student and put onto a game. The disk could only be used 49 times. 5. Ways of computer viruses enter your computer Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. 6. How to protect your computer from computer viruses Only open e-mail attachments received from sources you trust and that you are expecting. Back up your hard drive files frequently and maintain multiple backup sets. If...
tracking img