Preview

Truth and Lies About the Computer Virus

Good Essays
Open Document
Open Document
1169 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Truth and Lies About the Computer Virus
Truth and Lies About the Computer Virus

Walk into any computer store today and there will be at least twenty or thirty computer virus programs. From the looks of it computer viruses have gotten out of hand and so has the business of stopping it. The computer user must cut through the media hype of apocoliptic viruses and shareware programs and discover the real facts. Before we even start the journey of exploring the computer virus we must first eliminate all the "fluff." The computer user needs to understand how information about viruses reaches the public. Someone creates the virus and then infects at least one computer. The virus crashes or ruins the infected computer. A anti-virus company obtains a copy of the virus and studies it. The anti-virus company makes an "unbiased" decision about the virus and then disclose their findings to the public. The problem with the current system is that there are no checks and balances. If the anti-virus company wants to make viruses seem worse all they have to do is distort the truth. There is no organization that certifies wheather or not a virus is real. Even more potentially harmful is that the anti-virus companies could write viruses in order to sell their programs. Software companies have and do distort the truth about viruses. "Antivirus firms tend to count even the most insignificant variations of viruses for advertising purposes. When the Marijuana virus first appeared, for example, it contained the word "legalise," but a miscreant later modified it to read "legalize." Any program which detects the original virus can detect the version with one letter changed -- but antivirus companies often count them as "two" viruses. These obscure differentiations quickly add up." http://www.kumite.com/myths/myth005.htm Incidentally the Marijuana virus is also called the "Stoned" virus there by making it yet another on the list of viruses that companies protect your computer against. I went to the McAfee

You May Also Find These Documents Helpful

  • Satisfactory Essays

    There can be least denial the fact that computer viruses can prove to be a lot more deadly in nature and the statement holds all the valid for a threat similar to Ransom: Win32/VenusLocker.A. The reason as to why; the same is considered to be one of the most severe forms of threats developed is simply because it holds the sheer ability of inflicting havoc and carrying out other forms of nefarious activities including - disabling, stealing, damaging, or destroying computer and information…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    To demonstrate that a particular type of virus can be written or created, some virus writers create “proof of concept” viruses that do not cause…

    • 546 Words
    • 3 Pages
    Good Essays
  • Better Essays

    * User education in awareness, safe computing practices, indicators of malicious code, and response actions.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Good Essays

    Virus Quiz

    • 602 Words
    • 3 Pages

    A virus may not kill a host cell but may become inactive for a period…

    • 602 Words
    • 3 Pages
    Good Essays
  • Good Essays

    After a close examination of the journal article “The Unconstitutionality of the Computer Fraud and Abuse Act”, Michael C. Mikulic addressed the following points:…

    • 1035 Words
    • 5 Pages
    Good Essays
  • Best Essays

    The Sarbanes-Oxley Act

    • 2729 Words
    • 11 Pages

    The missing of a formal acceptable use policy (AUP) did not give user or management a guideline on the day-to-day activities. The incident involving Laura requesting trial software without getting proper security review and authorization shows the lack of security awareness and proper request for exception procedure. According a report from Ernst & Young, over 75% of security breaches are caused by activities by internal users (H. M. P. S. & Wijayanayake, 2009). Misuse of computer resources in work place not only reduced productivities but also bring additional risk to company’s reputation. Activities like surfing the web and participating in social networking sites might bring questionable contents to the work place. These contents can be seen as a form of sexual harassment. The Melissa virus, founded in 1999, was originally planted in an alt.sex Usenet newsgroup message. The billions of dollars of productivity lost and the negative publicity can tarnish the image and the business of Firion. Without a formal review on software request, the IT security organization will not be able to design a security solution to cover the user base. This gap will allow both internal and external intruders to plant software or Trojan to disrupt services or stealing…

    • 2729 Words
    • 11 Pages
    Best Essays
  • Good Essays

    These technological advancements are often very overwhelming and major sources of distraction. For example, Source G is a political cartoon created by Paul Noth that portrays a man in a lab coat at a desktop with a tab open that says “The Internet wants to destroy your productivity” with a button underneath labeled “always allow” This cartoon helps to highlight how the exponential freedom the internet provides can easily lead us to get distracted and stray away from…

    • 527 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Because of virus’s parasitic characteristics, or the fact that they depend on host cells to “come alive,” viruses may be viewed as having a certain potential for life, which can be destroyed, but they cannot reach a more independent state of being. Viruses are not by themselves alive; however, they verge on life.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Computer Misuse Act 1990 has raised concerns among privacy supporters and those who believe in limiting government authority on daily life and behaviour. However, the Computer Misuse Act has served as a model for computer crime legislation in other Commonwealth countries.…

    • 1135 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Virus is a kind of code created by human that can damage the whole system once it is been opened, and the trick that hackers use is that they send the virus in different way such as “junk email, pop-ups web pages or games. As soon as the user clicks on that particular email or pop-up the virus codes starts doing their job which is to damage the system by destroying files and other objects.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Study Guide for Business Law

    • 2585 Words
    • 11 Pages

    Policy makers, users, and posters are all concerned about the degree to which we need to impose the force of law on Internet activities.…

    • 2585 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    okay to use technology every once in a while, but people should really limit their usage. It’s…

    • 1214 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Rtyn

    • 5264 Words
    • 22 Pages

    _______, Lucas D. Introna, Deborah G. Johnson, and Helen Nissenbaum (1999). "Editorial," Ethics and Information Technology, Vol. 1, No. 1, 1–3.…

    • 5264 Words
    • 22 Pages
    Better Essays
  • Good Essays

    For years, scientists debated whether or not viruses are living organisms. The most confusing thing about viruses is that they display characteristics of both living and nonliving beings (Lourerio, 2006). Even after years of research and argument, we have not come to a final conclusion to this mind boggling question: Are viruses alive?…

    • 742 Words
    • 3 Pages
    Good Essays

Related Topics