Top-Rated Free Essay
Preview

Virus Essay

Satisfactory Essays
437 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Virus Essay
1. What is a Virus?
A computer virus is a program that can copy itself and infect a computer without the user knowing. Some viruses are made to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but replicate themselves and perhaps make their presence known by displaying text, video, or audio messages. Even these benign viruses can create problems for the computer. They usually take up computer memory used by other programs. As a result, they often cause crazy behavior and can result in system crashes. Also many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.

2. What is Anti-Virus Software?
Antivirus software is a computer program that trys to identify, stop and remove computer viruses and other malicious software like trojan horses.

Antivirus software usually uses two different techniques to accomplish this:
• Scanning files to look for viruses matching definitions in the virus dictionary
• Identifying suspicious behavior from any computer program which might show infection. Such analysis may include data captures, port monitoring and other methods.

3. Name 3 viruses and explain what they do
Trojan horse is a program that unlike a virus, contains or installs a malicious program (sometimes called the payload or 'trojan') while disguising itself as being something else. Trojan horses may appear to be useful or interesting programs to an unsuspecting user, but are harmful when executed.

Computer worm is a self-replicating computer program. It uses a network to send copies of itself to other computers in the network and it may do so without any user help. Unlike a virus, it doesn’t need to attach itself to another program.

Elk Cloner is the first known computer virus that has spread outside the computer system or lab where it was made. It was written around 1982 by a 15-year-old high school student named Rich Skrenta for Apple II systems. Elk Cloner spread by infecting the Apple II's operating system, stored on floppy disks. When the computer was booted from an infected floppy disk, a copy of the virus would start.

4. Identify some safe computing practices to prevent getting a virus
There are many safe comuter practises that can be used to minimize the risk of getting infected by a virus, the main thing you should do is to keep your anti virus software up to date to the latest patch. Another way you can prevent getting a virus is to scan any program that you download from the internet before you open it.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Why is it recommended to do an anti-virus signature file update before performing an anti-virus scan on…

    • 1020 Words
    • 6 Pages
    Satisfactory Essays
  • Better Essays

    Computer program that can copy itself and infect a computer. The term ‘computer virus’ is sometimes used as a catch-all phrase to include all types of malware, including true viruses.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    * This worm spreads itself by sending an instant message to people in your contact list. When they receive the connection the worm establishes a connection to the remote computer to move itself on the clean remote computer.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Good Essays

    When it comes to viruses and the types that get put onto your computer there are many of them. For example: the Trojan Horse, it is put into your computer by saying it is good for file converting or cleaning a system out, when it is really putting bad programs into your computer along with spyware and other potentially harmful programs. Just like when you go into your email and you see an…

    • 783 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Virus is a kind of code created by human that can damage the whole system once it is been opened, and the trick that hackers use is that they send the virus in different way such as “junk email, pop-ups web pages or games. As soon as the user clicks on that particular email or pop-up the virus codes starts doing their job which is to damage the system by destroying files and other objects.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    A virus has multiple meanings in our world but we are speaking in the terms of technology. A virus is something that has been put into the computer without the owners consent that is made to go through the information on the computer and take things from the computer without the owner's consent. There are many ways to prevent this from happening but with these preventions the person creating these viruses have created different forms of viruses to get around these defenses.…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab #9

    • 650 Words
    • 3 Pages

    1. When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is the first thing you should do to the workstation or system and why?…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 7 Ethical Hacking

    • 293 Words
    • 2 Pages

    It places the virus in a Virus Vault which is a quarantine area where all removed files, viruses go.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Computer Viruses of Today

    • 3397 Words
    • 14 Pages

    While the software is created to make our daily life and career easier, there also exits software, which sole purpose is to do harm and hinder the daily routine of ordinary users. Such programs are commonly referred to as viruses. Malicious programmers write computer viruses for various reasons. Some of virus-makers do it just for fun, others write viruses for personal gain, many do it for fame. Computer viruses are a big problem not only for those people who works with computers, but also for those people who depends on the companies which use computers as well.…

    • 3397 Words
    • 14 Pages
    Better Essays
  • Good Essays

    Top 20 Most Active Viruses

    • 2089 Words
    • 9 Pages

    • A virus that also has the characteristics of a worm. • It inserts its code in other files and programs. It has damaging effects on the affected computer. • It spreads and affects other computers by creating copies of itself. • It does not spread automatically using its own means. It needs the attacking user's intervention in order to reach the affected computer. The means of transmission used include, among others, floppy disks, CD-ROMs, email messages with attached files, Internet downloads, FTP, IRC channels, peer-to-peer (P2P) file sharing networks, etc.…

    • 2089 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Antivirus Programs

    • 299 Words
    • 2 Pages

    Methods that guarantee a computer or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus program, though, is an effective technique to safeguard your computer from loss.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Computer Virus

    • 1863 Words
    • 8 Pages

    In the following report, "computer viruses" will be explained in detail. A lengthy and informative description of the evolution and history on microcomputer viruses will be given, to give you a background of their origin for some understanding of how they came to be.…

    • 1863 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Ict Reviewer

    • 1061 Words
    • 5 Pages

    Laser Printer- A type of printer that uses the same quality as copy Machines having very high quality text and graphics.…

    • 1061 Words
    • 5 Pages
    Satisfactory Essays