Monday, 16 April 2012

All About Computer Viruses

1. Method Works Computer Virus
A computer virus: A computer code which is able to "reproduce itself" that put part or all of the code in the file or application, and result in your computer do things that do not want.computer viruses is a common disease in the world modern technology. They can spread rapidly through the open computer networks like the Internet, and resulted in losses to billions of dollars in no time. Five years ago, the opportunity for a virus contracted during the period of 12 months is about 1 in 1000; now the comparison is increased dramatically to about 1 in 10. Vital statistics of the virus: · Viruses get into your system via e-mail, downloads, infected floppy disk, or (sometimes) by hacking. · From the definition, a virus must be able to "own culture" (aka make a clone or a copy of itself) to be spread. · Currently there are thousands of viruses, but few have been found "in the wild" (roaming, undetected, in the network) because most of the known viruses of laboratory born, which is a variant of the virus "wild" that is widely available in the world. · Consequences virus can range from annoying to extremely destructive, but even the simplest virus has a tendency to ruin because of a bug in their computer code (as virus programmer is careless or do have malicious intent). · antivirus software on the market today can detect almost all types of viruses exist, but should be updated regularly to maintain effectiveness. A virus is simply a computer program. As with other computer programs, in which there are instructions that can tell the computer to perform specific tasks. But in contrast to the application program, a computer virus is usually ordered you to do things that you really do not want, and can usually spread itself to existing files on your computer - and sometimes to other people's computers. When you lucky, a virus is at best only cause the computer to perform bizarre actions, such as causing your computer speakers sound "blip-blip-blip" at random. The most feared is a vicious virus that can cause all data on your hard drive is lost (by ordering the computer to format a hard drive), even a virus that can damage your computer hardware, such as the CIH virus that destroys your computer's motherboard BIOS.

2.How My Computer to Virus Affected?
Your computer can become infected with the virus when you copy a file that terinfeks into the computer, then activate the code of his body when an infected file is executed or opened. Maybe you do not feel menyalinkan infected file into your computer: Hey, the virus does not matter if they stick to the e-mail attachment, when you're downloading a file, or through a floppy disk that is often borrowed, lent. And now, with the increase in Internet users, the trend of the spread of the virus is through e-mail attachment. When you open an infected file or application, malicious code copies itself to a file on your system, then wait to send it - whatever the programmer designed it to be done on other people's computers. By simply removing the infected e-mail after you open the file attachment was not going to help, because the virus has already penetrated into your computer system before. A virus writer can set the time of virus attack, then and there, at a specific time or date, or when a particular command is executed, for example, when you order to save or close a file. Example: Michelangelo virus is programmed to release the code perusaknya every 6 March each year - which is the anniversary date of the General

3.type virus
 Nowadays many kinds of variations of the virus in circulation, most of which can be grouped into six general categories, each of which slightly different kind of how it works: · boot-sector viruses: replacing or inserting itself into the boot sector - an area on your hard drive (or any other disk) to be accessed when the computer is first turned on. This type of virus can hinder your computer to boot from the hard disk. · Virus file: infects applications. This virus to spread itself to execute the application and documents associated with it when the infected file is opened or executed. · Macro Virus: is written using a simplified macro programming language, and Microsoft Office applications, like Word and Excel, and is currently estimated 75 percent of this strain has spread across the world. A document infected with a macro virus generally modifies the existing command and widely used (like the "Save") to trigger its payload upon execution of that command. · Multipartite Virus: infects both files and boot sector - under the guise of a criminal ganda that can infect your system before it was captured by continuous antivirus scanner. · Polymorphic Virus: changes code whenever it passes on a different machine; theoretically this type of virus is more difficult to be detected by the antivirus scanner, but in reality this type of virus is not well written, so it's easy to know his whereabouts. · Stealth Virus: hides its presence by making an infected file not appear infected, but usually stand up to antivirus software.

4.All Evil Code (Malicious Code)
Virus is not one of perception wrong in the computer is bad electronic code, such as worms and Trojan horse applications is a type of virus. They are not viruses. Worms, Trojan horses and viruses in a large category of so-called analysts as a "malicious code". A worm will replicate itself and go into network connections to infect any machine on the network and then replicate itself again, taking up space and slow down hard disk computers and networks work. Even so, the worm does not modify or delete other files. A Trojan horse does not replicate itself, but he is in the form of a malicious program disguised as another format such as a screen saver or image files.When executed on your machine, a Trojan horse will take the information from your system - such as user names and passwords - or could allow a malicious hacker to take over your computer remotely (from a distance).

5.Software Antivirus Emergency Call Answering
The virus experts have indexed about 40,000 kinds of virus and its variants over the years, although only 200 species are currently active in the wilds of the computer. While most viruses are just annoying more and spend our time, of a kind very merusaklah very harmful to health [computer and your pocket]. Computer viruses have been around since 1960, since the beginning of the computer era, although the range in 1980 until they were mostly just specimens in the computer lab, created by researchers and released in a controlled environment to evaluate their effects. When the virus was first discovered on the surface in the 1980s, they spread very slowly, and move through "a network of smugglers": through floppy disks that are sold and shared between computers. But with the Internet and e-mail access to the accelerated spread of the virus. Two years ago, starting with the emergence of LoveLetter Melissa virus, the virus spread through e-mail continues to increase so that the ratio of ordinary computer users face virus was getting bigger. E-mail virus now occupy the top spot in which he accounted for 81 percent of the causes of a computer infected with viruses and can spread into the system in minutes.
6.Berlatih Computer Safely
best way to protect yourself [er, computer] you from the virus is if You have a connection to the Internet, do not open e-mail attachments from strangers, and avoid downloading from unknown sources. Resist the urge to double-click on the contents of your mailbox. And when you get a file attachment and you do not ask, ask the sender about the contents of attachments and how to use it before it opened. For security reasons, you need to install antivirus scanning software that is reliable and always download updates regularly. Major antivirus software vendors, like Symantec, Network Associates, Computer Associates, and Kaspersky Lab, provides a regular update service (as a record of Computer Associates InoculateIT antivirus software which is free). Some vendors also offer regular update services through their company Web site. Update on a regular basis is very important. The researchers from the Computer Economics estimates that 30 percent of small businesses are particularly vulnerable to the dangers of viruses and it is because they do not update their antivirus software regularly or they are not properly menginstalasikannya.

7.How Work Antivirus Software
 Antivirus software scans the contents of computer hard disk in two ways . If there are known viruses (ie viruses known to exist and antidotes have been found) then the software will look for the signature (sign) virus - is a unique string of bytes that identifies the virus virus program is like a fingerprint - and will throw from your system. Most scanning software does not just look for the early type virus, but also can search for variants of the virus, because the code of the virus signature is usually similar. In the case of a new virus that has not found its antidote, antivirus software will run a program that will search heuristic virus-like activity on your system. If the program is not right to see any symptoms, it will quarantine the troubled program and will display a warning message to you about what will be done by the program (eg change your Windows registry). If you feel that the program and software is a virus, you can send files that have been quarantined at antivirus software vendor to be analyzed, to determine the signature, name it and put it in the catalog, and send her an antidote. Virus is a virus that is now known. If the virus does not appear again - this often happens because the virus is not well written for the spread - the vendor would categorize it as a dormant virus (virus sleep). But most viruses spread like an earthquake: The spread initially always accompanied by subsequent events. Variant virus (virus tracing the spread of the virus that emerged after the first) will increase the number of virus types that exist. An example is when the Melissa virus LoveLetter appeared in the United States, its variants - VeryFunnyJoke - straight up in a few moments, followed by more than 30 other species two months later. And not all variants derived from the mysterious author of the program. Some companies have been infected by a variant of the virus is spread by the employees themselves are full of curiosity to the virus which they are received, creating variants, and releasing it in their company's computer system - sometimes inadvertently, sometimes it wants to do it.

Source:http: / / www.infokomputer.com

1 comments:

  1. Some times Emails are also harmful. Because the hackers will send any of the malicious software or any links containing any kind of virus related things. Follow Email Protection tips.

    ReplyDelete

.

.

.

.
Design by BlogSpotDesign | Ngetik Dot Com