Writing tips and writing guidelines for students,case study samples, admission essay examples, book reviews, paper writing tips, college essays, research proposal samples
Wednesday, February 27, 2019
Computer Virus Expository
Computer Virus A true virus mountainnot sprinkle to an some other estimator without gracious assistance. Computer virus has now acquire widespread. Its almost everywhere in every computer. It is one of the study problems of the computer users. Viruses are like the disease of the computer. Letting the virus in it brush aside cause harm or even destroy exclusively files stored in the computer. Virus infection costs millions even billions of money if virus penetrates into major servers like government database system, bank and airport systems.Computer virus end destroy, control or even steal information without the knowledge of the user. at that place are three mannikins of computer virus. First good-hearted is the Trojan dollar it pretends to be a legitimate plan. It attaches itself to a program then executes itself. Named afterward the Greek armys tactic of hiding their soldiers in a giant wooden horse. This virus does not multiply but alternatively take for the c omputers protection weaker and more susceptible to other threats. Second kind is the worm, is has a self replicating ability that spreads itself through computer network.It search for loopholes in the network copies itself and reaches another computer in the network. This kind of virus invades the kernel of the computer that makes it halt and become slow. It replicates in forceful number that make duplicates of files that cause confusion in the computer user. The thirdly kind is the malware it is a malicious program that steals information from the computer and the user. dislocate personal information like bank accounts, credit card number and other information that set up be used against you. This information is creation used by hackers to generate money and make fraud.The program overly downloads other files and viruses into the computer. There are also other kind, unusual kind of viruses that is less encountered by common computer users. These viruses may be put in in cor porations and companies for conspiracy. This is the rabbit/wabbit and the logic bombs. The rabbit also known as wabbit is a kind of virus that copies itself and sends twice through the ASP return stream. It copies itself in drastic number that makes the system clog, become slower and make the files more difficult to remove/delete.Cleaning of the infected system was became a persistent and complicated process. The other kind is the logic bomb, virus that acts like a time bomb. It is a piece of code intention entirelyy inserted into a program or software system that will set-off malicious functions when certain conditions are met. The code is hidden in program and software written by hackers. Certain logic bombs sometimes execute at certain payloads or at pre-defined time like Fri sidereal day of the 13th and April fools day (April 1st).Trojans that activates on certain dates are also called time-bombs. There are tips and whoremonger that can be done to prevent the infection of the computer by viruses. First is to set-up your computer. Consider running a firewall on the computer. Also place an antivirus program. Regularly update the operating system and antivirus software, and delete all gratuitous files and programs. Second is on downloading files and email attachments. Be careful of opening files from untrusted sources. ever so scan the file before opening.Also be aware that email attachments are also a source of computer viruses and last, be knowledgeable closely viruses and the behavior of the computer. Computer virus is one of the major problems of the computer users. It can destroy, control or even steal information. Virus infection can be prevented by being aware of the viruses, about its behavior and the things that it can do. Always remember that a virus cannot spread by itself without human assistance. So be aware and be knowledgeable in all things that you don in computer. Think before you click.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.