Your computer may be infected with a virus when you copy a file that terinfeks into the computer, and then activate the code from his body when an infected file is executed or opened. Maybe you do not feel copied infected files into your computer: Hey, the virus does not care whether they are attached to the e-mail attachments, when you are downloading a file, or via floppy disks which are often borrowed-lent. And now, with the increase in Internet users, the trend spread of the virus is through e-mail attachments.
At the moment you open the infected files or applications, malicious code to copy itself into a file on your system, then wait to send the contents - whatever the programmer designed it to be done on someone else's computer. By simply deleting the infected e-mail after you open a file attachment it will not help, because the virus has already penetrated into your computer system before.
A virus writer can set the time of virus attack, it was also, at a certain time or date, or when a certain command is run, for example, when you are ordered to save or close a file. Example: Michelangelo virus is programmed to release the code perusaknya each dated March 6 every year - which is the anniversary date
Jumat, 07 Mei 2010
Virus Types General
Today many types of variations of viruses in circulation, most of which can be grouped into six general categories, where each type is slightly different is how it works:
• boot-sector viruses: replace or insert themselves into the boot sector - an area on your hard drive (or other disk types) to be accessed when the computer is first turned on. This type of virus can prevent your computer to boot from the hard disk.
• File Virus: infects applications. The virus is executed to propagate itself to the application and the documents associated therewith when the infected file is opened or executed.
• Macro viruses: written using a simplified macro programming language, and infect Microsoft Office applications, such as Word and Excel, and the currently estimated 75 percent of this strain has spread across the world. A document that is infected by macro viruses in general will modify the existing command and widely used (like the command "Save") to trigger the spread of himself when the command is executed.
• Multipartite Virus: infects both files and boot sector - a double guise criminals can infect your system continuously before he was arrested by the antivirus scanner.
• Polymorphic Virus: will change the code itself when passed on different machines; theoretically this type of virus is more difficult to be detected by antivirus scanners, but in reality this type of virus is not well written, so it is easy to note its existence.
• Stealth Virus: hides himself by making an infected file not appear infected, but the virus of this type are rarely able to deal with the latest antivirus scanner.
• boot-sector viruses: replace or insert themselves into the boot sector - an area on your hard drive (or other disk types) to be accessed when the computer is first turned on. This type of virus can prevent your computer to boot from the hard disk.
• File Virus: infects applications. The virus is executed to propagate itself to the application and the documents associated therewith when the infected file is opened or executed.
• Macro viruses: written using a simplified macro programming language, and infect Microsoft Office applications, such as Word and Excel, and the currently estimated 75 percent of this strain has spread across the world. A document that is infected by macro viruses in general will modify the existing command and widely used (like the command "Save") to trigger the spread of himself when the command is executed.
• Multipartite Virus: infects both files and boot sector - a double guise criminals can infect your system continuously before he was arrested by the antivirus scanner.
• Polymorphic Virus: will change the code itself when passed on different machines; theoretically this type of virus is more difficult to be detected by antivirus scanners, but in reality this type of virus is not well written, so it is easy to note its existence.
• Stealth Virus: hides himself by making an infected file not appear infected, but the virus of this type are rarely able to deal with the latest antivirus scanner.
All Evil Code (Malicious Code) is not the virus
One perception is mistaken in the computer society of other bad electronic code, such as worms and Trojan horse applications is the type of virus. They are not viruses. Worms, Trojan horses, and viruses in a large category of so-called analyst as "malicious code".
A worm will replicate itself and enter into a network connection to infect every machine on the network and then replicate itself again, taking the hard disk space and slow down computer performance and network. Even so, the worm does not modify or delete other files.
A Trojan horse does not replicate itself, but he was in the form of a malicious program disguised as another format such as a screen saver or image file. When executed on your machine, a Trojan horse will take the information from your system - such as user name and password - or they can create a malicious hacker take over your computer remotely (from a distance).
A worm will replicate itself and enter into a network connection to infect every machine on the network and then replicate itself again, taking the hard disk space and slow down computer performance and network. Even so, the worm does not modify or delete other files.
A Trojan horse does not replicate itself, but he was in the form of a malicious program disguised as another format such as a screen saver or image file. When executed on your machine, a Trojan horse will take the information from your system - such as user name and password - or they can create a malicious hacker take over your computer remotely (from a distance).
Antivirus software answering a emergency calls
Virus experts have records about 40,000 types of viruses and variants over the years, although only 200 species are currently active in the jungles of the computer. While most viruses just annoying more and spend our time, of a kind very merusaklah very dangerous for the health of [computer and your pocket].
Computer viruses have been around since the year 1960, since the computer era, although the range in 1980 until they mostly only specimen in the laboratory computer, was invented by researchers and disposed in a controlled environment to evaluate their effects.
When the virus was first discovered on the surface in the 1980s, they spread very slowly, and move through a "network of smugglers': through floppy disks are sold and divided between computer use. But with the Internet and access e-mail virus spreading further accelerated.
Two years ago, starting with the emergence of LoveLetter Melissa virus, the spread of viruses via e-mail continues to increase so that the ratio of ordinary computer users face viruses are increasingly larger. E-mail viruses are now occupying the top spot where he took a 81 percent share of the cause of a virus infected computer and can spread into the system whitin minutes
Computer viruses have been around since the year 1960, since the computer era, although the range in 1980 until they mostly only specimen in the laboratory computer, was invented by researchers and disposed in a controlled environment to evaluate their effects.
When the virus was first discovered on the surface in the 1980s, they spread very slowly, and move through a "network of smugglers': through floppy disks are sold and divided between computer use. But with the Internet and access e-mail virus spreading further accelerated.
Two years ago, starting with the emergence of LoveLetter Melissa virus, the spread of viruses via e-mail continues to increase so that the ratio of ordinary computer users face viruses are increasingly larger. E-mail viruses are now occupying the top spot where he took a 81 percent share of the cause of a virus infected computer and can spread into the system whitin minutes
Try to using your computer safely
The best way to protect your computer from a virus is if you have a connection to the Internet, do not open e-mail attachments from strangers and avoid downloading software from sources that are not clear. Opponent wants you to click, double the content of your mailbox. And when you get a file attachment and you do not ask, ask the sender about the contents of attachments and how to use it before it opened.
To tighten security, you need to install a reliable anti-virus scanning software and always download the updates regularly. Major antivirus software vendors such as Symantec, Network Associates, Computer Associates, and Kapersky Lab, provides a regular update service (as a record of Computer Associates InoculateIT antivirus software which is free). Some vendors also offer regular updates via their company Web site.
Update on a regular basis is very important. Researchers from the Computer Economics estimates that 30 percent of small businesses are particularly vulnerable to the dangers of viruses and because they do not update their antivirus software regularly or they do not menginstalasikannya correctly.
To tighten security, you need to install a reliable anti-virus scanning software and always download the updates regularly. Major antivirus software vendors such as Symantec, Network Associates, Computer Associates, and Kapersky Lab, provides a regular update service (as a record of Computer Associates InoculateIT antivirus software which is free). Some vendors also offer regular updates via their company Web site.
Update on a regular basis is very important. Researchers from the Computer Economics estimates that 30 percent of small businesses are particularly vulnerable to the dangers of viruses and because they do not update their antivirus software regularly or they do not menginstalasikannya correctly.
Antivirus Software How it Works
Antivirus software to scan the contents of computer hard drives in two ways. If there are known viruses (ie viruses known to exist and the antidote has been found) then the software will look for the signature (mark) virus - which is a unique string of bytes that identify a virus program is like a virus fingerprint - and will dispose of from your system. Most scanning software does not just look for the early type virus, but also can search for variants of these viruses, because the code of the virus signature is usually similar.
In the case of a new virus that has not found its antidote, anti-virus software will run a heuristic program that searches for virus-like activity on your system. When the program saw no symptoms of anything wrong, it will quarantine the troubled program and will display a message warning you about what will be done by the plan (eg changing your Windows registry). When you and the software felt that the program is a virus, you can send a file that has terkarantina at antivirus software vendor to be analyzed, determining signaturenya, calling it and put it in the catalog, and send her an antidote. The virus is now known viruses.
If the virus does not appear again - this often occurs because the virus is not well written to be distributed - the vendor would categorize it as a dormant virus (the virus to sleep). But some viruses spread like an earthquake: Distribution initially was always accompanied with the occurrence of aftershocks. Variants of the virus (the virus tracing the spread of the virus that emerged after the first) will increase the number of existing viruses.
An example is when the Melissa virus appeared in the United States LoveLetter, variant - VeryFunnyJoke - directly appear in a few moments, followed by more than 30 other species in two months later. And not all the variants derived from the mysterious author of the program. Some companies never infected by variant viruses that spread by the employees themselves are curious to the virus which they are received, creating variants, and release them in their company's computer system - sometimes accidentally, sometimes they want to do it.
Source: http://www.infokomputer.com
In the case of a new virus that has not found its antidote, anti-virus software will run a heuristic program that searches for virus-like activity on your system. When the program saw no symptoms of anything wrong, it will quarantine the troubled program and will display a message warning you about what will be done by the plan (eg changing your Windows registry). When you and the software felt that the program is a virus, you can send a file that has terkarantina at antivirus software vendor to be analyzed, determining signaturenya, calling it and put it in the catalog, and send her an antidote. The virus is now known viruses.
If the virus does not appear again - this often occurs because the virus is not well written to be distributed - the vendor would categorize it as a dormant virus (the virus to sleep). But some viruses spread like an earthquake: Distribution initially was always accompanied with the occurrence of aftershocks. Variants of the virus (the virus tracing the spread of the virus that emerged after the first) will increase the number of existing viruses.
An example is when the Melissa virus appeared in the United States LoveLetter, variant - VeryFunnyJoke - directly appear in a few moments, followed by more than 30 other species in two months later. And not all the variants derived from the mysterious author of the program. Some companies never infected by variant viruses that spread by the employees themselves are curious to the virus which they are received, creating variants, and release them in their company's computer system - sometimes accidentally, sometimes they want to do it.
Source: http://www.infokomputer.com
How to Work Computers Virus
Computer Viruses: A computer code that can "breed by itself" which put some or all of the code in the file or application, and cause your computer to do things you do not want.
Computer viruses is a common disease in the world of modern technology. They can spread rapidly through open computer networks like the Internet, and resulted in losses up to billions of dollars in a short time. Five years ago, chances for infected by a virus within a period of 12 months is equal in 1000; now the ratio has risen dramatically to a proportional 10. Vital statistics of the virus:
• viruses into your system via e-mail, downloads, infected floppy disk, or (sometimes) by hacking.
• From the definition, a virus must be able to perform "self breeding" (aka make a clone or a copy of itself) to be spread.
• We have thousands of types of viruses, but few are found "in the wilderness" (wander, undetected, within the network) because most of the known viruses is born from a lab, which is a variant of the virus "wild" which is widely available in world.
• Effect of virus generated varies, ranging from annoying to very destructive, but even the simplest virus has a tendency to damage because of the bug on their computer code (because the virus programmers do have a very careless or malicious intent).
• antivirus software on the market today can detect almost all types of viruses exist, but should be updated regularly to maintain effectiveness.
A virus is simply a computer program. Like other computer programs, in which there is instruction that can tell the computer to perform certain tasks. But with different application programs, a computer virus is usually ordered you to do the things that really do not want, and usually can spread itself to existing files on your computer - and sometimes into other people's computers as well.
If you're lucky, a virus is at best only cause the computer to act weird, such as causing your computer speakers reads "blip-blip-blip" at random. The most feared is the malignant virus that can cause all data on your hard drive is missing (with a computer command to format the hard drive), even some viruses that can damage your computer hardware, such as the CIH virus damage to your computer motherboard BIOS.
Computer viruses is a common disease in the world of modern technology. They can spread rapidly through open computer networks like the Internet, and resulted in losses up to billions of dollars in a short time. Five years ago, chances for infected by a virus within a period of 12 months is equal in 1000; now the ratio has risen dramatically to a proportional 10. Vital statistics of the virus:
• viruses into your system via e-mail, downloads, infected floppy disk, or (sometimes) by hacking.
• From the definition, a virus must be able to perform "self breeding" (aka make a clone or a copy of itself) to be spread.
• We have thousands of types of viruses, but few are found "in the wilderness" (wander, undetected, within the network) because most of the known viruses is born from a lab, which is a variant of the virus "wild" which is widely available in world.
• Effect of virus generated varies, ranging from annoying to very destructive, but even the simplest virus has a tendency to damage because of the bug on their computer code (because the virus programmers do have a very careless or malicious intent).
• antivirus software on the market today can detect almost all types of viruses exist, but should be updated regularly to maintain effectiveness.
A virus is simply a computer program. Like other computer programs, in which there is instruction that can tell the computer to perform certain tasks. But with different application programs, a computer virus is usually ordered you to do the things that really do not want, and usually can spread itself to existing files on your computer - and sometimes into other people's computers as well.
If you're lucky, a virus is at best only cause the computer to act weird, such as causing your computer speakers reads "blip-blip-blip" at random. The most feared is the malignant virus that can cause all data on your hard drive is missing (with a computer command to format the hard drive), even some viruses that can damage your computer hardware, such as the CIH virus damage to your computer motherboard BIOS.
Langganan:
Postingan (Atom)