рефераты конспекты курсовые дипломные лекции шпоры

Реферат Курсовая Конспект

Computer viruses

Computer viruses - раздел Иностранные языки, УЧЕБНО МЕТОДИЧЕСКОЕ ПОСОБИЕ ПО АНГЛИЙСКОМУ ЯЗЫКУ ДЛЯ СТУДЕНТОВ Types Of Virus From Worms To Macros, There's A Whol...

Types of virus

From worms to macros, there's a whole host of viruses out there to catch...

Worms

These viruses spread via computer networks. The ILOVEYOU virus was a classic example of a worm. These viruses are becoming an increasing threat as a growing number of computers are permanently connected to networks. Worms can spread over corporate networks or via emails sent over the Internet.

Trojans

A Trojan virus takes its name from a story in Homer's Iliad where Greek soldiers pretended to make peace with their enemies, the Trojans. The Greeks made a grand peace-keeping gesture - the gift of a large wooden horse.

When the Trojans hauled it inside their city gates, a small band of Greek warriors leapt out. They opened the gates and let the rest of the Greek army storm in to capture the city.

A Trojan virus is one that opens your computer up to malicious intruders, allowing them to read your files.

File viruses

A file virus is one that replaces a key system file on your computer. These viruses can reload themselves every time you start your computer up. Once they're in the memory, they can spread by writing themselves to any disk you insert into your disk drive.

Boot sector viruses

This is an early type of computer virus that spreads by hiding itself in an invisible location on your hard drive or floppy disk. When your computer reads an infectedfloppy disk, the virus is copied from the disk to your computer's memory.

From there, it writes itself to the 'boot sector' on your hard drive. The boot sector is read each time you turn your computer on. So the virus is constantly reloaded and can copy itself on to other floppy disks. These viruses are fairly rare nowadays, as they are easy to catch.

Macroviruses

A macrovirus infects word processor files, such as Microsoft Word documents. Although not as dangerous as other viruses, they can spread quickly if a Word file is sent via email. After an initial scare, Microsoft added protection into later versions of Word, so you receive a warning about infected documents.

Hoaxes

The virus hoax came about after friends sent each other emails about a new virus threat. Someone decided that they could cause just as much trouble by sending out fake warnings rather than real viruses.

Hoaxes may seem harmless, but they do a great deal of damage to the Internet as a whole. Not only do they slow down traffic and clog up email servers, but they also cause people to panic. Companies can spend money and time investigating what is just someone's idea of a joke.

Who Writes Computer Viruses?

Virus authors are normally 14-26 year old males who spend a lot of time on their computers. Some of them want to prove they are good programmers. Others want to show that they have the power to cause large-scale problems.

But most viruses don't constitute good programming, as many fail to deliver their payload. Many are re-hashed versions of old programs that require little skill to produce.

In the UK, if you're caught using a computer for criminal reasons you can receive a five-year sentence and an unlimited fine. If convicted of 'cyber-terrorism', then you can be given the same sentence as a terrorist bomber.

How do you catch a virus writer? Although the Internet allows computer viruses to spread quickly, it also helps to catch the authors.

Each computer connected to the Internet has an address, similar to a phone number. This is called an IP address and looks like this: 128.5.10.64. Every email you send is marked with your IP address and this information is hard to remove.

Your IP address reveals what company (or Internet Service Provider) holds your account. The company can then find out which customer sent the mail. So if you send a virus to a Member of Parliament, it won't be long before the police are knocking on your door asking questions.

Sophisticated virus authors would be able to cover their tracks to some degree, but there is usually some way to track them down.

Hackers, crackers and script kiddies

There's a whole zoo of cantankerous coders out there:

Hackers: people who try to find security flaws in corporate computer programs. Most hackers don't aim to cause problems, but they might send an anonymous email to the person in charge warning them of their security problem. Amongst other hackers, there is much honour to be gained by those who can 'crack the uncrackable' programs

Crackers: unlike hackers, crackers are less sophisticated. They like to break into people's websites and replace their corporate homepage either with pornographic images or hoax messages

Script kiddies: young virus pirates, who copy old computer viruses and modify them. Often they don't work. If they do, they are seldom as dangerous as the originals and can be easily destroyed

 

From BBC site

– Конец работы –

Эта тема принадлежит разделу:

УЧЕБНО МЕТОДИЧЕСКОЕ ПОСОБИЕ ПО АНГЛИЙСКОМУ ЯЗЫКУ ДЛЯ СТУДЕНТОВ

УЧЕБНО МЕТОДИЧЕСКОЕ ПОСОБИЕ... ПО АНГЛИЙСКОМУ ЯЗЫКУ ДЛЯ СТУДЕНТОВ... ФИЗИКО МАТЕМАТИЧЕСКОГО ФАКУЛЬТЕТА С ДОПОЛНИТЕЛЬНОЙ СПЕЦИАЛЬНОСТЬЮ...

Если Вам нужно дополнительный материал на эту тему, или Вы не нашли то, что искали, рекомендуем воспользоваться поиском по нашей базе работ: Computer viruses

Что будем делать с полученным материалом:

Если этот материал оказался полезным ля Вас, Вы можете сохранить его на свою страничку в социальных сетях:

Все темы данного раздела:

С ДОПОЛНИТЕЛЬНОЙ СПЕЦИАЛЬНОСТЬЮ
«ИНФОРМАТИКА» Авторы-составители:   Сафонова Ирина Георгиевна Проняева Мария Вадимовна   Р

Telecommunication
    Communication ties together the parts of a society just as the nervous system ties together the parts of an individual.

Computers
  Generally, a computer is any device that can perform numerical calculations—even an adding machine or a slide rule. Currently, however, the term usually refers to an electronic devi

Computer applications
  Modern computers have a myriad of applications in fields ranging from the arts to the sciences and from personal finance to enhanced communications. The use of supercomputers has be

Текст 5.
1. Прочитайте текст. Hardware /Part 1/   A digital computer's hardware is a complex system of four functionally different elements—a centr

Текст 6.
1. Прочитайте текст. Hardware /Part 2/   Most digital computers store data both internally, in what is called main memory, and externally,

Bill Gates
American computer programmer and entrepreneur who cofounded Microsoft Corporation, the world's largest personal-computer software company. Gates wrote his first software program at the

Software
  Two types of software instruct a computer to perform its tasks—systems software and applications software. Systems software is a permanent component of the computer that controls it

Programming
    Software is written by professionals known as computer programmers. Most programmers in large corporations work in team

Programming languages
There are two general types of languages—low-level and high-level. Low-level languages are similar to a computer's internal binary language, or machine language. They are difficult for humans to

The Internet
  A computer network is the interconnection of many individual computers, much as a road is the link between the homes and the buildings

The social impact of computers
Until the mid-1980s few people had direct contact with computers. Then people began to purchase PCs for use at home, and in the 1990s the Internet and the World Wide Web came to affect nearly ev

Computer crimes
  Computers, with all the benefits they offer, also unfortunately can enable cybercrime, or computer crime. Of course, the computers and their electronic components have always been t

Information technology
  The computer industry itself - the development and manufacturing of computer hardware and software - had a major impact on society in the late 20th century and has become one of the

The future of computers
  Research and development in the computer world moves simultaneously along two paths—in hardware and in software. Work in each area influences the other. Many hardware syste

Where to next?
More than half a century has passed since John Atanasoff and Clifford Berry built the first digital computer. We've seen computers evolve from giant, air-conditioned beasts with their own staff of

Four common PC problems you can fix yourself
Computer problems may seem immensely complicated at first glance. But some are relatively easy to fix. That doesn't mean they will be cheap if someone else does the job. Replacing a hard d

Man and machine
One place where artificial intelligence has found a natural home is in the development of computer games. AI (artificial intelligence) in computer games is becoming increasingly sophisticated as co

The digital decade
Now, we talk about this as the decade of Digital Lifestyles, the decade of Digital Workstyles. That means that all these tools are becoming mainstream. And it's not just one application that makes

Mac Pro: The ultimate in desktop computing
The new Mac Pro desktop is a thing of beauty. Inside and out this box looks like it is the ultimate desktop computer on the market today. With two, 64-bit, dual-core Intel Xeon “Woodcrest”

The hard disk that changed the world
August 7, 2006 issue - If there's a bottle of vintage champagne you've been saving, next month is the time to pop it open: it's the 50th anniversary of hard-disk storage. Don't laugh. On Sept. 13,

The unified communications revolution
Today, the Internet provides us with nearly unlimited access to information about markets, products and competitors. Productivity applications help us use that information to gain insight into a ra

Technology is the tool, people are the key
Technology is everywhere in the workplace - in laptop computers, personal digital assistants, "smart" wireless telephones, the Internet, and business servers. But people remain the core o

Console wars: Which is best?
As Microsoft unleashes its Xbox 360, gamers face a difficult decision - whether to buy the new machine or wait for the next gen consoles from Sony and Nintendo. Three game journalists present the c

Хотите получать на электронную почту самые свежие новости?
Education Insider Sample
Подпишитесь на Нашу рассылку
Наша политика приватности обеспечивает 100% безопасность и анонимность Ваших E-Mail
Реклама
Соответствующий теме материал
  • Похожее
  • Популярное
  • Облако тегов
  • Здесь
  • Временно
  • Пусто
Теги