Free Essay

Bug Love

In:

Submitted By ecpd
Words 1101
Pages 5
Explain the difficulty of creating a computer virus and discuss the frequency with which this happens.
The degree of virus was determined by the complexity of the logic that the user or creator want to give and want to do. The programming language of choice for developing virus is the Assembler as the so called high-level languages such as Turbo Pascal, C, database managers, etc., are designed to produce software applications.
Using different techniques to create complex virus the person succeeds in creating a destructive weapon for computer users, among these techniques we have the Fast infector virus which when is active in memory not only infects programs when executed but those who are simply open to be read.
The Slow infector virus infects only files as they are executed, modified or created, but with one caveat can also use the technique of fast infector but without the instruction of alteration or damage immediately to open a file. Parse strategy is to direct the virus to infect occasionally, for example every 10 times the performance of a program.
Companion Mode is when the virus instead of modifying an existing file creates a new one with the same name at the time to infect, going unnoticed by the user. Armored style is a very peculiar form of programming, where the creator program a series of routines that used as covers or shields, the file containing the virus so that it cannot easily be "tracked" much less disassembly. A Stealth virus is one that when activated hides the modifications made to files or boot sectors are infected. Polymorphic viruses, their values of programming are changed sequentially each time are autoencriptan, so that their chains are not the same. The polymorphic virus produces multiple but different copies of itself, maintaining its operational microcode viral.
Viruses are small programs, set intentionally designed to disrupt the normal functioning of computers. They are installed without user consent and run autonomously to self-replicate and continue its spread. The creation of these viruses is illegal in most countries of the worlds which have created laws with heavy penalties for the creators of these viruses.
In other to protect companies and personal data business and people use some security measures such a Firewalls which is “a combination of hardware and software that acts as a filter between a private network and external computer or network” (Bidgoli, 2012, p. 82).
Although there are laws and technological advances to prohibit and prevent the creation of these viruses, now a days, there are unscrupulous people who most often create these and more complex viruses making this a more difficult task to eradicate them. “It is sad that some people in our world have found the internet to be a useful tool for perpetrating crimes, conducting terrorism, and even waging war” (Schneider, 2010, p. 340).
Explain the difference between a virus and a worm, and describe how the respective threat levels compare.
Nowadays, “virus programmers tend to combine different types of virus or worms with different techniques, thus making difficult – not to say artificial –any attempt to classify them properly.” (Filiol, 2005, p. 122).
A computer virus is a small program designed to alter the way a computer works without the permission or knowledge of the user. A virus must have two characteristics must be able to execute itself, often places its own code into the path of execution of another program and must be able to replicate. For example, it may replace other executable files with a copy of the infected file. Viruses can infect desktop, laptop computers and network servers, virus creators take into account characteristics such as size, symbols, and data from the creator to hide inside the machines and avoid detection. Therefore, the virus re-orients the disk read, modify its size in the directory and change some parts of its code to avoid being detected and destroyed.
In the other hand, Worms are programs that replicate themselves from system to system without using a file to do so. In this they differ from viruses that need to be extended by an infected file. Although the worms are usually found within other files, often Word or Excel documents, there is a difference in the way that worms and viruses use the hosts file. Usually the worm will generate a document that contains the worm macro inside.
The entire document will travel from one computer to another using fragments of user own posts and thus spreading to the four winds its contents, with damage added to propagate moral and personal communications sometimes highly confidential, so that the entire document should be regarded as a worm.
Once lodged in a computer, the worms can do everything from displaying annoying messages while working to simply mix all the contents of the hard drive to make it unusable. They also often seek to disable antivirus programs and "firewalls" installed before leaving the machine unprotected new attacks. We have to keep in consideration that “Viruses require hosts, by definition, while Worms do not require a host because are typically a mainframe problem.” (Stang, 1991, p. 2).
Address the questions: Are non-Microsoft operating systems less prone to virus attack? Why or why not?
Windows operating systems is more likely to be infected with viruses, “Often, Windows viruses are part virus and part Trojan.” (Grimes, 2001, p. 105). The fact is to infect a Windows PC the only thing you need is to be connected to the network as the platform allows the auto execution. While others operating systems have to be authorize and execute by the user such a Linux or UNIX, making this more difficult for the virus to get into the PC without authorization, if a user see an unknown Script can decide between executed or not, if the script is not executed will only occupied space into the PC without major harm. According to Channelle, Sicam and Thomas, “Linux fans constantly note that viruses can’t cause problem on their system because the core of the operating system is well protected.” (Channelle, Sicam, & Thomas, 2009, p. 185).

References
Bidgoli, H. (2012). MIS2. Boston, MA: Course Technology Cengage Learning.
Channelle, A., Sicam, J., & Thomas, K. (2009). Beginning Ubuntun Linux: From Novice to Professional, Fourth Edition . New York : Springer-Verlang .
Filiol, E. (2005). Computer viruses: from theory to appications. New York : Springer-Verlag.
Grimes, R. A. (2001). Malicious Mobile Code: Virus Protection for Windows. Sebastopol, CA: O'Reilly and Associates, Inc. .
Schneider. (2010). Electronic Commerce. Mason, OH: Cengage Learning.
Stang, D. J. (1991). Computer Virus Survival Guide. Washington, DC: National Computer Security Association.

Similar Documents

Premium Essay

Love Bug Project Analysis

...Winter Haven, Florida | Lake Region High School class of 2015 graduates Melvin Vigo and Jamilette Toress De La Cruz both graduated with high honors created a kindness campaign which is rapidly gaining the support from the Winter Haven community. It all started about a week ago when Melvin was giving the task to create a project that will manage to make others happy. Vigo later on that day reached out to Toress explaining her about the project, instantly, they came up with the idea of creating The Love Bug Project. Their mission is to make this worldwide so it will inspire people to do every day acts of kindness. Spread love! Both creators stated “We want to bring this to the next level and it all starts right here with the support of our community,...

Words: 607 - Pages: 3

Free Essay

The Love Bug Virus

...CIS 109: Week 3 – The Love Bug Virus January 27, 2014 Ten years ago the Love bug virus infiltrated computers around the world throwing consumers - and sometimes government offices - into turmoil. Ten years later many consumers think viruses are a thing of the past and that any anti-virus software will protect them. The truth is consumers, businesses, and brands are still very susceptible to viruses and malware simply because many attacks go undetected until it's too late. Computer programmers typically have the knowledge necessary to create a computer virus. Viruses are created by computer programmers who have learned to write code to create software programs. Computer programmers are able to turn a programs design created by software developers and engineers into instructions that a computer can follow. Programmers have the ability to debug the programs and test them to ensure they produce the expected results (Bureau of Labor Statistics, 2014). I think most people today don’t think much about how serious computer viruses can be or the magnitude of problems attacks can cause everyday in our society. According to the New York Times (2013) there has been a new wave of cyber attacks that have been striking large American corporations. It has been such at problem that warnings have been given from federal officials of the Department of Homeland Security. Just recently the data breach that affected Target, the attackers stole credit card data by installing malicious software...

Words: 991 - Pages: 4

Premium Essay

Love Bug Virus

...To create a virus, a user or attacker needs to create a code. In this code the attacker needs to express what type of virus, he/ or she wants to use. Once the attacker determines what type of virus is going to be used, then they must determine who they want to attack. Lastly, ask what type of data they want to gain from the attack. People write computer viruses. The person has to write the code, test it to make sure it spreads properly and then release it. A person also designs the virus's attack phase, whether it's a silly message or the destruction of a hard disk. . There are at least four reasons why this is done. The first is the same psychology that drives vandals and arsonists. For some people, that seems to be a thrill. If that sort of person knows computer programming, then he or she may funnel energy into the creation of destructive viruses. Secondly the reason has to do with the thrill of watching things blow up. Some people have a fascination with things like explosions and car wrecks. Creating a virus is a somewhat like that, it creates a virtual bomb inside a computer, and the more computers that get infected; the more "fun" the explosion. The third reason involves bragging rights; some people enjoy the status it holds. Certain types of programmers see security holes that could be exploited, and are compelled to exploit the hole themselves before someone else beats them to it. The reason that drives many people on a day-to-day basis to commit crimes, get easy cash...

Words: 963 - Pages: 4

Premium Essay

Love Bugs Research Paper

...Have you ever thought of what role lovebugs play in Florida’s environment? Love bugs are known to have an all-black body with an orange thorax. They fill up Florida’s sky with their little black bodies. Floridians and even annual travelers ask themselves “Why are they so annoying? Why are there so many? They are so destructive! How can they possibly help our environment?” As larvae, the waste products they produce help make viable soil for plants, which helps us in obtaining the oxygen. As adults, they help with the reproduction and diversity of plants. Though love bugs are pest toward the human population, they play a crucial role in our environment. Love bugs, also known as Plecia neartica or bibionid flies (Denmark, Mead, Fasulo,...

Words: 1304 - Pages: 6

Free Essay

Bugs Bunny

...Bugs Bunny has and continues to be a standing favorite all, his popularity spans generations crossing over form one millennia to the next, he is iconically global and can be viewed in many languages in thousands of homes. True to form the creation of this character has spawned within our culture a love for such a character that he has become not only a welcomed spokes person but an undying legend whose roots can possibly be traced back hundreds of years he is everybody’s hero we laugh and cheer when he is victorious and are shocked and somewhat upset when he “loses.” Warner Bros., released his first cartoon over sixty years ago. Since “There have been over 150 Bugs Bunny cartoons, and all but about twelve are still shown rather frequently on television today. Bugs has had a more diverse and accomplished career than many Hollywood actors ever have, and some of the zaniest and funniest performances ever in film history. This did not happen overnight, by any means. Bugs Bunny's cartoons were directed over the years by such creative geniuses as Tex Avery, Chuck Jones, Friz Freleng, Bob Clampett, Robert McKimson, Frank Tashlin, and others, all of whom left their mark in film history with these animated films, and Bugs was only one of the dozens of classic creations these men worked with and created. Also not to be forgotten are the creators of the Warner cartoon soundtrack, Mel Blanc (the voice of Bugs) and musicians Carl Stalling, Milt Franklyn and William Lava” (Hunter).            ...

Words: 4019 - Pages: 17

Premium Essay

Al Capone

...Al Capone Alphonse Capone is the son of Neapolitan immigrants Gabriel and Teresa Capone. They had nine children. He was their forth, born January 17, 1899, in Brooklyn, New York. This is where he attended Public School 7 from age 5 to 14 until an incident with his 6th grade teacher, he gave her a beating and was then beaten and expelled by his principal, never to return. Beatings were a typical form of punishment for public school in this age and young Al was known to challenge authority. Expelled from school and transplanted to a different neighborhood, Capone met notorious criminals like; Johnny Torrio and Lucky Luciano when he joined two street gangs, the Brooklyn Rippers and the Forty Thieves Juniors. Within a few years he was regularly involved in organized crime. Capone worked at a night club called the Harvard Inn for the crime boss Frankie Yale. One night at the Harvard Inn, Capone insulted a young woman which led to fight. The brother of the woman gave Al a beating and a new nickname “Scarface”. This incident also led to Capone’s first arrest “disorderly conduct”. Al met Mary “Mae” Coughlin, a young Irish woman at a dance in 1918. It must have been a tumultuous, whirlwind of a romance because she gave birth to their son Albert “Sonny” Capone on December 4th, 1918 and then they married on December 30th, 1918. Capone was the prime suspect of two murders and the brutal beating of a rival gang member that led to an extended hospital stay. Frankie Yale knew that the...

Words: 2244 - Pages: 9

Free Essay

Ispg

...Running head: FORENSIC CASES Forensic Cases Stephanie Rudolph Kaplan University IT 550 Computer Forensic and Investigation Prof: Bhanu Kapoor November 26, 2013 Abstract People are the most difficult creatures on earth to understand. Some have the mind set of doing some the off the wall and unacceptable things using technology. In this paper I have discussed location and the type of data you will find in in the case of a financial fraud and a child pornography case. Later in the paper discusses the procedures that and investigator might take to collect data from a suspect system. I will also provide a simple tool that can be used to collect all type of data from different location, making the investigator job much easier and help maintain the integrity of the evidence collected to be presented in court. . Forensic Cases There are many location that and investigator search to obtain data using computer forensic tools in a case on financial fraud and child pornography cases. In the case of a financial fraud emails can provide investigators with information not only the text but also the headers. The email headers can provide investigators with the information of who created the email, what software they used and the IP addressed that sent it. The email header also provide a date and time was sent. Credit card data shows the activity of charges. It show the...

Words: 1093 - Pages: 5

Free Essay

Xbis219 Appendixb Week 4 Checkpoint

...Bros. as its E-Master which are stored on servers at Warner Bros. Warner Bros. in 2006 produced more than 25,00 different DVEs and delivered more than 180 hours of video programming weekly through its global digital exchange. They also produced and distributed more than 50 television series and digitized more than 6,00 feature films in its storage vaults for DVD releases. The creation of the E-masters enables Warner to utilize any channel to reach the consumer including their website and most retailers. The company also has an online Web initiative that will enable fans of various cartoon shows such as Looney Tunes to download new, interactive content, related games, and flash animations of Bugs Bunny, Daffy Duck, and other popular characters. Choose one of these components and make a recommendation for an improvement to that area of the supply chain. Explain your reasoning for the change. I think that the downstream component the the area that I would suggest to improve. I think that the more visible and contactable you are the more customer satisfaction you will have. The Warner Bros .website is large and hard to navigate....

Words: 333 - Pages: 2

Premium Essay

An Analysis Of Looney Tunes Dash

...Looney Tunes Dash is the most recent, taking fantastic Looney Tunes characters and setting them into natural parts where they'll have to bounce over snags, gather focuses, and continue running until you foul up. At last, its fundamentally the same sort of game we've played many times in the recent past, which is a disgrace truly, given the fabulous source material. Instead of essentially being relied upon to continue playing to the extent that this would be possible without a genuine objective as a top priority, at any rate Looney Tunes Dash does offer a few objectives for you to finish every time you play. One moment you may be gathering a set number of carrots, or the following you may be encouraged to go for a particular score. There...

Words: 329 - Pages: 2

Premium Essay

Bug Bounties Research Paper

...Bug Bounty Information Paper A ‘Bug Bounty’ is a program where private or public entities provide recognition, awards, and compensation in exchange for the responsible disclosure of vulnerabilities, or bugs, in their public or private-facing infrastructures. While conventional penetration testing has a predetermined actor testing a predetermined scope, Bug Bounties generally allow for any actor to attempt to exploit the service without fear of prosecution. If this actor stays within the scope of the Bounty (e.g. not compromising personal data, breaking key infrastructure, etc.), and reports the bug responsibly to the company, without publicly releasing it first, they may receive compensation or awards. Bug Bounties have become increasingly...

Words: 398 - Pages: 2

Premium Essay

Distributed Systems

...This paper will discuss four common types of distributed computer system failures which are Crash failures also known as operating system failures, Hardware Failures, Omission Failures and Byzantine Failures. Included in the discussion are failures which can also occur in a centralized computer system, and how to isolate and repair two types of failures. Crash failures are normally associated with a server fault in a typical distributed system. Inherently crash failures are interrupt operations of the server and can halt operation for a considerable time (Projects Helper, 2012).Operating system failures are the best examples for this scenario. Operating System or software failures come in many more varieties than hardware failures. Software bugs in distributed systems can be difficult to replicate and, consequently, repair and or debug. Corresponding fault tolerant systems are developed and employed with respect to these affects. An operating system or software failure can also occur in a centralized system such as a data base this is why it is highly recommended to back up a data base using stable mass storage media (Projects Helper, 2012). We have an extensive data base on our server at my work place. The storage back-up is run daily. I cannot imagine the man-hours it would take to re-input even a month’s worth of production data if it were lost due to a failure the system could not recover from. Hardware failures can occur in both distributed and centralized systems. Hardware...

Words: 280 - Pages: 2

Free Essay

A Different View of Al Capone

...This was just the beginning of his downfall and it all began on February 14, 1929. First of all, Chicago had split into two rival gangs led by Al Capone and George “Bugs” Moran, by the late 1920’s. Both of these leaders vied for power, prestige, and money (Rosenberg 1). Much of the problems arose after Capone’s former enemy Dion O’ Banion was killed and it started an all-out-war in the city (The St. 1). Moran was soon the new leader. Capone’s hopes of obtaining more territory were diminished and this frustrated him. Al Capone soon began to brainstorm into developing an attempt towards George “Bugs” Moran (Rosenberg 1). Capone’s reputation as a bootlegger would soon change into horror. In order for everything to turn out as planned, Al Capone obtained help from Jack “Machine Gun” McGurn. McGurn was placed in charge to organize an assassination attempt towards “Bugs” Moran. McGurn was said to have survived many attempts so he was perfect for Madueño 2 the job. The plan was to select gunmen outside of the Chicago area. This was to ensure that if there were any survivors, they wouldn’t be able to recognize the killers as part of Capone’s gang. McGurn also acquired a stolen police car and various police uniforms. After all of this was set, Capone sent a Detroit gangster to offer Moran a load of hijacked booze. Bugs agreed to gather the delivery at his gang’s headquarters, a garage at 2122 North Clark Street (Sifakis 289). Capone had a very special “valentine” that he wanted delivered...

Words: 603 - Pages: 3

Free Essay

Distributed System Failures

...point hardware failures were a common occurrence, but with recent innovations in hardware design and manufacturing these failures tend to be few and far between. Instead, more failures that now occur tend to be network or drive related. Network failures refer to the failure of links within the distributed system network. Processors within a distributed system need to be able to communicate with each other via the network. When a link in this network connection fails, this causes functions to cease running. Application failure occur to the failure of applications that run within the system, and can occur when the application stops working or operates incorrectly. These failures may be caused by a variety of issues, including software bugs. Because there are numerous fail points in...

Words: 726 - Pages: 3

Free Essay

Pneumonoultramicroscopicsilicovolcanoconiosis

...Chapter I INTRODUCTION Pneumonoultramicroscopicsilicovolcanoconiosis iis an English word that refers to a lung disease that is otherwise known as silicosis. It is the longest word in the English language published in a dictionary, the Oxford English Dictionary. According to the Oxford English Dictionary, it is "an artificial long word said to mean a lung disease caused by inhaling very fine ash and sand dust."[1] Silicosis is a form of occupational lung disease caused by inhalation of crystalline silica dust, and is marked by inflammation and scarring in the form of nodular lesions in the upper lobes of the lungs. It is a type of pneumoconiosis Statement of the problem 1. What is the couse of Pneumoconiosis? 2. How can it be prevented? 3. What are the symptoms? 4. How can affect in our body? 5. What are the treatment? Statement of the Hypothesis HO1: .A pneumoconiosis cause by inhalation of every fine silicate or quartz dust which is found in volcanic ash. HO2: Pneumonoultramicroscopicsilicovolcanoconiosis is fairly easy to prevent. Most countries do not have any volcanoes or any other places where silica dust exposure is likely. In case you live in one of the countries that does, here are few ways how to prevent this disease: Do not go in or near an active or non-dormant volcano. Do not expose yourself to silica dust for long periods of time. If or long periods of time...

Words: 3268 - Pages: 14

Free Essay

Alumni Mangement System

...ALUMNI MANGEMENT SYSTEM Introduction The main objective of the system is to create a forum to bring together and facilitate the exchange of information amongst its members and to give opportunities for its members to have a firm link between collage and its members. The alumni can provide the present college students with job opportunities like recruitment. This system will help alumni members to effectively communicate with their old friends, seniors, juniors and their batch mates and will also provide latest news and updates about the system activities. Alumni Online community will provide benefit to the organization by giving great leaders with commitment who upholds ideas and goals further in society of their organization. Alumni Management system provides internet services to remain in touch, feel nostalgic about their past memories. It will help to promote exchange of skills and experience amongst the members and to conduct seminars, workshop and guest lectures. It will also promote social and cultural activities useful to the members and society in general. These programs include reunions, luncheons and receptions, professional sports events, educational programs, and distinguish alumni awards. Overall Description Goals of proposed system Actions Measurable Outcomes Communicate strategically with graduates to create and enhance affinity with the campus · Increase e-newsletter open rate to 20% · Increase participation in social media · Obtain...

Words: 1184 - Pages: 5