Premium Essay

Cih Virus Summary

In:

Submitted By KingDouglas
Words 435
Pages 2
Description of CIH Virus
The CIH Virus, also known as the Chernobyl Virus, was directed towards Microsoft Windows platforms. It became known as the Chernobyl Virus because the triggered payload date is April 26th, the same date as the Chernobyl disaster (this is purely coincidental). The name of the virus is derived from the virus’s creator, Chen Ing-Hau.
Payload is defined as the malicious activity that is a result of the activation of a computer virus. The CIH virus was designed to overwrite the machine’s BIOS program code, while still leaving it fully intact. The BIOS code is fundamental because it directly accesses hardware to test system memory and disk drives whenever the computer is booted. This is how the local disk is able to load the operating system at boot, and generally most [newer Windows OSs] will store the BIOS on write-able RAM memory to allow updates when available – hence a more secure network. CIH also disabled Font Removal and created conflict problems in the computer’s TCP/IP protocol.
What the CIH virus did was temporarily disable the BIOS’s functionality. Without the BIOS initiated, a Windows machine simply will not boot. Users would try and reboot the machine from an .iso file placed on a floppy disk/CD/DVD/flash drive/etc. however once the damage is done, it can’t be reversed because the computer is designed to revert to the original BIOS code on the computer, not the correct BIOS from the outside source.
Users with advanced knowledge could take the BIOS chip from an identical second machine and switch them to fix the problem, however this takes extreme precision – the BIOS chip is physically soldered to the motherboard, and one mistake could render it unusable.
Originally, CIH affected the following Microsoft Operating Systems – Windows 95, Windows 98, and Windows ME. Over time, CIH also affected Windows NT, Windows 2000, XP, and Vista. In

Similar Documents

Premium Essay

A Malicious Program That Secretly Integrates Itself Into Program or Data Files.

...Summary A malicious program that secretly integrates itself into program or data files. It spreads by integrating itself into more files each time the host program is run. Disinfection & Removal Automatic Disinfection Allow F-Secure Anti-Virus to disinfect the relevant files. For more general information on disinfection, please see Removal Instructions. Technical Details The CIH virus was first located in Taiwan in early June 1998. After that, it has been confirmed to be in the wild worldwide. It has been among the ten most common viruses for several months. CIH has been spreading very quickly as it has been distributed through pirated software. History It seems that at least four underground pirate software groups got infected with the CIH virus during summer 1998. They inadvertently spread the virus globally in new pirated softwares they released through their own channels. These releases include some new games which will spread world-wide very quickly. There's also a persistent rumor about a 'PWA-cracked copy' of Windows 98 which would be infected by the CIH virus but F-Secure has been unable to confirm this. Later on, CIH was distributed by accident from several commercial sources, such as: • Origin Systems website where a download related to the popular Wing Commander game was infected • At least three European PC gaming magazines shipped magazines where the cover CD-ROM was infected - one of them even included a note inside advising users to disinfect their...

Words: 693 - Pages: 3

Premium Essay

Computer Virus

...Summary The project introduces the readers to the basic concept of virus and provides an insight of the history of virus. The report also analyses the spread of viruses and defines certain measures that computer users may take into account to avoid viruses. Overall ,it was learnt from the report that it is important to keep us updated about computer viruses to be able to successfully safeguard us from computer virus attacks Introduction to Computer Virus: Viruses are mischievous programs, the purpose of which is to disrupt the sensible use of computers. It is a type of a mal-ware and do little more than display a message( Usually insulting!!!) on the screen , but some are designed to act after a certain period of time and do such things as make the letters start to drop off the screen or even erase the entire contents of your hard disk. As their name suggests, viruses are able to spread by infecting other disks and they do this by copying themselves onto other disks which are being used by the computer. Viruses are little programs or scripts that can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly or to crash completely. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. They can self-modify or change over time as they copy themselves.  Viruses only spread across multiple computers if an uninfected computer is connected...

Words: 2136 - Pages: 9

Premium Essay

Internet Ages

...the network together. For example: telephone lines, fibre-optic cables, routers and gateways, and the computers themselves. The software is what enables us to use the hardware for communication and exchanging information. Just as your brain tells your body parts how to function and work together, the software governs the way computers in the network communicate with each other and perform functions. Software that enables networking follows a set of rules that are generally referred to as protocol. Networks can be interoperable. This means that different types of computers, using different operating systems, can be connected, communicate with each other, and share information - as long as they follow the network protocols. [pic] In Summary: A network is a group of two or more computers, connected together through a physical infrastructure, that are able to communicate and exchange information because they agree to use software that observes the same set of rules, or protocol. WHAT IS THE INTERNET? • A network of networks • Based on TCP/IP (Transmission Control Protocol/Internet Protocol) • Global • A variety of services and tools A network of networks, or "internet," is a group of two or more networks that are: • Interconnected physically • Capable of communicating and sharing data with each other • Able to act together as a single network Machines on one network can communicate with machines on other networks, and send data...

Words: 48401 - Pages: 194