Free Essay

Virus

In: Computers and Technology

Submitted By amyr0326
Words 2674
Pages 11
Abstract The Business problem to be sold is how to prevent viruses from infection the networked computers, education the staff on what a virus is and why it is important to know what harm it can do to you network. How to prevent getting a virus, and why you should use encryption software when sending important data to others in your business. This will provide instie for the company and help them keep cost down as they will not have to keep hiring or paying for an IT technician to fix and repair their systems, and also why the use of encryption usage will keep their confidential information from getting in to the wrong hands or the hands of a competitor.
Company Background Wing Warehouse is a sport bar and grill, famous for their wings and such. It is not just a bar it is a family fun and dining area also. The company is growing quickly in the last month 2 new locations in the Ohio area have opened. At the 17 locations just in Ohio 7 of those are run by one single manager, in saying so he must you a main office and network and share files and such for easy access with the other stores. The total numbers of employees that use the computer networked systems are around 3,000. In saying this even managers do not have all the computer knowledge they need to run a business successfully and without having any computer issues. Recently they were affected by a huge computer virus that shut down 7 of the stores for two days. Being that this is a very popular place for family and fun it took a huge toll on the company costing them thousands of dollars in loss of profit. I myself drove there to educate them and fix and repair their problem to get the company back to their dining, fun, drinks and customer service.
Business problem Although when things are running well the business thrives and does a huge deal of business. The problem is that the employees are not educated in working with computers and not often enough do they pay attention to what they may be opening up via E-mail or other things they may be searching for, or downloading to the companies PC. This in it self as stated above can take a huge toll on the company and cause a massive loss in profit, also leaving employess out of work for days until and IT team has time to come and fix the problem and restore the network so that Wing Warehouse can open again for business. The impact of not know about viruses or encryption software can be vital not only to this business but to any business that is networking and sending confidential data from store to store. This is why it is crucial for everyone to understand what a virus is, how it can affect the business and why encryption software is and why it should be used.
High-level solutions In order to protect the company from any further issues as the one they just had, the correct encryption software and antivirus software needs to be installed and explained how to be used and executed by all employees that are using the network. Encryption software should also be installed and explained in grave detail how to be used and how to make it work best for the company so that any critical information is not getting in the hands of a competitor for use to better their business.
Approach
First determine what type of anti-virus and encryption software is the best match for the company. Once decided upon install the appropriate software and set aside a time where all employees whom will be using the software can attend a class to help them learn the software and allow them to ask any and all questions before leaving the meeting. It is imperative that everyone involved is on the same page, understands the importance and can use the programs freely without any interruptions or problems.
Wing Warehouse systems Before this incident had happened Wing Warehouse did not see the importance of encryption software, and did not do the research on what anti-virus software that they should implement in to their business. They used normal e-mail services such as yahoo mail, G-mail and so on to communicate freely. Also text messages on their phones were being used as well. They have no anti-virus software on their phones and as for sending emails with no encryption they were leaving themselves wide open to the problem they ended up having when the business had to close for a three day period due to a virus and hacker incident.
Details about Virus and encryption A computer virus is created when a programmer creates computer code that has the capability to replicate itself, hide, and watch for a certain event to occur, and/or deliver a destructive or prankish payload on a disk or in a computer program. Viruses can attach themselves to just about any type of file and are spread as infected files are used by other computers. Some viruses are relatively harmless, while others are very devastating. They can destroy files, software, program applications, and cause the loss of data. New computer viruses are constantly being created by malicious programmers. Because of this, it is vital to keep anti-virus software on computers up-to-date. Some anti-virus software programs allow users to set them to silently check for updates whenever users are connected to the Internet. Others remind users to periodically check for updates. Worms and Trojans are closely related to viruses. A worm makes copies of itself on a computer, rather than infecting other files like viruses. A Trojan is a program that secretly installs itself on a computer and opens a back door to the computer so that malicious attacks can be remotely controlled. The actual Trojan is usually not damaging at first, but it is usually accompanied by other damaging programs.
What Viruses can infect Viruses can enter computers in many ways. Once a virus has entered a system, it will generally hide until it is unknowingly run by the user. A virus will not act until it has been run or some pre-established condition has been met, such as a specific date. The effects of a virus may not be noticed for some time after it has infected a computer. “Viruses can infect several components of a computer's operating and file system including:
• “System Sectors/Boot Records - Viruses can infect the parts of the system that are used to run programs and perform functions such as start up and shut down.
• Files - Viruses can infect program files. These viruses stick to program files such as .com, .exe, .sys, etc. Some viruses hide in the memory of the computer at first, while others simply attack a specific software program, such as Microsoft Word.
• Companion Files - Viruses can create companion files that are a special type of file that adds files that run on the hard disk.
• Macros - Viruses can infect macro or data files.
• Disk Clusters - Viruses can infect files through the disk directory.
• Batch Files - Viruses can use batch files to infect a computer.
• Source Code - Viruses can be in additional code that is added to actual program source code.
• Visual Basic Worms - These worms use the Visual Basic programming language to control a computer and perform tasks.” (http://www.online.tusc.k12.al.us/tutorials/viruses/viruses.htm)
Why Virus protection As you can see from above a virus can seriously harm your PC and as an organization with net worked computers it can spread through every computer very fast and do a lot of damage to your organization. If you get a virus and your systems are down this could result in loss of profit, your organization not operating normally for as long as it takes to get your systems cleaned up and running again. Knowing this and knowing how it can harm you should make it clear that you need to have anit-virus software running on each and every PC that is networked in your organization. There are a lot of companies out there who claim to have the best software but doing your research and knowing what best suits your organization is key to you security. Avg anti-virus is a wonderful program that scans every e-mail, web page, document and anything else yourself or your employees will access in their daily activities. You can setup a schedule for your software to run at whatever designated time you would like and set it to every day. In doing this you can have the scan preformed before any employee shows up at work or as soon as the turn on their PC the anti-virus software will perform its scan. Here is a list from avg.com describing everything that this anti-virus software will do to protect you and your organization:
• “AVG Anti-Virus, AVG Anti-Spyware, AVG Protective Cloud Technology and AVG Community Protection Network.
• AVG's core layers of protection make sure you can’t receive or unintentionally spread even the toughest threats.
• AVG Cloud Technology, new for 2011, constantly carries out tests ‘in the cloud’ over the internet to identify the latest emerging threats. Once we have identified threats we develop solutions and then update AVG on your computer in near real-time.
• AVG Community Protection Network is new for 2011 and is like an online neighborhood watch, helping everyone in the online community to protect each other. Information about the latest threats is collected from customers who choose to participate in the product improvement program and shared with the community to make sure everyone receives the best possible protection.
• AVG Anti-Spyware protects you from spyware and adware – the same kind of malware that is often very difficult to remove, which is why we prevent it from getting to you in the first place.
• AVG's Firewall protects you from malicious attacks by examining communications on each network port. It recognizes all attempts to invade your system and blocks them immediately, keeping both you and your private information safe.
• AVG Identity Protection is the outer layer of security, keeping your personal information safe by shielding your passwords, credit card numbers, and other digital valuables from prying eyes. AVG Identity Protection uses the latest behavioral technologies to identify software that behaves strangely and stop it before it can do any damage.”(Avg.com)

Encryption

Now that you know how to keep your data and PC’s safe you should also know how to encrypt your files when sending data so that in the case that the file or data being sent is intercepted it would be hard for the hacker to understand or be able to read the file. First allow me to explain what encryption is. Encryption is the conversion of data into a form, called a cipher text that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood. The use of encryption/decryption is as old as the art of communication. In wartime, a cipher, often incorrectly called a code, can be employed to keep the enemy from obtaining the contents of transmissions. (Technically, a code is a means of representing a signal without the intent of keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. More complex ciphers work according to sophisticated computer algorithms that rearranges the data bits in digital signals. In order to easily recover the contents of an encrypted signal, the correct decryption key is required. The key is an algorithm that undoes the work of the encryption algorithm. Alternatively, a computer can be used in an attempt to break the cipher. The more complex the encryption algorithm, the more difficult it becomes to eavesdrop on the communications without access to the key. Encryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired counterparts. Nevertheless, encryption/decryption is a good idea when carrying out any kind of sensitive transaction, such as a credit-card purchase online, or the discussion of a company secret between different departments in the organization. The stronger the cipher that is, the harder it is for unauthorized people to break it. Now that you understand encryption let me tell you about a software program you can use to help you with encrypting and decrypting your files. “CryptoForge is easy-to-use encryption software for personal and professional security. It allows you to protect the privacy of your sensitive files, folders, or email messages, by encrypting them with up to four strong encryption algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network -like the Internet- and still remain secret. Later, the information can be decrypted into its original form. CryptoForge adds to Windows the strongest encryption available today. The file encryption module enables you to encrypt, decrypt, and shred -with the built-in file shredder- files of any type, as well as entire folders and drives, from within Windows Explorer or My Computer with right-click ease. The file encryption module handles files of any type and size, on any kind of medium, like hard drives, removable drives, USB Pen-Drives, tape drives, network drives, etcetera. The text encryption module features a secure text editor that allows you to create, encrypt, and decrypt documents in a way that they can be sent via any email or messenger program. CryptoForge documents can contain embedded files, images, sound clips, spreadsheets, and any kind of objects in general.” (www.CryptoForge.com)
Education
So finally who should be educated in these areas and why? When in an organization with network computers and employees working on them for any amount of time should all be educated in these areas. If employees and other staff are not educated on what a virus can do, how it can harm their computers and others, or even why files should be encrypted they will not know what to look for that is suspicious and it could go un reported for periods of time making the threat and or attack great than it could have been had then been properly educated in these areas. It is a good idea for all organizations to have seminars or educations classes on the importance of virus protection, what symptoms to look for to prevent an attack or stolen data, and also why private and or classified information should be encrypted, how to encrypt it and decrypt it to keep it safe and secure from a person who may be interested in intercepting the information.
Summary
Now that I have provided you with the information of what a virus is, what it can do to your network and organization. Why it is important to have anti-virus software, how it will significantly protect your organization and what encryption is and why it is important to use. I hope you now understand why it is very important to take precautions with computers networked in your organization to make sure it is always up and running and never has a down time which could cause you a potential loss of profit. Arming yourself with this knowledge is one of the best ways to keep your organization safe, you can always also research new and upcoming threats, new software and anything that will keep your company protected. I hope that this report has given you the knowledge to prepare your organization to keep out threats and hackers, and how to encrypt and decrypt data so that it does not land in the wrong hands.

Similar Documents

Premium Essay

Influenza Virus

...Each year the influenza virus will infect anywhere between 5-20% of our Nations population and upwards of 200,000 will become hospitalized for further treatments from complications. Most cases can occur between the months of October through May among those January and February is the peak months of the flu season. People most at risk of complications are the elderly above 65 years or older, children younger than 2 years old, and anyone who have chronic health conditions. The influenza viruses are a respiratory illness that is a contagious infection that could be mild to severe in most cases but can lead to death if untreated. When you are infected you can be contagious from the day before symptoms appear up to seven days later. Most time the viruses spread from face to face contact with someone who is infected but the virus can also be passed on if touching a contaminated surface and then touching one’s mouth, eyes, or nose. The virus could last between one to two weeks before symptoms subside. The best way to minimize your chances of contracting an influenza virus is to get the flu vaccine each year. The flu vaccine was first isolated in 1930’s and during the 1940’s a vaccine was produced. Today, flu vaccines are available by shot or nasal spray. Currently scientist at NIAID are clinically testing the idea of an universal influenza vaccine that will combat any and all strains of flu viruses but more testing in needed. Hopefully with this medical advancement there......

Words: 283 - Pages: 2

Free Essay

Virus

...Michigan alone. Out of the 44 states that were involved in a breakdown of statewide reported infections, there were a total of 1,992 cases and 87 deaths reported. The Centers for Disease Control and Prevention (CDC) stated that there is a fatality rate that ranges from 3 to 15% and the first case reported of human infection was in 1999. The topics will discuss history, transmission, treatment, and prevention of the virus. West Nile Virus (WNV) is a virus that is normally seen in the Middle East, Africa, and West Asia through a patient located in Uganda (Henley, 2003). WNV can infect dogs, birds, horses, squirrels, mosquitos, humans, and other mammals. It was thought to have evolved from Israel, and has spread swiftly throughout the United States. The numbers of cases reported were from 20 to 60 per year, until in 2002 when the number rose to above 4,000 (Henley, 2003). The virus exhibits in various ways such as asymptomatic, mild, and severe infections that demonstrate specific outcomes. When the individual is asymptomatic there are no signs or symptoms of the virus. Mild infection or West Nile Fever carries symptoms of nausea and emesis, rash, muscle pain, enlarged lymph nodes, headaches, anorexia, and discomfort (Google, 2012). According to the Journal of Family Practice approximately 20% of individuals that are infected show these symptoms and a gestation time of 3 to 14 days and lasts anywhere from 3 to 6 days. The next way that WNV manifests is through severe......

Words: 1005 - Pages: 5

Premium Essay

Flu Virus

...Discussion of Communicable Disease: Seasonal Influenza Marcie E. Boone, RN Grand Canyon University- NRS- 427V September 2, 2014 Discussion of Communicable Disease: Seasonal Influenza Each year the general public is urged to take action to avoid getting the Seasonal Flu virus by, encourage the pubic to obtain the vaccine before January. It is also; widely made known to the general public the impact of the Flu virus and that it can lead death for some each. However, each year many choose to ignore the advice that is given. But, why is it so vital that we get our Flu vaccine. In this paper we will discuss that very question. We will discuss why the Seasonal Flu is considered a communicable disease, explain the demographics of interest, describe the determinants of health and how these factors contribute to the development of the virus, discuss the epidemiologic triangle as it relates to communicable diseases, explain the role of the community health nurse, identify national agency that addresses the communicable disease and describe how the organization contributes to resolving or reducing the impact of the virus. Description of Communicable Disease According to Global Health Communicable diseases are defined as diseases that are spread from one person to another or from an animal to a person. In addition, they are considered infectious and contagious. (Global Health, 2014). The Seasonal influenza will be referred to from this point on as the “Flu”. The Flu......

Words: 1931 - Pages: 8

Free Essay

Ebola Virus

...more popular than it someday and here I am now. This time recently, I attacked in Western Africa , remember my plan? I just continue it and guess what ? 15,400 are reported infected and 5,100 killed. I am now so powerful . Lately people do anything just to ignore me, but don’t they see that they’re the only one making way to let me in into their weak body? Now, they’re trying to kill me . but that’s a do or die game. Injecting what so ever medicines and liquids around their body with me let me do job more hard but I still have to try that’s why it results in their internal bleeding also some of my branches are transmitted through their bodily fluids like saliva, teardrops ,vomit and others. Honestly, I may just be a virus for them but I also have feelings , feelings cannot be understood by them .They do not believe to it ‘couz they’re not like me. Its just kind of abuse, abuse that neither rich or poor people do. Something that will remind them right now how hard it is to be poor. Not in material things but environmental and habitat. I might not be with them right now if they’re just like their foster-father of early days. They’re trying their best to kill me. The copies of fluid samples in laboratories, chemicals packed in medicines, formulas of what they are doing keeps them busy while me having such a hard time of enjoying what they’re doing is. Maybe I just have to continue my legacy and do watching how the body systems of the person......

Words: 422 - Pages: 2

Free Essay

The Ebola Virus

...The Ebola Virus 10 out of 10 people infected with it will die with die with it. It is airborne. It is 100 times more contagious than AIDS. It has no known origin, vaccination or cure. It kills you in such a way that even highly trained professionals get sick from just hearing about the effects. It is real and it has started its attack on the human race. Mrs. Landau and fellow classmates. The symptoms I have just described to you are real. These are symptoms to a real and fatal virus. The virus's name is Ebola and it has started its burn into our society. Like the AIDS virus, nothing really is known about it except its effect on people. Like the AIDS virus, there is no cure, treatment or vaccination. Unlike the AIDS virus which can take up to 8 to 10 years to kill you, this virus can take as little as to 8 to 10 hours to result fatally. It starts off with a fever and symptoms of the flu. Then the muscles in your face stop moving freezing your face into a mask. Just before death, you start to bleed from every opening in your body starting from your nose and mouth to your gums. Your internal organs liquefy and you vomit them up. In reality, the virus has attempted to turn its host into a virus. You are dead before you have even started to show signs of this virus. It is believed that it is some sort of mutated form of AIDS because it started in the original spot as AIDS did, Kinshasa and moved along the highway ripping its way through Northern Africa....

Words: 464 - Pages: 2

Free Essay

Chikungunya Virus

...Chikunganya virus. About thousands of people have been affected by Chikungunya virus throughout the world. During the years of 2005 and 2006, the virus altered over a millions of people in the Africa, Asia and the Indian subcontinent. Now, Chikungunya virus have spread to Europe, South American and North America. Chikungunya is a viral disease that is spread by mosquitoes. There are two type of mosquitos that spread this disease that we will talk further into in this paper. There is no signs or researches that the virus can be passed on or spread by contact from human to human. The nearness of mosquito breeding sites to human habitations is a major risk factor for Chikungunya. This disease shares a similar type of clinical signs with the dengue virus, therefore in locations where dengue is common, the virus can be misdiagnosed with the dengue virus. Once a person is affected by the virus it can lead to many symptoms but the most common symptoms can include muscle pain, headache, nausea, fatigue and rash. As of today, there is no vaccine to cure Chikungunya virus. Treatment of chikungunya is concentrated in relieving the virus. In this paper, we are going to learn everything about chikungunya virus starting with where it came from, how it expanded, the structure of its genome, and all the way until how to treat the virus. Chikungunya virus is known to be abbreviated as CHIKV The topics that we are going to discuss will be, the structure of the virus, the history of the......

Words: 876 - Pages: 4

Premium Essay

Trojan Virus

...Trojan horse viruses got their name from the siege of Troy, when the Greeks placed a large wooden horse outside the gates of Troy. The Trojans assumed it was a peace offering from the Greeks, and moved the horse inside the gates. The wooden horse was of course filled with hidden warriors, and once inside the gates, they broke out of the horse, and demolished the Trojans. Trojan horse programs work the same way. Trojan horses can destroy files and data, but commonly contain spyware, and even backdoor programs. Trojans are usually contained in software downloads from unknown or untrusted sources. Some people don't consider a trojan horse to be a virus, because it does not reproduce itself as a virus does, however it's ability to destroy files and install programs without the user knowing do indeed make it a virus. When a trojan horse is being used as spyware, it monitors your computer activities, and may even record keystrokes. This information is then sent to a third party, without you being aware of it. It may also cause pop up ads to display on your computer. The real danger is that information such as passwords and credit card and banking information can be delivered to that unknown third party, opening you up for identity theft. When the trojan horse installs a backdoor program, it sends information to the third party, making it possible for hackers to get into your system, via the backdoor, and to use the system just as if it were their own. They will often do...

Words: 573 - Pages: 3

Free Essay

Virus

...Virus H1N1 (Influenza) La gripe H1N1 es una enfermedad respiratoria contagiosa que causa síntomas similares a los de la influenza en las personas. Los virus de influenza cambian constantemente sus genes (mutacion). Este virus aparece en los cerdos tanto como en los humanos. El tratamiento para este virus es vacunarse y descansar en el hogar. Su supervivencia en el ambiente es de 1 a 2 dias. Herpes VHS02 La infección por el VHS-2 está muy extendida y se transmite sobre todo por vía sexual. Dura toda vida y no tiene cura. Se calcula que cada año se infectan con este virus unos 20 millones de personas. La infección por el VHS-2 está presente en todo el mundo y constituye un importante problema mundial. El VHS-2 causa herpes genital, que se caracteriza por la aparición ocasional de úlceras genitales dolorosas que pueden tener un importante efecto negativo en el bienestar y las relaciones personales. No existe tratamiento ya que no tiene cura y vive entre nosotros toda la vida. Su supervivencia es de 5 horas a 8 semanas en el ambiente Los virus estan vivos? Los virus son microorganismos acelulares, es decir, no tienen ni son células. Las células son las unidades de vida más pequeñas ya que cumplen las tres funciones vitales: nutrición, relación y reproducción. Los virus ni se nutren , ni se relacionan, y sólo se reproducen en el interior de otras células. Son parásitos obligados. Si los virus no están en el interior de las células ni siquiera se......

Words: 269 - Pages: 2

Free Essay

Zika Virus

...Ensayo de: “5 Cosas que Debes Saber Sobre el Virus de Zika” Este artículo es sobre factos esenciales sobre el virus de Zika. Cubre un nuevo virus que aparezco en Brasil. Aunque no está usualmente fatal, su potencial de ser un grande problema todos es lo suficientemente grande que personas necesita estar consciente de lo. En Latinoamérica, existe en Brasil, pero también se localiza en Hawai, África, el Caribe, Asia y las islas del pacífico. Noticias del virus realmente empezaron a aparecer cuando un bebé en Hawai era infectado. El artículo actual paso en CNN en miércoles, 20 de enero de 2016. Este artículo carga mucha importancia porque el Virus causa problemas para los recién nacidos. El virus de Zika no es contagioso, pero puede ser pasado de una mujer embarazada a su bebé (como un fetus), contacto sexual y de transfusión de sangre. Los mosquitos se cargan lo y, si contrates lo, no hay una cura. Explica que, como la mayoría de viruses, el descanso y muchos líquidos ayuda. También dice que debería “desaparecer en no más de un semana” y “medicamentos antinflamatorios no esteroides deben ser evitados”. Síntomas incluye a fiebre, dolor muscular, conjuntivitis y más. Con que está en las noticias, El Virus de Zika tenga la potencial de estar una grande problema para todos. El virus puede relacionar a las clases de ciencias biomédicas en McKenzie porque allí es donde puedes encontrar los únicos clases donde puedes aprender cómo tratar viruses, cómo funcionan...

Words: 256 - Pages: 2

Free Essay

Virus Titration

...of the culture. Virus titrations are used to estimate the virus concentration; it is a viral quantification technique. When detecting the virus, the cytopathic effect is looked at, whether there is lysis of the cells, vacuolation, formation of syncytia and the presence of inclusion bodies. TCID50, is the measure of the infectious titre. The end point dilution assay quantifies the amount of virus that is required to kill 50% of infected hosts or to produce a cytopathic effect in 50% of inoculated tissue culture cells (Kumar P, 2013). The purpose of the virus titration within tissue culture is to isolate and identify viruses within clinical samples, to carry out research on the viral structure, replication, genetics of the virus and the effect on the host cells, and also to prepare viruses for vaccine production. Results Table 1 Data used to determine the 50% endpoint using the Reed-Muench method Log of virus dilution | Infected test units | Cumulative infected (A) | Cumulative non-infected (B) | Ratio A/(A+B) | Percentage infected (%) | -1 | 5/5 | 37 | 0 | 38/38 | 100 | -2 | 5/5 | 32 | 0 | 33/33 | 100 | -3 | 5/5 | 27 | 0 | 28/28 | 100 | -4 | 5/5 | 22 | 0 | 23/23 | 100 | -5 | 5/5 | 17 | 0 | 18/18 | 100 | -6 | 4/5 | 12 | 1 | 12/13 | 92 | -7 | 3/5 | 8 | 3 | 8/11 | 72 | -8 | 2/5 | 5 | 6 | 5/11 | 45 | -9 | 2/5 | 3 | 9 | 3/12 | 25 | -10 | 2/5 | 1 | 13 | 1/14 | 7 | Figure 1 The percentage of infected cells by the virus. As the log of virus dilation......

Words: 982 - Pages: 4

Premium Essay

Melissa Virus

...“Melissa virus infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000. The virus code is contained in one macro named "Melissa"” (Melissa Virus). This virus comes with a harmful capability especially in Word 97. It has the power to spread its virus rapidly by using an email. When it is opened for the first time the virus checks if the user’s computer have the program MS Outlook installed. Then if it finds the program, the virus will then sends email to the email addresses found in the address book. “The email that is sent by the virus will contain the following subject header: ‘Subject: Important Message From ,’ where is the full name of the user sending the message. While the content of the body contains ‘Here is that document you asked for ... don't show anyone else ;-)’ with an attachment ‘list.doc’ which contains references to a lot of pornographic sites” (CERT® Advisory). Because of the email system the virus spreads quickly. “It created this entry in the Windows registry: HKEY_CURRENT_USERSoftwareMicrosoftOffice"Melissa?"="...by Kwyjibo" and in some cases when the day of the month equals the minute value, a payload of text is written at the current cursor position that says: "Twenty-two points, plus triple-word score, plus fifty points for using all my letters. Game's over. I'm outta here." The mentioned quote is taken from Bart Simpsons’ character in The Simpsons which disables some security safeguards of the computer” (Melissa virus). Melissa......

Words: 554 - Pages: 3

Free Essay

Virus

...Protection Methods 1. [pic]Anti-Virus Programs 2. [pic]Detection of an Unknown Virus 3. [pic]Prophylaxis of Computer Infection 4. [pic]Recovery of Affected Objects 5. [pic]Virus Algorithm Analysis 6. Protection Methods Anti-Virus Programs 1. [pic]Types of Anti-Viruses 2. [pic]Which Anti-Virus Program is Better? 3. [pic]Tips on Usage of Anti-Virus Programs "Working with bad data implies good code" Andrew Krukov, AVP Team Types of Anti-Viruses Anti-virus programs are the most effective means of fighting viruses. But I would like to point out at once that there are no anti-viruses guaranteeing 100 percent protection from viruses. Any declarations about their existence may be considered to be either an advertising trick or a sign of incompetence. Such systems do not exist, because, for each anti-virus algorithm, it is always possible to suggest a virus counter algorithm, making this particular virus invisible for this particular anti-virus (fortunately, the opposite is also true: for any anti-virus algorithm, it is always possible to create an anti-virus). Moreover, the impossibility of the existence of the absolute anti-virus has been mathematically proved based on the theory of finite slot machines - the author of this proof is Fred Cohen. It is also necessary to pay attention to some terms used in anti-virus program discussion: False Positive - when an uninfected object (file, sector or system memory) triggers the anti-virus program. The......

Words: 4870 - Pages: 20

Premium Essay

Computer Virus

...Summary The project introduces the readers to the basic concept of virus and provides an insight of the history of virus. The report also analyses the spread of viruses and defines certain measures that computer users may take into account to avoid viruses. Overall ,it was learnt from the report that it is important to keep us updated about computer viruses to be able to successfully safeguard us from computer virus attacks Introduction to Computer Virus: Viruses are mischievous programs, the purpose of which is to disrupt the sensible use of computers. It is a type of a mal-ware and do little more than display a message( Usually insulting!!!) on the screen , but some are designed to act after a certain period of time and do such things as make the letters start to drop off the screen or even erase the entire contents of your hard disk. As their name suggests, viruses are able to spread by infecting other disks and they do this by copying themselves onto other disks which are being used by the computer. Viruses are little programs or scripts that can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly or to crash completely. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. They can self-modify or change over time as they copy themselves.  Viruses only spread across multiple computers if an uninfected computer is connected...

Words: 2136 - Pages: 9

Premium Essay

Botulism Virus

...eating at a huge risk of contracting the Botulism virus. For this reason combined with all of Sarah’s symptoms it is obvious that she has contracted Botulism or Food Poisoning. A person often develops the Botulism virus by ingesting the toxin but in rare cases it can be inhaled. The toxin that causes Botulism is actually considered to be one of the most lethal substances known to man. If left untreated, it only takes 1 nanogram of the stuff to kill a human being. Because of this fact, the use of the Botulism virus as a biological weapon against the United States is always a deadly possibility. Also the fact that it only takes a small amount of contaminated food to poison a whole population makes a Botulism outbreak a constant threat to mankind. Due to the safety of the modern day canning process, the amount of Botulism cases has dropped to about 1,000 worldwide every year. The United States accounts for a little over 100 of those cases. Out of the 1,000 total Botulism cases about 25% are caused by ingesting unprocessed food grown from the earth’s soil, as did Sarah. There are many tell tale symptoms that can indicate a person has contracted the Botulism virus. After Sarah’s illness first broke out her body began to respond in a number of negative ways. Sarah experienced blurred vision, slurred speech, and difficulty swallowing which are all consistent with the symptoms of a person infected with the Botulism virus. Not only that, the police officer she flagged......

Words: 1434 - Pages: 6

Premium Essay

Virus

...A computer virus is a computer program that can replicate itself[1] and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. An example of a virus which is not a malware, but is putatively benevolent, is Fred Cohen's compression virus.[2] However, antivirus professionals do not accept the concept of benevolent viruses, as any desired function can be implemented without involving a virus (automatic compression, for instance, is available under the Windows operating system at the choice of the user). Any virus will by definition make unauthorised...

Words: 271 - Pages: 2