Free Essay

Virus

In: Computers and Technology

Submitted By rajatddun
Words 4870
Pages 20
Computer Viruses: Detection, Removal

& Protection Methods

1. [pic]Anti-Virus Programs
2. [pic]Detection of an Unknown Virus
3. [pic]Prophylaxis of Computer Infection
4. [pic]Recovery of Affected Objects
5. [pic]Virus Algorithm Analysis

6. Protection Methods

Anti-Virus Programs

1. [pic]Types of Anti-Viruses
2. [pic]Which Anti-Virus Program is Better?
3. [pic]Tips on Usage of Anti-Virus Programs
"Working with bad data implies good code"

Andrew Krukov, AVP Team
Types of Anti-Viruses
Anti-virus programs are the most effective means of fighting viruses. But I would like to point out at once that there are no anti-viruses guaranteeing 100 percent protection from viruses. Any declarations about their existence may be considered to be either an advertising trick or a sign of incompetence. Such systems do not exist, because, for each anti-virus algorithm, it is always possible to suggest a virus counter algorithm, making this particular virus invisible for this particular anti-virus (fortunately, the opposite is also true: for any anti-virus algorithm, it is always possible to create an anti-virus). Moreover, the impossibility of the existence of the absolute anti-virus has been mathematically proved based on the theory of finite slot machines - the author of this proof is Fred Cohen.
It is also necessary to pay attention to some terms used in anti-virus program discussion:
False Positive - when an uninfected object (file, sector or system memory) triggers the anti-virus program. The opposite term - False Negative - means that an infected object arrived undetected.
On-demand Scanning - a virus scan starts upon user request. In this mode, the anti-virus program remains inactive until a user invokes it from a command line, batch file or system scheduler.
On-the-fly Scanning - all the objects that are processed in any way (opened, closed, created, read from or written to etc.) are being constantly checked for viruses. In this mode, the anti-virus program is always active, it is a memory resident and checks objects without user request.

Which Anti-Virus Program is Better?

Which anti-virus program is the best? The answer is any program, if no viruses live in your computer and you use only a reliable virus-free software source and no other. However, if you like using new software or games, are an active e-mail user, using Word or exchanging Excel spreadsheets, then you should use some kind of anti-virus protection. Which one exactly - you should decide that for yourself, but there are several points of comparison of different anti-virus programs.
The quality of anti-virus programs is determined by the following points, from the most to least important: 1. Reliability and convenience of work - absence of anti-virus "hang ups" and other technical problems, requiring special technical knowledge from a user. 2. Quality of detection of all major kinds of viruses, scanning inside document files, spreadsheets (Microsoft Word, Excel, Office97), packed and archived files. Absence of false positives. Ability to cure infected objects. For scanners (see below), this means the availability of timely updates, which is the speed of tuning a scanner to new viruses. 3. Availability of anti-virus versions for all the popular platforms (DOS, Windows 3.xx, Windows95, WindowsNT, Novell NetWare, OS/2, Alpha, Linux etc.), not only on-demand scanning, but also scanning on-the-fly capabilities, availability of server versions with possibility for network administration. 4. Speed of work and other useful features, functions, bells and whistles.
Reliability of anti-virus programs is the most important criterion, because even the "absolute anti-virus" may become useless, if it is not able to finish the scanning process and hangs, leaving a portion of your disks and files unchecked, thereby leaving the virus in the system undetected. The anti-virus may also be useless if it demands some special knowledge from a user - most users are likely to simply ignore the anti-virus messages and press [OK] or [Cancel] at random, depending on which button is closer to the mouse cursor at this time. And if the anti-virus asks an ordinary user complicated questions too often, the user will most likely stop running such an anti-virus and even delete it from the disk.
Virus-detection quality is the next item, for quite an obvious reason. Anti-virus programs are called anti-virus, because their main purpose is to detect and remove viruses. Any highly sophisticated anti-virus is useless if it is unable to catch viruses, or does it with low efficiency. For example, if an anti-virus can not detect a certain polymorphic virus with 100% success, then after the system has been infected with this particular virus, such an anti-virus detects only part (say 99%) of all the infected files in a system. As little as 1% of infected files will remain undetected, but when this virus has infiltrated the system again, the anti-virus misses this 1% for the second time, but this time this will be 1% of the 99% left from the previous time, i.e., 1.99%. And so on until all the files become infected with the anti-virus being perfectly happy about it.
Therefore, detection quality is the second most important criterion of anti-virus quality; even more important than its multi-platform availability, various convenient features and so on. However, if an anti-virus with high quality of detection causes lots of false positives, then its level of usefulness drops significantly, because a user has to either delete uninfected files or analyze suspicious files all by himself, or gets used to these frequent false alarms and in the end misses the real virus warning (the boy who cried wolf?).
Multi-platform availability is the next item on the list, because for each OS, only a native for that OS program can make extensive use of these OS features. Non-native anti-viruses are often not as useful or sometimes even destructive. For example the "OneHalf" virus has infected a Windows95 or WindowsNT system. If you use a DOS anti-virus for disk decryption (this virus encrypts disk sectors), the results may be disappointing: the information on a disk will be damaged beyond repair, because Windows95/NT would not allow the anti-virus to use direct sector reads/writes while decrypting sectors, whereas a native Windows95 or NT anti-virus fulfills this task flawlessly.
On-the-fly checking capability is also a rather important feature of an anti-virus. Immediate, forced-virus checking of all incoming files and diskettes gives virtually a 100% guarantee of a virus free system, if, of course, the anti-virus is able to detect the supposed viruses. Anti-viruses capable of continuous file-server health care (for Novell Netware, Windows NT, and recently after massive invasion of macro viruses, also for email servers, that is scanning all the incoming mail) are very useful. If a file server version of an anti-virus contains network administration features, its value increases even more.
The next important criterion is working speed. If full system check requires several hours to complete, it is unlikely that most users are going to run it frequently. Also the slowness of anti-virus does not imply that it catches more viruses or does it better than its faster counterpart. Different anti-viruses utilize different virus scanning algorithms, some being faster and of higher quality while another may be slower and not so of such quality. Everything here depends on the abilities and competence of developers of a particular anti-virus.
Various additional options are last in the anti-virus quality criteria list because very often these options have no effect on overall usefulness. However these additional options make user's life much easier and maybe push him to run anti-virus more often.

Tips on Usage of Anti-Virus Programs

Always see that you have the latest antiviral software version available. If software updates are available, check them for "freshness". Usually new versions of anti-viruses are announced, so it is sufficient to visit the corresponding WWW/ftp/BBS sites.
Anti-virus "nationality" in most cases does not matter, because, at the present time, the processes of virus emigration to other countries and antiviral software immigration is limited only by the speed of the Internet, so both viruses and anti-viruses know no borders.
If a virus has been found on your computer, it is imperative not to panic (for those who "meet" viruses daily, a remark like this may seem funny). Panicing never does any good; thoughtless actions may result in bitter consequences.
If a virus is found in some newly arrived file(s) and has not infiltrated the system yet, there is no reason to worry: just kill the file (or remove the virus with your favorite antiviral program) and you may keep on working. If you have found a virus in several files at once or in the boot sector, the problem becomes more serious, but still it can be resolved - anti-virus developers are not drones.
Once more, you should pay attention to the term "false positive." If in some SINGLE file "living" in your computer system for a long time some single anti-virus has detected a virus, this is most likely a false positive. If this file has been run several times, but the virus still has not crawled to other files, then this is extremely strange. Try to check this file with some other anti-viruses. If all of them keep silent, send this file to the research lab of the company that developed the anti-virus, which was triggered by it.
However, if a virus has really been found in your computer, you should do the following: 1. In the case of a file-virus detection, if the computer is connected to a network, you should disconnect it from the network and inform the system administrator. If the virus has not yet infiltrated the network, this will protect the server and other workstations from virus attack. If the virus has already infected the server, disconnection from the network will not stop the virus from infiltrating into your computer again after its treatment. Reconnection to the network must be done only after all the servers and workstations have been cured. If a boot virus has been found, you should not disconnect your computer from the network: viruses of this kind do not spread over it (except file-boot viruses, of course). If the computer is infected with a macro-virus, then instead of disconnecting from network, it is enough to make sure that the corresponding editor (Word/Excel) is inactive on any computer. 2. If a file or boot virus has been detected, you should make sure that either the virus is non-resident, or the resident part of it has been disarmed: when started, some (but not all) anti-viruses automatically disable resident viruses in memory. Removal of a virus from the memory is necessary to stop its spreading. When scanning files, anti-viruses open them; many resident viruses intercept this event and infect the files being opened. As a result, the majority is infected because the virus has not been removed from memory yet. The same thing may happen in the case of boot viruses - all the diskettes being checked may become infected. If the anti-virus you use does not remove viruses from memory, you should reboot the computer from a known uninfected and well-written, protected system diskette. You should do a "cold" boot (by pressing "Reset" or power "off/on"), because several viruses "survive" after a "warm" boot. Some viruses apply a technique allowing for their survival even after the "cold" boot (see the "Ugly" virus for example), so you should also check the item "boot sequence A:, C:" in the machine's BIOS to ensure DOS boots from the system diskette and not from infected hard drive. In addition to resident/non-resident capabilities, it is useful to make yourself acquainted with other features of the virus: types of files it infects, its effects etc. The only known source of such information, containing data of this kind on virtually all known viruses, is "The AVP Virus Encyclopedia." 3. With the help of the anti-viral program, you should restore the infected files and check them for functionality. At the same time or before treatment, you should backup the infected files and print/save the anti-virus log somewhere. This is necessary for restoring files in case the treatment proves to be unsuccessful due to an error in anti-virus-treatment module, or because of an inability of this anti-virus to cure this kind of virus. In this case, you will have to resort to the services of some other anti-virus. It is much more reliable, of course, to simply restore the backed up files (if available), but, still, you will need to resort to an anti-virus - what if all the copies of the virus haven't been destroyed, or some backed up files are infected, too? It is worth mentioning that the quality of file restoration by many antiviral programs leaves much to be desired. Many popular anti- viruses often irreversibly damage files instead of curing them. Therefore, if file loss undesirable, you should execute all the previous recommendations completely. In the case of a boot virus, it is necessary to check all the diskettes to see whether they are bootable (i.e., contain DOS files) or not. Even a completely blank diskette may become a source of viral infection - it is enough to forget it in the drive and reboot (of course, if a diskette boot is enabled in BIOS). Besides the above-mentioned items, you should pay special attention to the cleanness of modules, compressed with utilities like LZEXE, PKLITE or DIET, files inside archives (ZIP, ARC, ICE, ARJ, etc.) and self-extracting data files (created by the likes of ZIP2EXE). If you accidentally pack a virus in an infected file, it will be virtually impossible to detect and remove the virus from it without unpacking. In this case, a situation in which all the antiviral programs, unable to scan inside archives, report that all disks are virus free (however, after some time, the virus re-emerges) will become typical. Colonies of viruses may infiltrate backup copies of software, too. Moreover, archives and back-up copies are the main source of long known viruses. A virus may "sit" in a distribution copy of some software for ages and then suddenly appear after software installation on a new computer. Nobody can guarantee removal of all copies of a computer virus, because a file virus may attack not only executables, but also overlay modules not having COM or EXE extensions. A boot virus may remain on some diskettes and appear suddenly after an attempt to boot from it. Therefore, it is sensible to use some resident anti-virus scanner continuously for some time after virus removal (not to mention that it's better to a use scanner at all times).

Detection of an Unknown Virus

1. [pic]Detection of a TSR Virus
2. [pic]Detection of a Boot Virus
3. [pic]Detection of a File Virus
4. [pic]Detection of a Macro Virus

Detection of a TSR Virus
In this chapter, we discuss the situations in which a user suspects that his computer is infected, but none of the anti-viruses known to him tested positive. How and where do you look for a virus? What tools are needed for this, what methods do you use and what rules do you follow?
The very first rule is - don't panic. This will never do any good. You are neither the first nor the last person whose computer has been infected. Besides, not every computer malfunction is attributed to a virus. You should remind yourself of the 3 c's more often - "cool, calm and collected." And viral infection is not the worst thing that could happen to a computer.
If you are not sure yourself, ask a system programmer for help; he will locate the virus and help remove it (if it is really a virus), or he might help find the reason for the "strange" behavior of your computer.
You should not call anti-virus companies and ask, "I think I have a virus in my computer. What should I do?". They will not be able to help you, because to remove a virus, they need somewhat more information. For an anti-virus company to be of real help, you should send them a sample of the virus - an infected file in case of a file virus, or an infected diskette (or its image) in case of a boot virus. How to detect infected files/disks will be discussed further.
Don't forget to boot up your computer from a backup copy of DOS on a virus-free and write-protected diskette before running any kind of antiviral software, and use subsequent programs only from diskettes. This is necessary to protect the system from a resident virus, because it may block program execution or use the running to infect the checked files/disks. Moreover, there are a lot of viruses that destroy data on disks if they "suspect" that their code has been uncovered. This condition, of course, does not apply to macro-viruses and disks partitioned in one of the new formats (NTFS, HPFS) - after DOS boots up, such a disk becomes inaccessible for DOS programs.

Detection of a Boot Virus

As a rule, boot sectors of disks carry small programs, whose purpose is to determine borders and sizes of logical disks (for MBR of hard drives) or operating system boot up (for boot sector).
In the beginning, you should read the contents of the sector suspected of virus presence. DISKEDIT from Norton Utilities or AVPUTIL from AVP Pro are best suited for that.
Some boot viruses may be detected almost immediately by the presence of various text strings (for example, the "Stoned" virus contains the strings: "Your PC is now Stoned!", "LEGALISE MARIJUANA!"). Some boot viruses infecting hard disks may be found in the opposite way, by the absence of strings, which must be in the boot sector. Such strings are: system file names (for example, "IO SYSMSDOS SYS") and error message strings. Absence of or change in a header string of the boot sector (the string containing the DOS version number or software vendor name, e.g., "MSDOS5.0" or "MSWIN4.0") may also be a signal of viral infection, but only if the computer does not have Windows95/NT installed - these systems, for reasons unknown, record random text string into a diskette's boot sector header.
Standard MS-DOS loader located in MBR occupies less than half a sector, and many viruses infecting the MBR of a hard drive are easily spotted by an increase in the size of the code in MBR sector.
However, there also are viruses, which infiltrate the loader without changing its text strings and with minimum changes to the loader code. To detect such a virus, in most cases, it is sufficient to format a diskette on a 100% uninfected computer, save its boot sector as a file, use this diskette for some time on the infected computer (read/write several files) and afterwards compare its current boot sector with the original one on an uninfected computer. If the boot code underwent some changes, then the virus has been caught.
Also, there are viruses using more complicated infecting techniques, for example, changing as little as 3 bytes of the Disk Partition Table, corresponding to the address of the active boot sector. To identify such a virus, it is necessary to explore boot sector codes in greater detail, up to the complete analysis of its code algorithm.
These arguments are based on the fact that standard loaders (programs saved by the operating system in boot sectors) employ standard algorithms for the loading of an operating system and are implemented in accordance with this system's standards. However, if the disks have been formatted with utilities other than standard DOS (for example, Disk Manager), then, when detecting a virus in them, one should analyze the operating algorithm and implementation of loaders created by such a utility.

Detection of a File Virus

As already mentioned, viruses are divided into resident and non-resident. Resident viruses found so far stood out for their much greater craftiness and sophistication in comparison with non-resident. Therefore, we shall discuss the simplest case for starters - attack of an unknown non-resident virus. Such a virus activates itself upon starting of any infected programs, does all it has to, passes control to the host program and afterwards (unlike resident viruses) does not interfere with its work. To detect such a virus, it is necessary to compare file size on disks and in backup copies (the reminder about the importance of keeping such copies has already become commonplace). If this doesn't help, you should do a byte comparison of distribution copies with the working copies you use. At the present, there are many such programs, the simplest of them (COMP utility) can be found in DOS.
One may also examine a hex dump of executables. In some cases, it is possible to immediately detect viral presence by some text strings residing in its code. For example, many viruses contain strings ".COM", "*.COM", ".EXE", "*.EXE", "*.*", "MZ", "COMMAND" etc. These strings may often be found at the top or end of the infected files.
There is yet one more method for the visual detection of a virus in a DOS file. It is based on the fact that executables, the source code of which was in a high level programming language, have a quite definite inside structure. In the case of Borland or Microsoft C/C++ program, the code segment is at the very beginning of a file, immediately followed by the data segment containing a copyright notice with the name of a compiler vendor company at the beginning. If the data segment in the dump is followed by one more code segment, then it might very well be that the file is infected with a virus.
The same is true for the most part of the viruses, whose target is Windows and OS/2 files. In these, OS executables have the following standard order of segments: code segment(s) followed by data segments. If a data segment is followed by one more code segment, it may be the sign of the presence of a virus.
If a user is familiar with the assembly language, he may try to figure out the code of suspicious programs. For a quick look, most suitable are the following utilities: HIEW (Hacker's View) or AVPUTIL. For more detailed analysis, one will require disassembly software - Sourcer or IDA.
It is recommended to run one of the resident antiviral behavior blockers and follow its messages about "suspicious" actions of programs (writes to COM or EXE files, writes to absolute disk addresses etc.). There are blockers not only intercepting such actions, but also displaying messages about the originating addresses of such calls (AVPTSR is one such blocker). Having discovered such a message, one should find out what program caused it and analyze its code with the help of a resident disassembler (for example, AVPUTIL.COM). Tracing the interruptions, INT 13h and 21h are often a great help in the analysis of TSR programs.
One must note that the resident DOS blockers often are powerless when working in a DOS window under Windows95/NT, because Windows95/NT allows viruses to work bypassing the blocker (and the rest TSR programs with it). DOS blockers are also unable to stop the spreading of Windows viruses.
The above methods of detection of file and boot viruses are suitable for most resident and non-resident viruses. But these methods fail if a virus is Stealth by design, which renders useless the majority of modern resident blockers, file comparison and sector read utilities.

Detection of a Macro Virus

Characteristic features of macro-viruses are: • Word: inability to convert an infected Word document to another format. • Word: infected files have the Template format, because when infecting, Word viruses convert files from the Word Document format to Template format. • Word 6 only: inability to save a document to another directory or disk with the "Save As" command. • Excel/Word: "alien" files are present in the STARTUP directory • Excel versions 5 and 7: Cookbooks contain redundant and hidden Sheets.
To check the system for viral presence, you may use the Tools/Macro menu item. If "alien" macros have been found, they may belong to a virus, but this method fails in the case of Stealth viruses, which disable this menu item, which in itself is sufficient to consider the system infected.
Many viruses contain errors or work incorrectly in various versions of Word/Excel, resulting in Word/Excel error messages, for example: WordBasic Err = Error number

If such a message appears while editing a new document or table, and you definitely do not use-run any user macros, then this may also serve as a sign of system infection.
Changes in Word, Excel and Windows system configuration files are also a sign of possible infection. Many viruses change menu items under "Tools/Options" in one way or another - enabling or disabling the following functions: "Prompt To Save Normal Template," "Allow Fast Save," "Virus Protection." Some viruses set file passwords after infecting them, and a lot of viruses create new sections and/or options in the Windows configuration file (WIN.INI).
Of course, such obvious facts such as appearing messages or dialogues with strange contents or in a language other than the default for this installation are also signs of virus.

Prophylaxis of Computer Infection

1. [pic]Where do Viruses Come From
2. [pic]The Main Rules of Protection
3. [pic]The Problem of Macro Virus Protection
One of the major methods of fighting computer viruses, like in medical science, is timely prophylaxis or preventive measures. Computer preventive measures suggest following a small set of rules, allowing to lower considerably the possibility of virus infection and data loss.
To define the main rules of computer hygiene, it is necessary to find out the main ways of virus intrusion into computer and computer network.

Where do Viruses Come From

1. [pic]Global Access Networks and EMail
2. [pic]Email Conferences, File Servers, FTP and BBS
3. [pic]Local Access Networks
4. [pic]Pirated Software
5. [pic]General Access Personal Computers
6. [pic]Repair Services

Global Access Networks and EMail

Today one of the primary sources of viral infection is the Internet. The most part of cases of infection takes place while exchanging messages in the Word/Office97 formats. The unsuspecting user of an infected by macro virus editor software sends infected letters to addressees, who in their turn send new infected letters and so on.
Let's suppose that the user is engaged in email exchange with five addressees. After sending an infected message all the five computers that receive these become infected: +-----+ |.....| +-+-----+-+ --+--------+-------------+-------------+-------------+ +---------+ | | | | | | V V V V +-----+ +--> +--> +--> +--> +--> +--> +--> +--> +--> +--> +--> +--> +--> +--> +--> +--> +--> +--> +-->

Therefore, on the second level of exchange we have as much as 1+5+20=26 computers. It addressees exchange letters once a day, then by the end of the working week (five days) a minimum of 1+5+20+80+320=426 computers will become infected. It's easy to calculate that in ten days more than 100,000 computers may become infected! Moreover this number is likely to become four times that large with each passing day.
This is the most common case of virus spreading registered by anti-virus companies. Often enough an infected document file or Excel spreadsheet may get into business mailing lists of large companies. In this case not 5 but hundreds and even thousands of subscribers become victims of such mailings, who in turn may then send infected files to tens of thousands of theirs subscribers.

Email Conferences, File Servers, FTP and BBS

General access file servers and email conferences are also one of the main sources of virus spreading. Virtually every week there appear messages that some user infected his computer with a virus which had been downloaded from a BBS system, FTP server, or emailed to some Usenet group.
Often enough authors of viruses upload infected files to several BBS/FTP sites, or are sent to several groups simultaneously, often these files are camouflage as new versions of some software (sometimes as new versions of anti-virus software).
In case of mass virus outflows to BBS/FTP file servers thousands of computers main visually simultaneously become infected, but in most cases DOS or Windows viruses are uploaded, which in most cases have much lower speed of spreading then macro viruses have. For this reason incidents like this virtually never lead to mass epidemics, which is not so for macro viruses.

Local Access Networks

The third way of "fast infection" is via local access networks. If no necessary safety measures are taken, an infected workstation after logging on to a network infects one or several system utility files on a network server (LOGIN.COM in case of Novell NetWare): +---+ | |

Similar Documents

Free Essay

Virus

...Business problem to be sold is how to prevent viruses from infection the networked computers, education the staff on what a virus is and why it is important to know what harm it can do to you network. How to prevent getting a virus, and why you should use encryption software when sending important data to others in your business. This will provide instie for the company and help them keep cost down as they will not have to keep hiring or paying for an IT technician to fix and repair their systems, and also why the use of encryption usage will keep their confidential information from getting in to the wrong hands or the hands of a competitor. Company Background Wing Warehouse is a sport bar and grill, famous for their wings and such. It is not just a bar it is a family fun and dining area also. The company is growing quickly in the last month 2 new locations in the Ohio area have opened. At the 17 locations just in Ohio 7 of those are run by one single manager, in saying so he must you a main office and network and share files and such for easy access with the other stores. The total numbers of employees that use the computer networked systems are around 3,000. In saying this even managers do not have all the computer knowledge they need to run a business successfully and without having any computer issues. Recently they were affected by a huge computer virus that shut down 7 of the stores for two days. Being that this is a very popular place for family and fun it took a......

Words: 2674 - Pages: 11

Premium Essay

Influenza Virus

...Each year the influenza virus will infect anywhere between 5-20% of our Nations population and upwards of 200,000 will become hospitalized for further treatments from complications. Most cases can occur between the months of October through May among those January and February is the peak months of the flu season. People most at risk of complications are the elderly above 65 years or older, children younger than 2 years old, and anyone who have chronic health conditions. The influenza viruses are a respiratory illness that is a contagious infection that could be mild to severe in most cases but can lead to death if untreated. When you are infected you can be contagious from the day before symptoms appear up to seven days later. Most time the viruses spread from face to face contact with someone who is infected but the virus can also be passed on if touching a contaminated surface and then touching one’s mouth, eyes, or nose. The virus could last between one to two weeks before symptoms subside. The best way to minimize your chances of contracting an influenza virus is to get the flu vaccine each year. The flu vaccine was first isolated in 1930’s and during the 1940’s a vaccine was produced. Today, flu vaccines are available by shot or nasal spray. Currently scientist at NIAID are clinically testing the idea of an universal influenza vaccine that will combat any and all strains of flu viruses but more testing in needed. Hopefully with this medical advancement there......

Words: 283 - Pages: 2

Free Essay

Virus

...Michigan alone. Out of the 44 states that were involved in a breakdown of statewide reported infections, there were a total of 1,992 cases and 87 deaths reported. The Centers for Disease Control and Prevention (CDC) stated that there is a fatality rate that ranges from 3 to 15% and the first case reported of human infection was in 1999. The topics will discuss history, transmission, treatment, and prevention of the virus. West Nile Virus (WNV) is a virus that is normally seen in the Middle East, Africa, and West Asia through a patient located in Uganda (Henley, 2003). WNV can infect dogs, birds, horses, squirrels, mosquitos, humans, and other mammals. It was thought to have evolved from Israel, and has spread swiftly throughout the United States. The numbers of cases reported were from 20 to 60 per year, until in 2002 when the number rose to above 4,000 (Henley, 2003). The virus exhibits in various ways such as asymptomatic, mild, and severe infections that demonstrate specific outcomes. When the individual is asymptomatic there are no signs or symptoms of the virus. Mild infection or West Nile Fever carries symptoms of nausea and emesis, rash, muscle pain, enlarged lymph nodes, headaches, anorexia, and discomfort (Google, 2012). According to the Journal of Family Practice approximately 20% of individuals that are infected show these symptoms and a gestation time of 3 to 14 days and lasts anywhere from 3 to 6 days. The next way that WNV manifests is through severe......

Words: 1005 - Pages: 5

Premium Essay

Flu Virus

...Discussion of Communicable Disease: Seasonal Influenza Marcie E. Boone, RN Grand Canyon University- NRS- 427V September 2, 2014 Discussion of Communicable Disease: Seasonal Influenza Each year the general public is urged to take action to avoid getting the Seasonal Flu virus by, encourage the pubic to obtain the vaccine before January. It is also; widely made known to the general public the impact of the Flu virus and that it can lead death for some each. However, each year many choose to ignore the advice that is given. But, why is it so vital that we get our Flu vaccine. In this paper we will discuss that very question. We will discuss why the Seasonal Flu is considered a communicable disease, explain the demographics of interest, describe the determinants of health and how these factors contribute to the development of the virus, discuss the epidemiologic triangle as it relates to communicable diseases, explain the role of the community health nurse, identify national agency that addresses the communicable disease and describe how the organization contributes to resolving or reducing the impact of the virus. Description of Communicable Disease According to Global Health Communicable diseases are defined as diseases that are spread from one person to another or from an animal to a person. In addition, they are considered infectious and contagious. (Global Health, 2014). The Seasonal influenza will be referred to from this point on as the “Flu”. The Flu......

Words: 1931 - Pages: 8

Free Essay

Ebola Virus

...more popular than it someday and here I am now. This time recently, I attacked in Western Africa , remember my plan? I just continue it and guess what ? 15,400 are reported infected and 5,100 killed. I am now so powerful . Lately people do anything just to ignore me, but don’t they see that they’re the only one making way to let me in into their weak body? Now, they’re trying to kill me . but that’s a do or die game. Injecting what so ever medicines and liquids around their body with me let me do job more hard but I still have to try that’s why it results in their internal bleeding also some of my branches are transmitted through their bodily fluids like saliva, teardrops ,vomit and others. Honestly, I may just be a virus for them but I also have feelings , feelings cannot be understood by them .They do not believe to it ‘couz they’re not like me. Its just kind of abuse, abuse that neither rich or poor people do. Something that will remind them right now how hard it is to be poor. Not in material things but environmental and habitat. I might not be with them right now if they’re just like their foster-father of early days. They’re trying their best to kill me. The copies of fluid samples in laboratories, chemicals packed in medicines, formulas of what they are doing keeps them busy while me having such a hard time of enjoying what they’re doing is. Maybe I just have to continue my legacy and do watching how the body systems of the person......

Words: 422 - Pages: 2

Free Essay

The Ebola Virus

...The Ebola Virus 10 out of 10 people infected with it will die with die with it. It is airborne. It is 100 times more contagious than AIDS. It has no known origin, vaccination or cure. It kills you in such a way that even highly trained professionals get sick from just hearing about the effects. It is real and it has started its attack on the human race. Mrs. Landau and fellow classmates. The symptoms I have just described to you are real. These are symptoms to a real and fatal virus. The virus's name is Ebola and it has started its burn into our society. Like the AIDS virus, nothing really is known about it except its effect on people. Like the AIDS virus, there is no cure, treatment or vaccination. Unlike the AIDS virus which can take up to 8 to 10 years to kill you, this virus can take as little as to 8 to 10 hours to result fatally. It starts off with a fever and symptoms of the flu. Then the muscles in your face stop moving freezing your face into a mask. Just before death, you start to bleed from every opening in your body starting from your nose and mouth to your gums. Your internal organs liquefy and you vomit them up. In reality, the virus has attempted to turn its host into a virus. You are dead before you have even started to show signs of this virus. It is believed that it is some sort of mutated form of AIDS because it started in the original spot as AIDS did, Kinshasa and moved along the highway ripping its way through Northern Africa....

Words: 464 - Pages: 2

Free Essay

Chikungunya Virus

...Chikunganya virus. About thousands of people have been affected by Chikungunya virus throughout the world. During the years of 2005 and 2006, the virus altered over a millions of people in the Africa, Asia and the Indian subcontinent. Now, Chikungunya virus have spread to Europe, South American and North America. Chikungunya is a viral disease that is spread by mosquitoes. There are two type of mosquitos that spread this disease that we will talk further into in this paper. There is no signs or researches that the virus can be passed on or spread by contact from human to human. The nearness of mosquito breeding sites to human habitations is a major risk factor for Chikungunya. This disease shares a similar type of clinical signs with the dengue virus, therefore in locations where dengue is common, the virus can be misdiagnosed with the dengue virus. Once a person is affected by the virus it can lead to many symptoms but the most common symptoms can include muscle pain, headache, nausea, fatigue and rash. As of today, there is no vaccine to cure Chikungunya virus. Treatment of chikungunya is concentrated in relieving the virus. In this paper, we are going to learn everything about chikungunya virus starting with where it came from, how it expanded, the structure of its genome, and all the way until how to treat the virus. Chikungunya virus is known to be abbreviated as CHIKV The topics that we are going to discuss will be, the structure of the virus, the history of the......

Words: 876 - Pages: 4

Premium Essay

Trojan Virus

...Trojan horse viruses got their name from the siege of Troy, when the Greeks placed a large wooden horse outside the gates of Troy. The Trojans assumed it was a peace offering from the Greeks, and moved the horse inside the gates. The wooden horse was of course filled with hidden warriors, and once inside the gates, they broke out of the horse, and demolished the Trojans. Trojan horse programs work the same way. Trojan horses can destroy files and data, but commonly contain spyware, and even backdoor programs. Trojans are usually contained in software downloads from unknown or untrusted sources. Some people don't consider a trojan horse to be a virus, because it does not reproduce itself as a virus does, however it's ability to destroy files and install programs without the user knowing do indeed make it a virus. When a trojan horse is being used as spyware, it monitors your computer activities, and may even record keystrokes. This information is then sent to a third party, without you being aware of it. It may also cause pop up ads to display on your computer. The real danger is that information such as passwords and credit card and banking information can be delivered to that unknown third party, opening you up for identity theft. When the trojan horse installs a backdoor program, it sends information to the third party, making it possible for hackers to get into your system, via the backdoor, and to use the system just as if it were their own. They will often do...

Words: 573 - Pages: 3

Free Essay

Virus

...Virus H1N1 (Influenza) La gripe H1N1 es una enfermedad respiratoria contagiosa que causa síntomas similares a los de la influenza en las personas. Los virus de influenza cambian constantemente sus genes (mutacion). Este virus aparece en los cerdos tanto como en los humanos. El tratamiento para este virus es vacunarse y descansar en el hogar. Su supervivencia en el ambiente es de 1 a 2 dias. Herpes VHS02 La infección por el VHS-2 está muy extendida y se transmite sobre todo por vía sexual. Dura toda vida y no tiene cura. Se calcula que cada año se infectan con este virus unos 20 millones de personas. La infección por el VHS-2 está presente en todo el mundo y constituye un importante problema mundial. El VHS-2 causa herpes genital, que se caracteriza por la aparición ocasional de úlceras genitales dolorosas que pueden tener un importante efecto negativo en el bienestar y las relaciones personales. No existe tratamiento ya que no tiene cura y vive entre nosotros toda la vida. Su supervivencia es de 5 horas a 8 semanas en el ambiente Los virus estan vivos? Los virus son microorganismos acelulares, es decir, no tienen ni son células. Las células son las unidades de vida más pequeñas ya que cumplen las tres funciones vitales: nutrición, relación y reproducción. Los virus ni se nutren , ni se relacionan, y sólo se reproducen en el interior de otras células. Son parásitos obligados. Si los virus no están en el interior de las células ni siquiera se......

Words: 269 - Pages: 2

Free Essay

Zika Virus

...Ensayo de: “5 Cosas que Debes Saber Sobre el Virus de Zika” Este artículo es sobre factos esenciales sobre el virus de Zika. Cubre un nuevo virus que aparezco en Brasil. Aunque no está usualmente fatal, su potencial de ser un grande problema todos es lo suficientemente grande que personas necesita estar consciente de lo. En Latinoamérica, existe en Brasil, pero también se localiza en Hawai, África, el Caribe, Asia y las islas del pacífico. Noticias del virus realmente empezaron a aparecer cuando un bebé en Hawai era infectado. El artículo actual paso en CNN en miércoles, 20 de enero de 2016. Este artículo carga mucha importancia porque el Virus causa problemas para los recién nacidos. El virus de Zika no es contagioso, pero puede ser pasado de una mujer embarazada a su bebé (como un fetus), contacto sexual y de transfusión de sangre. Los mosquitos se cargan lo y, si contrates lo, no hay una cura. Explica que, como la mayoría de viruses, el descanso y muchos líquidos ayuda. También dice que debería “desaparecer en no más de un semana” y “medicamentos antinflamatorios no esteroides deben ser evitados”. Síntomas incluye a fiebre, dolor muscular, conjuntivitis y más. Con que está en las noticias, El Virus de Zika tenga la potencial de estar una grande problema para todos. El virus puede relacionar a las clases de ciencias biomédicas en McKenzie porque allí es donde puedes encontrar los únicos clases donde puedes aprender cómo tratar viruses, cómo funcionan...

Words: 256 - Pages: 2

Free Essay

Virus Titration

...of the culture. Virus titrations are used to estimate the virus concentration; it is a viral quantification technique. When detecting the virus, the cytopathic effect is looked at, whether there is lysis of the cells, vacuolation, formation of syncytia and the presence of inclusion bodies. TCID50, is the measure of the infectious titre. The end point dilution assay quantifies the amount of virus that is required to kill 50% of infected hosts or to produce a cytopathic effect in 50% of inoculated tissue culture cells (Kumar P, 2013). The purpose of the virus titration within tissue culture is to isolate and identify viruses within clinical samples, to carry out research on the viral structure, replication, genetics of the virus and the effect on the host cells, and also to prepare viruses for vaccine production. Results Table 1 Data used to determine the 50% endpoint using the Reed-Muench method Log of virus dilution | Infected test units | Cumulative infected (A) | Cumulative non-infected (B) | Ratio A/(A+B) | Percentage infected (%) | -1 | 5/5 | 37 | 0 | 38/38 | 100 | -2 | 5/5 | 32 | 0 | 33/33 | 100 | -3 | 5/5 | 27 | 0 | 28/28 | 100 | -4 | 5/5 | 22 | 0 | 23/23 | 100 | -5 | 5/5 | 17 | 0 | 18/18 | 100 | -6 | 4/5 | 12 | 1 | 12/13 | 92 | -7 | 3/5 | 8 | 3 | 8/11 | 72 | -8 | 2/5 | 5 | 6 | 5/11 | 45 | -9 | 2/5 | 3 | 9 | 3/12 | 25 | -10 | 2/5 | 1 | 13 | 1/14 | 7 | Figure 1 The percentage of infected cells by the virus. As the log of virus dilation......

Words: 982 - Pages: 4

Premium Essay

Melissa Virus

...“Melissa virus infects Word 97 documents and the NORMAL.DOT file of Word 97 and Word 2000. The virus code is contained in one macro named "Melissa"” (Melissa Virus). This virus comes with a harmful capability especially in Word 97. It has the power to spread its virus rapidly by using an email. When it is opened for the first time the virus checks if the user’s computer have the program MS Outlook installed. Then if it finds the program, the virus will then sends email to the email addresses found in the address book. “The email that is sent by the virus will contain the following subject header: ‘Subject: Important Message From ,’ where is the full name of the user sending the message. While the content of the body contains ‘Here is that document you asked for ... don't show anyone else ;-)’ with an attachment ‘list.doc’ which contains references to a lot of pornographic sites” (CERT® Advisory). Because of the email system the virus spreads quickly. “It created this entry in the Windows registry: HKEY_CURRENT_USERSoftwareMicrosoftOffice"Melissa?"="...by Kwyjibo" and in some cases when the day of the month equals the minute value, a payload of text is written at the current cursor position that says: "Twenty-two points, plus triple-word score, plus fifty points for using all my letters. Game's over. I'm outta here." The mentioned quote is taken from Bart Simpsons’ character in The Simpsons which disables some security safeguards of the computer” (Melissa virus). Melissa......

Words: 554 - Pages: 3

Premium Essay

Computer Virus

...Summary The project introduces the readers to the basic concept of virus and provides an insight of the history of virus. The report also analyses the spread of viruses and defines certain measures that computer users may take into account to avoid viruses. Overall ,it was learnt from the report that it is important to keep us updated about computer viruses to be able to successfully safeguard us from computer virus attacks Introduction to Computer Virus: Viruses are mischievous programs, the purpose of which is to disrupt the sensible use of computers. It is a type of a mal-ware and do little more than display a message( Usually insulting!!!) on the screen , but some are designed to act after a certain period of time and do such things as make the letters start to drop off the screen or even erase the entire contents of your hard disk. As their name suggests, viruses are able to spread by infecting other disks and they do this by copying themselves onto other disks which are being used by the computer. Viruses are little programs or scripts that can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly or to crash completely. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. They can self-modify or change over time as they copy themselves.  Viruses only spread across multiple computers if an uninfected computer is connected...

Words: 2136 - Pages: 9

Premium Essay

Botulism Virus

...eating at a huge risk of contracting the Botulism virus. For this reason combined with all of Sarah’s symptoms it is obvious that she has contracted Botulism or Food Poisoning. A person often develops the Botulism virus by ingesting the toxin but in rare cases it can be inhaled. The toxin that causes Botulism is actually considered to be one of the most lethal substances known to man. If left untreated, it only takes 1 nanogram of the stuff to kill a human being. Because of this fact, the use of the Botulism virus as a biological weapon against the United States is always a deadly possibility. Also the fact that it only takes a small amount of contaminated food to poison a whole population makes a Botulism outbreak a constant threat to mankind. Due to the safety of the modern day canning process, the amount of Botulism cases has dropped to about 1,000 worldwide every year. The United States accounts for a little over 100 of those cases. Out of the 1,000 total Botulism cases about 25% are caused by ingesting unprocessed food grown from the earth’s soil, as did Sarah. There are many tell tale symptoms that can indicate a person has contracted the Botulism virus. After Sarah’s illness first broke out her body began to respond in a number of negative ways. Sarah experienced blurred vision, slurred speech, and difficulty swallowing which are all consistent with the symptoms of a person infected with the Botulism virus. Not only that, the police officer she flagged......

Words: 1434 - Pages: 6

Premium Essay

Virus

...A computer virus is a computer program that can replicate itself[1] and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. An example of a virus which is not a malware, but is putatively benevolent, is Fred Cohen's compression virus.[2] However, antivirus professionals do not accept the concept of benevolent viruses, as any desired function can be implemented without involving a virus (automatic compression, for instance, is available under the Windows operating system at the choice of the user). Any virus will by definition make unauthorised...

Words: 271 - Pages: 2