Preview

Damn It!!

Better Essays
Open Document
Open Document
836 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Damn It!!
1. Computer Viruses
2. What is a Computer Viruses Computer Viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
3. Why people create computer viruses Computer viruses do not come into existence spontaneously. They are deliberately created by programmers, or by people who use virus creation software. Virus writers can have various reasons for creating and spreading malware. Viruses have been written as research projects, pranks, vandalism , to attack the products of specific companies, to distribute political messages, and financial gain from identity theft , spyware , and cryptoviral extortion . Some virus writers consider their creations to be works of art, and see virus writing as a creative hobby.
4. When computer viruses created A program called " Elk Cloner " is credited with being the first computer virus to appear "in the wild" — that is, outside the single computer or lab where it was created. Written in 1982 by Richard Skrenta , it attached itself to the Apple DOS 3.3 operating system and spread by floppy disk . This virus was originally a joke, created by the high school student and put onto a game. The disk could only be used 49 times.
5. Ways of computer viruses enter your computer Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.
6. How to protect your computer from computer viruses Only open e-mail attachments received from sources you trust and that you are expecting. Back up your hard drive files frequently and maintain multiple backup sets.

You May Also Find These Documents Helpful

  • Good Essays

    To demonstrate that a particular type of virus can be written or created, some virus writers create “proof of concept” viruses that do not cause…

    • 546 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    1. What are the various types of malware? How do worms differ from viruses? Do Trojan…

    • 639 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    A firewall is software or a device that blocks hackers, viruses, and malware from accessing to your network system. Second, you should create strong passwords that nobody can guess. Third, you can hide your browsing activities from others by opening an Incognito window on Google Chrome, Private Browsing on Firefox, and InPrivate on Internet Explorer. These private windows don't record your browsing history. Fourth, when you are using a public computer, you can use a portable privacy device such as the Ironkey Personal Flash Drive or take Linux OS with you on a flash drive. Ironkey Personal Flash Drive is an encrypted flash drive that stores sensitive data and passwords and they are safe from viruses and malware.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Module 4 Blank Study Guide

    • 2907 Words
    • 12 Pages

    1. How does the spreading of a computer virus compare to the spreading of human viruses?…

    • 2907 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    307-Task B

    • 265 Words
    • 2 Pages

    Biv, If your files are stored on computer or other electronic device you should ensure it is password protected and that any removable devices are locked away securely. Usernames and Anti-virus programs also give you better protection. Anti-virus is only effective if you keep it up to…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Computer program that can copy itself and infect a computer. The term ‘computer virus’ is sometimes used as a catch-all phrase to include all types of malware, including true viruses.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    To avoid this, users have to avoid untrusted websites and make sure to scan small attachments before opening them. Simply, reliable and trusted programs must be downloaded which are anti-virus and anti-spyware programs in order to prevent viruses. Also, users must install programs which scan a computer to detect viruses.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    3. Which of the following is a stand-alone malicious software program that actively transmits itself, generally over networks, to infect other computers?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ur mama

    • 659 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Antivirus 1

    • 353 Words
    • 2 Pages

    Methods that guarantee a computer or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus program, though, is an effective technique to safeguard your computer from loss.…

    • 353 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Computer viruses have been around for many years. In fact, in 1949, a scientist named John von Neumann theorized that a self-replicated program was possible [source: Krebs]. The computer industry wasn't even a decade old, and already someone had figured out how to throw a monkey wrench into the figurative gears. But it took a few decades before programmers known as hackers began to build computer viruses.…

    • 9130 Words
    • 37 Pages
    Good Essays

Related Topics