Preview

Computer Viruses Essay Example

Good Essays
Open Document
Open Document
430 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Viruses Essay Example
Viruses

In computer technology, viruses are vicious software programs, a form of malware. Viruses exist on local disk drives and spread from one computer to another through the sharing of the infected files. Regular methods for spreading viruses include floppy disks, FTP file transfers, and copying files between shared network drives. Once installed on a computer, a virus may change or remove application and system files. Some viruses can leave a computer inoperable; others just display startling screen messages to innocent users.

Here are five common types of viruses:

Trojan Horse Viruses
A Trojan Horse are computer viruses that hide inside non-executable files such as compressed or document files and executable files and try to avoid detection by anti-virus programs such as Norton or McAfee. Trojan Horses usually appear to be useful computer files / programs such as a computer game or data library.

Polymorphic Viruses
A polymorphic virus is an encrypted virus that hides itself from anti-virus through scrambled data and then decrypts itself to be able to spread through the computer. The thing that makes it hard for anti-virus software to detect polymorphic viruses is that the virus creates and totally new decryption routine each time it infects a new executable file, making the virus signature different in each signature.

Armoured Viruses
An Armoured virus tries to protect itself from anti-virus software by trying to make anti-virus software think it is located somewhere else. Therefore the Armored virus has made itself more difficult to trace, disassemble and understand.

Phage Viruses
A Phage virus is an extremely vicious virus that re-writes an executable program with it's own code, rather than just attaching itself to a file. Therefore a Phage virus will normally try to delete or destroy every program it infects.

Retro Viruses
A Retro virus will attack the anti-virus software planned to delete it. The retro virus generally attempts to

You May Also Find These Documents Helpful

  • Good Essays

    Mat 540 Quiz

    • 3391 Words
    • 14 Pages

    | Antivirus software can detect and eliminate viruses that are trying to enter your system. Answer…

    • 3391 Words
    • 14 Pages
    Good Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Trojan horse – A type of malware that cannot self-replicate, and appears to do one action, but instead infects the computer with malicious payloads.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit Btec Diploma It

    • 950 Words
    • 4 Pages

    Virus checking software: Antivirus (or "anti-virus") software is a class of program that searches your hard drive and floppy disks for any known or potential viruses. The market for this kind of program has expanded because of Internet growth and the increasing use of the Internet by businesses concerned about protecting their computer assets.…

    • 950 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    unit 4222-265

    • 923 Words
    • 4 Pages

    A virus is a small infectious agent that can replicate only inside the living cells of organisms. Most viruses are too small to be seen directly with a light microscope. Viruses infect all types of organisms, from animals and plants to bacteria and archaea.…

    • 923 Words
    • 4 Pages
    Good Essays
  • Good Essays

    MIS 320 Midterm

    • 3629 Words
    • 12 Pages

    Antivirus software is designed to check computer systems and drives for the presence of computer viruses and worms and often eliminates the malicious software, whereas antispyware software combats intrusive and harmful spyware programs. Often the software can eliminate the virus from the infected area. To be effective, antivirus software must be continually updated.…

    • 3629 Words
    • 12 Pages
    Good Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Good Essays

    A virus is a small infectious agent that replicates only inside the living cells of other organisms. A virus is a small parasite that cannot reproduce by itself. Once it infects a susceptible cell, however, a virus can direct the cell to produce many more viruses. Viruses can infect all types of life forms, such as animals and plants to microorganisms, including bacteria and archaea.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Better Essays

    A piece of unwanted computer software or code introduced into another program, attached to a document or exists on its own, for malicious purposes.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Viruses. Is an acellular agent smaller than bacteria consisting mainly of genetic material, that can be active in a close environments ranging from the common cold to AIDS.…

    • 347 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Generally, the majority of the viruses are bundled up with outsider software to make the downloading and installation of pernicious program less demanding. It is likewise appropriated through phishing sites, undesirable taps on suspicious links and ads and pop-ups, opening spam emails messages or its related attachments, visiting dubious sites and porn sites. You can likewise infect your Windows System when you share your documents over peer to peer network. Hackers utilize some strategy to earn profit on the web. Installing plug-in, toolbar, add-on and expansions without thinking about it additionally lead to installation of TrafLab…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Good Essays

    memory. Once a virus is in memory, it can spread to any floppy disk inserted…

    • 493 Words
    • 2 Pages
    Good Essays