Information About Viruses Essay

This essay has a total of 308 words and 2 pages.

Information About Viruses

Information About Viruses


A growing problem in using computers is computer viruses. Viruses are pesky
little programs that some hacker with too much time on his hands wrote. Viruses
have been known to create annoyances from displaying messages on the screen,
such as "Your PC is now stoned," to completely obliterating everything that is
contained on the computer's hard disk. Viruses are transferred from computer to
computer in a number of ways. The most common way that users receive viruses at
home are downloading programs off the internet, or off of local Bulletin Board
Systems, or BBSs. These viruses are then transferred to a floppy disk when
written to by the infected computer. Computers can also be infected when a disk
that is infected with a virus is used to boot the computer. When this computer
is infected, every one who writes a floppy disk on this computer gets their
floppy disk contaminated, and risks getting this virus on their computer, which
may not have good virus protection. On IBM-Compatible PCs, viruses will only
infect executable programs, such as the .EXE and .COM files. On a Macintosh, any
file can be contaminated. A disk can also be infected even without any files on
it. These viruses are called BOOT SECTOR viruses. These viruses reside on the
part of the floppy disk, or hard disk that store the information so that these
disks can be used, and is loaded into memory each time the computer is booted by
Continues for 1 more page >>




  • Advantages and disadvantages of a Web Presence
    Advantages and disadvantages of a Web Presence Advantages and disadvantages of a Web Presence The World Wide Web is a World Wide Market. It is a new way of selling. More and more customers expect to find your product news and specifications on the web. But even on the Net, you have to advertise your product. Using Internet as a media to advertise your product is different from traditional media. Through Internet companies can be present all over the world. Using the web as an advertising tool is
  • Computer Crime
    Computer Crime New times bring new crimes. It\'s a story as old as humanity and as new as the Internet. First comes cars, then car thieves follow. Telephones are followed by telephone fraud. Now we\'ve got computers . . .. To make home, school, and office life easier, society relies on computers. As a result of this dependency, computer use grows everyday. Along with the growing use of computers comes widespread computer crime. With the Internet becoming increasingly popular, more and more peopl
  • Computer Crime
    Computer Crime New times bring new crimes. It\'s a story as old as humanity and as new as the Internet. First comes cars, then car thieves follow. Telephones are followed by telephone fraud. Now we\'ve got computers . . .. To make home, school, and office life easier, society relies on computers. As a result of this dependency, computer use grows everyday. Along with the growing use of computers comes widespread computer crime. With the Internet becoming increasingly popular, more and more peopl
  • Computer Ethics
    Computer Ethics Computer crime has increased in resent years. The book gives several examples of past computer crimes. Before reading chapter 2 I thought that computer crimes only involved crimes that where associated with hacks. But I learned that a computer crime is a crime that involved a computer in any way. Even if it was just to close a bank account. This chapter gave me a good understanding of what a computer crime is, it also made me think how could I make some money. By reading this cha
  • Computer fundermentals
    computer fundermentals The society in which we live is complex and sophisticated. As consumers we demand a variety of goods and services to enable us to maintain the quality of life we enjoy. In order to satisfy these demands, suppliers must produce the goods and services, which the consumer wants by combining factors of production such as land, labour and capital in the most efficient manner. To do this the hiring of workers, rent or purchase of the appropriate premises, and maybe, even investi
  • Computer hacking
    Computer hacking As the world becomes more and more reliant on computers the computer hacking industry is greatly rising. With people such as Kevin Mitnick, who is known as a "computer terrorist" (Kjochaiche 1), computerized information isn\'t safe any more. Kevin is known as "the most high-profiled computer criminal and responsible for more havoc in the computer world today."(1) He considered this a fun and easy task. He got caught and thrown into prison, but once he got out nothing changed. Ke
  • Computer underground
    computer underground The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home computers has been accompanied by corresponding social problems involving the activities of so-called "computer hackers," or better referred to as the computer underground (CU). The CU is composed of computer aficionados who stay on the fringes of legality. The CU is composed of relatively intelligent people, in contrast t
  • Computer virus
    computer virus Computer Virus Melissa, Bubbleboy, WM Concept, Stoned, Michelangelo, …, the list goes on and on. You might ask what do all these names have in common. The similarity between them is that they can cause damage to your computer. In short they are simply known as “computer viruses”. For most users, the term “computer virus” is a synonym of the worst nightmares that can happen on heir system. A computer virus is an illegal and potentially damaging computer program designed to infect o
  • Computer Viruses
    Computer Viruses Computer Viruses Introduction In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it’s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justice Department web page (1), unauthori
  • Computer Viruses1
    Computer Viruses1 Computer Viruses Essay written by Jeramiah Billings Introduction In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it\'s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justi
  • Computer Viruses2
    Computer Viruses2 A computer virus is a program that attaches itself to, overwrites and/or otherwise replaces another program in order to reproduce itself without the knowledge of the computer user. Generally, the first thing a virus does is attach itself to other executable files in such a way that the virus code is in effect when the infected files are run. Viruses may be written to multiply, to damage other programs, or to alter certain data. A computer virus is nothing more than a computer p
  • Computer Viruses3
    Computer Viruses3 Almost every End-user in the world has heard of computer viruses and/or has had one at one point in time. Don’t worry if you haven’t heard about them, you won’t find it in your bloodstream. Unfortunately you may find one in your computer memory or disk storage. “ Some may be as benign as the common cold and others as deadly to your hard drive as the Ebola virus “. - 1 -What is a Computer Virus? Usually defined as “ a malicious code of computer programming” it is actually just a
  • Cyber Terrorism
    Cyber Terrorism The face of global terrorism as we knew it to be 50 odd years ago is changing rapidly with the advancement of technology in today’s society. Be it a kid trying to get his kicks bypassing the security or his local Internet Service Provider, or an established terrorist trying to get classified information, the amount of funds we put into protecting ourselves from cyberterrorism is not nearly enough if we were to think about what could be at harm. The vulnerability of commercial sys
  • Dna Computing The Future or the End
    Dna Computing The Future or the End DNA Computing, The Future or the End? The future of computers is in the hands of the next century. The evolution of the Computer Age has become a part of everyday life, and as time proceeds, people are depending more and more on computer technology. From controlling a small wrist watch to the largest super-computers that can calculated the center of the universe, computers are essential for everyone in modern societies. Even most societies outside of the civil
  • Hotline
    hotline The Hotline Connect software suite enables Server communities on personal computers worldwide that combined, comprise the Hotline Network. Hotline Communications cannot, and does not, monitor, track or control the activity or content on Hotline Servers outside the Hotline Network, and as such, does not guarantee the accuracy, integrity or quality of such activity or content. Hotline Communications does, however, extend the following Usage Policy to all users, including those users on Ser
  • I love you virus
    I love you virus ILOVEYOU (VBS.LoveLetter.A) is a Melissa-like worm that spreads through email and infects certain files. How Does It Spread? ILOVEYOU spreads through email. It arrives as an attachment to an email message from someone whose address book contains your email address. The subject line is "ILOVEYOU", and the message is "kindly check the attached LOVELETTER coming from me." The attachment is titled "LOVE-LETTER-FOR-YOU.TXT.vbs." When you open (click on) the attachment, it automatical
  • Internet Security
    Internet Security Internet Security Many people today are familiar with the Internet and its use. A large number of its users however, are not aware of the security problems they face when using the Internet. Most users feel they are anonymous when on-line, yet in actuality they are not. There are some very easy ways to protect the user from future problems. The Internet has brought many advantages to its users but has also created some major problems. Most people believe that they are anonymous
  • Internet Security1
    Internet Security1 Introduction/Summary The Internet has become a greater medium of communication, data exchange, and entertainment over the past 5 years. With this widespread growth of Internet access, there come growing pains. These growing pains come in the form of people who are up to no good and want to ruin everybody else’s experience on the net. High-speed connections also make it a very easy way for “hackers” to attack your pc in your daily life. In this report, I will discuss the types
  • Internet Security
    Internet Security Internet Security Many people today are familiar with the Internet and its use. A large number of its users however, are not aware of the security problems they face when using the Internet. Most users feel they are anonymous when on-line, yet in actuality they are not. There are some very easy ways to protect the user from future problems. The Internet has brought many advantages to its users but has also created some major problems. Most people believe that they are anonymous
  • IT failure and dependance
    IT failure and dependance In Today’s Society we are so Dependent on I.T that the Consequences of its Failure May be Catastrophic. Discuss the Threats and Causes of Failure, and Steps Taken to Minimise it. In today’s world it is impossible to run a large organisation without the aid of computers. Businesses hold massive amounts of important data, hospitals hold large amounts of confidential patient information and large scientific research projects hold important codes, formulae, and equations. T
  • Polymorphic
    Polymorphic Polymorphic & Cloning Computer Viruses The generation of today is growing up in a fast-growing, high-tech world which allows us to do the impossibilities of yesterday. With the help of modern telecommunications and the rapid growth of the personal computer in the average household we are able to talk to and share information with people from all sides of the globe. However, this vast amount of information transport has opened the doors for the computer "virus" of the future to flouri
  • The Internet
    The Internet The Internet is, literally, a network of networks. It is made of thousands of interconnected networks spanning the globe. The computers that form the Internet range from huge mainframes in research establishments to humble PCs in people\'s homes and offices. Despite the recent publicity, the Internet is not a new thing. Its roots lie in a collection of computers that were linked together in the 1970s to form the US Department of Defense\'s communications systems. Fearing the consequ
  • Types of Computer Viruses
    Types of Computer Viruses A computer virus is a program that is designed to damage your computer, programs, and files. Like a virus in a living thing, a computer virus can spread if it is not removed. Some viruses are more dangerous than others. One of the most common places for a computer virus to appear is on a file found on the Internet or attached to an E-mail. For example, you may have a virus that just pops a message box on your screen, and then the virus is disabled, or you can have a vir
  • Computer Based Training Business Interchange
    Computer Based Training Business Interchange COMPUTER BASED TRAINING (CBT) BUSINESS INTERCHANGE Dallas Baptist University Spring 1999 MISM 6330, Section 01 Database Management Systems Instructor: Mary Braswell, MBA Mary L. Everitt 19 April 1999 Table of Contents Introduction Computer-based training (CBT) is an all-encompassing term used to describe any computer-delivered training including CD-ROM and the World Wide Web. CBT courseware curriculum development involves the use of integrated multime
  • Genetic Engineering
    Genetic Engineering Genetic Engineering: A leap in to the future or a leap towards destruction? Introduction Science is a creature that continues to evolve at a much higher rate than the beings that gave it birth. The transformation time from tree-shrew, to ape, to human far exceeds the time from an analytical engine, to a calculator, to a computer. However, science, in the past, has always remained distant. It has allowed for advances in production, transportation, and even entertainment, but n
  • Canterbury Tales
    Canterbury Tales Throughout history all different parts of the world have been devastated by natural disasters. Whenever something created by nature destroys a certain area of the world, people tend to group together and overcome such a tragedy. Our tale will begin in one of the busiest and diverse places in the world, New York City. The month was September and the day started off a bit chilly for an early fall day and the wind was blowing hard. Warnings had been posted for possible hurricane co
  • Software piracy
    software piracy Software Piracy: A Worldwide Problem Software piracy is defined as the illegal copying of software for commercial or personal gain. Software companies have tried many methods to prevent piracy, with varying degrees of success. Several agencies like the Software Publishers Association and the Business Software Alliance have been formed to combat both worldwide and domestic piracy. Software piracy is an unresolved, worldwide problem, costing millions of dollars in lost revenue. Sof
  • Mononucleosis
    Mononucleosis Mononucleosis Mononucleosis, also known as "Mono," is an illness caused by an infection with a virus. The virus, The Epstein-Barr Virus (EBV) is usually the cause of Mono. Other infectious viruses, like cytomegalovirus (CMV) can also produce illnesses like Mono. Most of the people who get Mono are adolescents and young adults. In developed nations, the majority of the people has been exposed to the Epstein- Barr virus by the age of 18. That means that many adults have had infection
  • Crime misc10
    Crime misc10 In this paper the exciting criminal phenomenon known as white-collar crime will be discussed. Corporate Crime and Computer Crime will be discussed in detail. Crime preventative agencies such as the NCPC (National Crime Prevention Council) will also be researched. White Collar Crime The late Professor Edwin Sutherland coined the term white-collar crime about 1941. Sutherland defined white-collar crime as "a crime committed by a person of respectability and high social status in the c
  • The 1st Amendment and our Rights
    The 1st Amendment and our Rights The 1st Amendment and our Rights Freedom of Speech, freedom of expression, both oral and written, from governmental prior restraint, except as such expression constitutes libel, slander, obscenity, sedition, or criminal conduct such as bribery, perjury, or incitement to riot. In the U.S., this freedom is protected by the 1st Amendment of the Constitution. At the core of 1st Amendment concerns is the protection of expression that is critical of government policies
  • 2B The Consumer
    2B The Consumer A new law will probably be introduced into state legislatures which will govern all contracts for the development, sale, licensing, and support of computer software. This law, which has been in development for about ten years, will be an amendment to the Uniform Commercial Code. The amendment is called Article 2B (Law of Licensing) and is loosely based on UCC Article 2 (Law of Sales), which governs sales of goods in all 50 states. A joint committee of the National Conference of C
  • ANTIBIOTICS
    ANTIBIOTICS Antibiotics have played a major role in our society thanks to Sir Alexander Fleming\'s careful observations in 1928. Without it, many lives would be in danger due to infectious diseases. Antibiotics are chemical substances produced by various species of microorganisms and other living systems that are capable in small concentrations of inhibiting the growth of or killing bacteria and other microorganisms. These organisms can be bacteria, viruses, fungi, or animals called protozoa. A
  • Computer
    computer Computer Crime By: John Sforza Sforza-1 John Sforza Miss. Hilleman English 10R December 7, 1999 Computer Crime Computer crime is defined as "a criminal act that has been committed With a computer as the principle tool"(Judson, 30). These computer criminals are people with advanced knowledge of operating systems, phone systems, and other computer related devices. Some computer criminals break into other peoples computers, and steal data, these criminals are known as hackers. Yet others
  • Computer crime
    computer crime Computer Crime Is Increasing A report discussing the proposition that computer crime has increased dramatically over the last 10 years. Introduction Computer crime is generally defined as any crime accomplished through special knowledge of computer technology. Increasing instances of white-collar crime involve computers as more businesses automate and the information held by the computers becomes an important asset. Computers can also become objects of crime when they or their con
  • Computer Crimes
    Computer Crimes Computer Crime Computer crime is a very broad term. It could mean anything from a total invasion by a hacker into the federal government or just the simple fact of one person letting another borrow a copy of his favorite flying game. Computers are defined in the dictionary as a machine that computes (WBD vol. 23). But to most people it is a machine that\'s helps us do a task easier. As we move into the 21th century though one thing is for sure, the computer will help crime become
  • Computer Security
    Computer Security Internet, its effects in our lives and the future of the Internet: The Internet is, quite literally, a network of networks. It is comprised of ten thousands of interconnected networks spanning the globe. The computers that form the Internet range from huge mainframes in research establishments to modest PCs in peopleˇ¦s homes and offices. Despite the recent hype, the Internet is not a new phenomenon. Its roots lie in a collection of computers that were linked together in the 19
  • Computer Viruses
    Computer Viruses A computer virus is a program that attaches itself to, overwrites and/or otherwise replaces another program in order to reproduce itself without the knowledge of the computer user. Generally, the first thing a virus does is attach itself to other executable files in such a way that the virus code is in effect when the infected files are run. Viruses may be written to multiply, to damage other programs, or to alter certain data. A computer virus is nothing more than a computer pr
  • Computer
    computer Computer Crime By: John Sforza Sforza-1 John Sforza Miss. Hilleman English 10R December 7, 1999 Computer Crime Computer crime is defined as "a criminal act that has been committed With a computer as the principle tool"(Judson, 30). These computer criminals are people with advanced knowledge of operating systems, phone systems, and other computer related devices. Some computer criminals break into other peoples computers, and steal data, these criminals are known as hackers. Yet others
  • Food
    food Computer Security in Business Prepared by: Prepared for: It is 1994, a Russian hacker named Vladimir Levin and a group of accomplices are siting at a desk of a computer office somewhere in St. Petersburg. There, Levin electronically transfers million from Citibank’s New York-based mainframes to Finland, Israel, and California. This all occurred under the watch of one of Citibank’s top information officers in charge of security, Colin Crook. This frightening occurrence is not a rare even
  • History of AIDS
    History of AIDS Debate around the origin of AIDS has sparked considerable interest and controversy since the beginning of the epidemic. However, in trying to identify where AIDS originated, there is a danger that people may try and use the debate to attribute blame for the disease to particular groups of individuals or certain lifestyles. The first cases of AIDS occurred in the USA in 1981, but they provide little information about the source of the disease. There is now clear evidence that the
  • Human Immunodeficiency Virus
    Human Immunodeficiency Virus Human Immunodeficiency Virus The content of this paper is whether or not mutations undergone by the Human Immunodeficiency Virus and allow it to survive in the immune system. The cost of treating all persons with AIDS in 1993 in the United States was .8 billion, and it is estimated that 20,000 new cases of AIDS are reported every 3 months to the CDC. The question dealing with how HIV survives in the immune system is important, not only in the search for a cure for
  • Internet Censorship
    Internet Censorship Essay submitted by Unknown The Internet offers a much greater potential for interactive communication between information senders and receivers than the more traditional methods of communication such as newspaper, radio and television. Freedom of speech ascertained by the constitution is not an absolute right. Depending on the medium through which information is delivered various degrees of the freedom to express one\'s self is protected. Internet communication may be analogo
  • Internet5
    internet5 The Internet: its effects and its future Essay written by Eva Kotsi Internet, its effects in our lives and the future of the Internet: The Internet is, quite literally, a network of networks. It is comprised of ten thousands of interconnected networks spanning the globe. The computers that form the Internet range from huge mainframes in research establishments to modest PCs in people\'s homes and offices. Despite the recent hype, the Internet is not a new phenomenon. Its roots lie in a
  • Jjjj
    jjjj Computers and crime By: Dan Shark Computers and Crime As our technology has greatly advanced over the past 50 years, our businesses, people, and its governments have been greatly affected by this new technology. With the vast capabilities of computers, the Internet, storage capability, and the manipulation of data, today\'s world has been changed forever. Although the benefits greatly outweigh the disadvantages, unless we take a more serious look at this new technology, more people will be
  • Network
    network In today\'s world of technology the faulty security is becoming an almost incurable problem In today\'s world, there are several opportunities for the everyday user to breach security networks. The opportunities are endless for intrusions on networks. In 1997, thirty-five hackers hired by the National Security Agency launched several simulated attacks on the U.S electronic info-structure. The project was called Eligible Receiver and its main goal was to gain root level access to thirty-s
  • PBS1
    PBS1 PROCESS BASED SECURITY, WHAT IS IT AND HOW IT WILL CHANGE YOUR COMPUTER’S LIFE This note is for the purpose of explaining a new way to implement operating system security called process-based security. First, an explanation of traditional operating system security is given. Next, an explanation of process-based security is given. Finally, there are presented three examples of failure on the part of traditional security with how process-based security would not have allowed such a problem. B
  • THe Evolution of the Horror Film
    THe Evolution of the Horror Film The Evolution of the Horror Film How on earth do horror film directors sleep at night? Don\'t they ever wake up and say, "Is this what my life is about: making people fear dark rooms, old houses, and things that go bump in the night?" How do they stand it all? What inspires them to create these vividly outrageous spins on reality? These may be the questions often asked by people who don\'t quite understand the method behind the madness that is the horror film. Th
  • The Internet its effects and its future
    The Internet its effects and its future The Internet: its effects and its future Internet, its effects in our lives and the future of the Internet: The Internet is, quite literally, a network of networks. It is comprised of ten thousands of interconnected networks spanning the globe. The computers that form the Internet range from huge mainframes in research establishments to modest PCs in people\'s homes and offices. Despite the recent hype, the Internet is not a new phenomenon. Its roots lie i
  • Using Irradiation to Make Food Safer for Consumers
    Using Irradiation to Make Food Safer for Consumers Using Irradiation to Make Food Safer for Consumers In the world today, there is a limited access to fresh and uncontaminated food. Gunjan Sihna, of Popular Science, reports that "The U. S. Centers of Disease Control estimates 6.5 million confirmed cases and more than 25 million additional unreported incidents of food poisoning each year" (65). For example, with seventy-five percent of the chicken in Europe and sixty percent of the chicken in the
  • Y2K is a Joke
    Y2K Y2K is a Joke Everybody is wondering what is going to happen in the year 2000. Nobody really knows exactly what is going to happen. Nevertheless, a lot of business people are making money using scare tactics and hype to make people nervous about the future. With all of the technology in today\'s society and everyone modernizing his or her computer, there will not likely be a problem in the new millennium. The issue of Y2K has been going on for several years now. Hundreds of articles have bee