Monday, June 3, 2019
The Prevention Of Computer Viruses Computer Science Essay
The Prevention Of Computer Viruses Computer Science EssayWhat is a computing machine virus? A computing machine virus is a calculating machine course of study that piece of ass copy it egotism1 and infect a computer. The term virus is in addition commonly but err unityously apply to refer to other types of malw ar, including but not limited to adware and spyware programs that do not have the productive ability. A legitimate virus can spread from one computer to another (in some earn of executable code) when its host is taken to the target computer for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy magnetic disc, CD, DVD, or USB drive.How are viruses transmittedcan be transmitted person to individual by bodily fluids like HIV. Viruses approaching the common cold can be transported through the upper air we breathe. Viruses can also be transferred from your pets to you. Fortunately our body has an immunode fense workings that is intricately designed to row these pathogens.How do you hold viruses? List the softwares name.The internet is an amazing place that aloneows each and every one of us easy access to a wide innovation of resources. Unfortunately, there is an increasing amount of viruses, worms, spyware and spam that can easily infect your computer. Your computer in fact may already be infected and you may not even know it. If your computer is unusually slow or crashes periodically, it may be infected. In fact, if you do not reference the problem with this computer it may in fact infect other computers on your network. The result of a virus or worm attack can include an inability to access the internet, missing icons on your desktop, missing files and m all other potential problems. There are ways, however, that you can fight back. Of course before making any changes to your computer, it is always a good idea to make a backup.FIGHT BACK1. Run Microsoft Windows Update often. With new viruses and worms constantly being created, it is important to financial support the Microsoft Windows operating system up to date. Go to http//windowsupdate.microsoft.com and follow the instructions on screen. By installing the critical updates found on the Windows Update website, you are greatly reducing the chances of your computer from becoming infected.2. Update the virus pattern of your Anti-Virus software frequently.Almost all Anti-Virus software programs update automatically, but you lead want to check to make sure that this process is winning place. If a new virus is introduced and your pattern file is out of date, you will not be adequately defend against this new threat. I highly recommend the use of Trend Micro PC-Cillin. Unlike other antivirus software programs, it does not tap your system resources by taking up a lot of memory. It also works in a very transparent fashion with continuous pattern updates.3. Remove Spyware and Adware.When you visit websites o r install new software, you may be inadvertently installing Spyware and Adware onto your computer. Spyware and Adware allows third parties to (a) monitor the use of your computer over the internet and (b) market specific products to you on the internet based upon the use of your computer. Go to http//www.download.com in order to download and install (1) Ad-aware and (2) Spybot Search Destroy. Properly updated, both of these programs will remove all cognize Spyware and Adware.4. Prevent Spam.A large number of worms and viruses are distributed through spam e-mail. The first step in preventing spam is to not post your email address on a website. If you need to provide a means for contacting you via email, you will want to create a submission form that does not display your MAILTO in the code/page source of your webpage. You may need to contact a web designer in order to properly implement this process into your website. some other method is to use the Master Spambot Buster which wo rks just like a MAILTO link but without displaying your email address in the code for bots to extract up.In addition, you should always use Private Registration when registering a domain name for a website. If you go to http//www.netsol.com and do a WHOIS on your website, you do not want to see your email address publicly displayed in your domain record. Automated programs called robots regularly crawl websites such as this looking to pick up email addresses for use by companies that spam. If robots on the internet have already picked up your email address, you will of course want to use some form of spam prevention. Many web based mail programs already allow you the ability to prevent spam. However, many mail clients on business networks do not have this functionality. There are a variety of products in the marketplace to address this problem, but one of the most popular is http//www.spamarrest.com. By using Spamarrest.com, you command who you allow or do not allow to receive ema il from. When someone sends you an email for the first time, they must verify that they sent you an email. If they do not, the email is placed in your unverified folder on Spamarrest.coms web servers. All blocked mail is whence placed in Spamarrest.coms spam folder. Meanwhile all approved mail is sent as it normally would directly to your computers Inbox.CONSULT A PROFESSIONALAlthough the software described here is easily used, different ironware and software configurations can lead to unexpected results that may damage your computer. If you are experiencing difficulties with viruses, worms, spyware or spam, you may want to consult a professional.How do you know that your computer is infected by a virus?If you suspect or confirm that your computer is infected with a computer virus, obtain the current antivirus software. The following are some primary indicators that a computer may be infectedThe computer runs slower than usual.The computer stops responding, or it locks up frequent ly.The computer crashes, and then it restarts every few minutes.The computer restarts on its own. Additionally, the computer does not run as usual.Applications on the computer do not work correctly.Disks or disk drives are inaccessible.You cannot print items correctly.You see unusual error messages.You see distorted menus and dialog boxes.There is a double extension on an attachment that you lately opened, such as a .jpg, .vbs, .gif, or .exe. extension.An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted.An antivirus program cannot be installed on the computer, or the antivirus program will not run.New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.Strange sounds or melody plays from the speakers unexpectedly.A program disappears from the computer even though you did not intentionally remove the programWhy virus-scanning software needs to be updated regul arly ?computer virus is a computer program that can copy itself1 and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.2Viruses can increase their chances of ranch to other computers by infecting files on a network file system or a file system that is accessed by another computer.34As verbalize above, the term computer virus is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest a dware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer systems data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.The Academic Integrity and Plagiarism PolicyYou should be ready to prove the authenticity of your work. If any form of plagiarism/reproduction of answers/work discovered, you will be awarded zero mark.Late submission of the assignmentIf any late submission of your work, mark will be reduced.Your are expected to cover the follow ing outcomes proceeds 4.You are expected to practice the skills that are related to the following graduate attributeRecognize the importance of lifelong learning and are committed to self developmentDeclaration by student (Hand written)TO MY LECTURER Mr. Sheik MohammedI CERTIFY THAT ALL OF THIS WORK IS(a) DONE BY MYSELF(b) PRINTED BY MYSELFStudents signatureMahmood Khalfan Ali.. Submit ion get out ..22j1047
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.