Sabtu, 28 Mei 2011

ALL ABOUT COMPUTER VIRUSES



How The Viruses Working

Computer Virus: A computer code that can "breed by itself" which put some or all of its code on a file or application, and cause your computer to do the things you do not want.

Computer viruses are common diseases in the world of modern technology. They can spread rapidly through an open computer networks like the Internet, and resulted in losses to billions of dollars in no time. Five years ago, chances for contracted a virus in a period of 12 months is about 1 in 1000; now the comparison is increased drastically to about 1 in 10. Vital Statistics of the virus:

· Viruses get into your system via e-mail, downloads, infected floppy disk, or (sometimes) by hacking.
· From its definition, a virus must be able to "own culture" (aka make a clone or a copy of itself) to spread.
· When there are thousands of types of viruses, but few have been found "in the wild" (roaming, undetected, in the network) because most of the known viruses is born from the laboratory, which is a variant of the virus "wild" are numerous in world.
· Due to virus generated varies, ranging from annoying to highly destructive, but even the simplest virus has a tendency to ruin because of the bug on their computer code (because the virus is very sloppy programmer or did have malicious intent).
· Antivirus software on the market today can detect almost all types of viruses exist, but should be updated regularly to maintain effectiveness.

A virus is simply a computer program. As with other computer programs, in which there are instructions that can tell the computer to perform certain tasks. But unlike an application program, a computer virus usually instruct you to do things that really do not want, and usually can spread itself to existing files on your computer - and sometimes into other people's computers as well.

If you're lucky, a virus is at best only causes the computer to perform bizarre actions, such as causing your computer speakers reads "blip-blip-blip" at random. The most feared is a vicious virus that can cause all data on your hard drive missing (with a computer command to format the hard drive), and even some viruses that can damage your computer hardware, such as the CIH virus that destroy your computer's motherboard BIOS.

<<Bagaimana Computer I Can Hit Virus?>>

Your computer can be infected with a virus when you copy a file that terinfeks into the computer, then activate the code from his body when an infected file is run or opened. Maybe you do not feel Copy infected files into your computer: Hey, the virus does not care if they stick to the e-mail attachment, when you are downloading a file, or via floppy disks which are often borrowed-lent. And now, with the increase in Internet users, the trend spread of the virus is through e-mail attachments.

When you open an infected file or application, malicious code copying itself into a file on your system, then wait to send it - whatever the programmer designed it to be done on other people's computers. By simply deleting the infected e-mail after you open the attachment it will not help, because the virus has penetrated into your computer system before.

A virus writer can set the time of virus attack, it was also, at a certain time or date, or when a certain command is run, for example, when you ordered the save or close a file. Example: Michelangelo virus is programmed to release the code perusaknya every 6 March each year - which is the anniversary date

<<Jenis-jenis Virus Umum>>

Today many types of variations of viruses in circulation, most of them can be grouped into six general categories, where each type is slightly different how it works:

· Boot-sector viruses: replacing or inserting itself into the boot sector - an area on your hard drive (or any other disk) to be accessed when you first turn on your computer. This type of virus can hinder your computer to boot from the hard disk.

· File Virus: infects applications. The virus is executed to spread itself on the application and associated documents at the infected file is opened or executed.

· Macro Virus: Written using a simplified macro programming language, and Microsoft Office applications, such as Word and Excel, and the currently estimated 75 percent of this strain has spread across the world. A document infected with a macro virus generally modifies the existing command and widely used (like the "Save") to trigger its payload upon execution of that command.

· Multipartite Virus: infects both files and boot sector - double the guise of a villain that can infect your system continuously before he was arrested by antivirus scanners.

· Polymorphic Virus: changes code whenever it passes to another machine; theoretically this type of virus is more difficult to be detected by antivirus scanners, but in reality this type of virus is not well written, making it easy for the unknown.

· Stealth Virus: hides himself by making an infected file not appear infected, but the virus of this type are rarely able to deal with the latest antivirus scanners.

<<All (Malicious Code) evil code is not Virus>>

One of the erroneous perception in the public computer is bad electronic code, such as worms and Trojan horse applications is the type of virus. They are not viruses. Worms, Trojan horses, and viruses in a large category of so-called analyst as "malicious code".

A worm will replicate itself and enter into a network connection to infect any machine on the network and then replicate itself again, taking the hard disk space and slowing down computers and networks. Even so, the worm does not modify or delete other files.

A Trojan horse does not replicate itself, but he was in the form of a malicious program disguised as another format such as a screen saver or image files. When loaded onto your machine, a Trojan horse will take information from your system - such as user names and passwords - or could create a malicious hacker take over your computer remotely (from a distance).

<<Software Antivirus Answering the Call Darurat>>

Virus experts have records of about 40,000 kinds of virus and its variants over the years, although only 200 species are currently active in the jungles of the computer. While most virus more just annoying and waste our time, of a kind very merusaklah that are dangerous to health [computer and your pocket].

A computer virus has existed since 1960, since the computer era, although the range of 1980 until they were mostly only specimen in the laboratory computer, created by researchers and released in a controlled environment to evaluate their effects.

When the virus was first discovered on the surface in the 1980s, they spread very slowly and move through a "network of smugglers': through floppy disks that are sold and shared between computers. But with the Internet and access e-mail virus spreading further accelerated.

Two years ago, beginning with the emergence Loveletter Melissa virus, the spread of viruses via e-mail continues to increase so that the ratio of ordinary computer users face virus was getting bigger. The virus e-mails now occupies the top spot where he took a share of 81 percent of the causes of computer virus infection and can spread into the system within minutes.

<<Berlatih Using Computers In Aman>>

The best way to protect yourself [er, computer] you from a virus is if you have a connection to the Internet, do not open e-mail attachments from strangers and avoid downloading from sources that are not clear. Opponent wants you to click, double the content of your mailbox. And when you get a file attachment and you do not ask, ask the sender about the contents of attachments and how to use it before it opened.

To tighten security, you need to install a reliable anti-virus scanning software and always download the updates regularly. Major antivirus software vendors, like Symantec, Network Associates, Computer Associates, and Kaspersky Lab, providing regular updates (as the note is Computer Associates InoculateIT antivirus software free of charge). Some vendors also offer regular updates via their company Web sites.

Update on a regular basis is very important. Researchers from the Computer Economics estimates that 30 percent of small businesses are particularly vulnerable to the dangers of viruses and it is because they do not update their antivirus software regularly or they do not menginstalasikannya correctly.

<<Cara Antivirus> Work Software>

Antivirus software scans the contents of computer hard disk in two ways. If there are known viruses (ie viruses known to exist and antidotes have been found) the software will look for the signature (sign) of viruses - that is a unique string of bytes that identify a virus program virus like a fingerprint - and will throw from your system. Most scanning software does not just look for the early type virus, but also to look for variants of the virus, because the code of the virus signature is usually similar.

In the case of a new virus that has not found its antidote, anti-virus software will run a heuristic program that searches for virus-like activity on your system. When the program saw no symptoms of anything wrong, it will quarantine the troubled program and will display a warning message to you about what will be done by the program (such as changing your Windows registry.) When you and the software felt that the program is a virus, you can send files that have been terkarantina at antivirus software vendor for analysis, determining signature, name it and put it in the catalog, and send her an antidote. The virus is now known viruses.

If the virus does not appear again - this often happens because the virus is not well written to be distributed - the vendor would categorize it as a dormant virus (viral sleep). But some viruses spread like an earthquake: The spread initially always accompanied with the occurrence of aftershocks. Variants of the virus (viral tracing the spread of the virus that emerged after the first) will increase the number of types of viruses that exist.

An example is when the Melissa virus appeared in the United States Loveletter, variants - VeryFunnyJoke - instantly appears in a few moments, followed by more than 30 other species in two months later. And not all variants derived from the mysterious author of the program. Some companies never been infected by a variant virus that is spread by its own employees who curiously against viruses that those who receive, create variants, and release it in their company's computer system - sometimes accidentally, sometimes intend to do this.

0 komentar:

Posting Komentar

Twitter Delicious Facebook Digg Stumbleupon Favorites More