+ 1-888-787-5890  
   + 1-302-351-4405  
 
 
 
 

Essay/Term paper: A look into the computer virus

Essay, term paper, research paper:  Information Technology

Free essays available online are good but they will not follow the guidelines of your particular writing assignment. If you need a custom term paper on Information Technology: A Look Into The Computer Virus, you can hire a professional writer here to write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written essays will pass any plagiarism test. Our writing service will save you time and grade.



A Look Into The Computer Virus


by, Michael Ross
Engineering 201.02
January 22, 1997

Most of us swap disks with friends and browse the Net looking for downloads.
Rarely do we ever consider that we are also exchanging files with anyone and
everyone who has ever handled them in the past. If that sounds like a warning
about social diseases, it might as well be.
Computer viruses are every bit as insidious and destructive, and come in a vast
variety of strains. A computer virus tears up your hard drive and brings down
your network. However, computer viruses are almost always curable diagnosed,
and cures for new strains are usually just a matter of days, not months or years,
away.

Virus, a program that "infects" computer files (usually other executable
programs) by inserting in those files' copies of itself. This is usually done in
such a manner that the copies will be executed when the file is loaded into
memory, allowing them to infect still other files, and so on. Viruses often have
damaging side effects, sometimes intentionally, sometimes not. (Microsoft
Encarta 1996)

Most viruses are created out of curiosity. Viruses have always been viewed as a
well written, creative product of software engineering. I admit there are many
out there who create them out of malice, but far more people are just meeting a
challenge in software design. The people who make anti-virus software have much
more to benefit from the creation of new virii. This is not a slam, just an
observation. A common type of virus would be a Trojan Horse, or a destructive
program disguised as a game, a utility, or an application. When run, a Trojan
Horse does something devious to the computer system while appearing to do
something useful (Microsoft Encarta, 1996). A Worm is also a popular type of
virus. A worm is a program that spreads itself across computers, usually by
spawning copies of itself in each computer's memory. A worm might duplicate
itself in one computer so often that it causes the computer to crash. Sometimes
written in separate "segments," a worm is introduced secretly into a host system
either for "fun" or with intent to damage or destroy information. The term "
Worm' comes from a science-fiction (Microsoft Encarta 1996).

Some viruses destroy programs on computers although, the better virii do not.
Most virus authors incorporate code that specifically destroys data after the
virus determines certain criteria have been met, that is, a date, or a certain
number of replications. Many virus do not do a good job of infecting other
programs and end up corrupting, or making the program they are trying to infect
completely unusable. The purpose of a virus, in many cases, is to infect as many
files, with little or no noticeable difference to the user.

How does a virus scanner work?

Most virus scanners use a very simple method of searching for a particular
sequence of bytes that make every virus unique, like a DNA sequence. When a new
virus is discovered, a fairly long sequence of bytes from it is inserted into
the anti-virus software database. That's why you need to keep them updated. Any
virus scanner you buy should handle at least three tasks: virus detection,
prevention, and removal. There are some virus scanners that use a method called
heuristic scanning. They use 'rules of thumb' that can be used to identify some
virii that has not even been put in the virus database yet. What are the rules
of thumb? Well, they are basic assembly language clues that make the file
suspicious, such as a JMP instruction at the top of the file. No virus scanner
is infallible and anyone that tells you so have no idea what they are talking
about. The two best virus scanners in my opinion are F-PROT and THUNDERBYTE.
They use the heuristic method described above.

In conclusion; viruses are, and always will be, a part of the computing world.
They have been around since programming began and will continue to thrive as
long as computers are used. Technology will force us to adapt and be aware that
any information we place on a computer may not be safe.


References

Deadly New Computer Viruses Want To Kill Your PC usability.
By James Daley http://www.headlines.yahoo.com/news/stories
originally published in Computer Shopper December 1996

Microsoft Encarta 96; Reference Material Microsoft corporation

 

Other sample model essays:

Information Technology / Intranets
Intranets These days Intranets are becoming more and more popular throughout the business world and other types of organizations. Many companies and organizations are already making this c...
Information Technology / ISDN Vs. Cable Modems
ISDN vs. Cable Modems 1.0 Introduction The Internet is a network of networks that interconnects computers around the world, supporting both business and residential users. In 1994, a multi...
Information Technology / Is Your Information Safe?
Is Your Information Safe? He doesn't wear a stocking mask over his face, and he doesn't break a window to get into your house. He doesn't hold a gun to your head, nor does he ransack your ...
Information Technology / ITT Trip Scheduling
ITT Trip Scheduling The Information, Tours and Tickets (ITT) office could use a system to assist them in creating trip schedules. In this paper I will outline a plan for a Decision Support ...
Information Technology / Journalism On The Internet
Journalism on the Internet The common forms of media in today's world each have both advantages and disadvantages. The Internet has been around for an almost equal amount of time as mo...
Information Technology / Lasers
Lasers The laser is a device that a beam of light that is both scientifically and practically of great use because it is coherent light. The beam is produced by a process known as stimula...
Information Technology / Macintosh Vs. IBM
Macintosh vs. IBM The IBM and Macintosh computers have been in competition with each other for years, and each of them have their strong points. They both had their own ideas about where the...
Information Technology / Which Computer Is The Fastest
Which Computer Is The Fastest What computer is the fastest? What computer is the easiest to use? What computer is number one in education, and multimedia? That's right, the Macintosh l...
Information Technology / Making Utilities For MS-DOS
Making Utilities for MS-DOS Michael Sokolov English 4 Mr. Siedlecki February 1, 1996 Making Utilities for MS-DOS These days, when computers play an important role...
Computers: Productive Tools In Our Lives Have you ever seen a computer in a store and said, "Whoa! What a chick!"? I am sure you would have, if you were familiar with the new 16xCD-ROM ...
Experience with Dream Essay - Reliable and great customer service. Quality of work - High quality of work.
, ,
Dream Essay - Very reliable and great customer service. Encourage other to try their service. Writer 91463 - Provided a well written Annotated Bibliography with great deal of detail per th
, ,
it is always perfect
, ,
The experience with Dream Essay is stress free. Service is excellent and forms various forms of communication all help with customer service. Dream Essay is customer oriented. Writer 17663
, ,
Only competent & proven writers
Original writing — no plagiarism
Our papers are never resold or reused, period
Satisfaction guarantee — free unlimited revisions
Client-friendly money back guarantee
Total confidentiality & privacy
Guaranteed deadlines
Live Chat & 24/7 customer support
All academic and professional subjects
All difficulty levels
12pt Times New Roman font, double spaced, 1 inch margins
The fastest turnaround in the industry
Fully documented research — free bibliography guaranteed
Fax (additional info): 866-332-0244
Fax (additional info): 866-308-7123
Live Chat Support
Need order related assistance?—Click here to submit a inquiry
© Dreamessays.com. All Rights Reserved.
Dreamessays.com is the property of MEDIATECH LTD