+ 1-888-787-5890  
   + 1-302-351-4405  
 
 
 
 

Essay/Term paper: Computer viruses

Essay, term paper, research paper:  Technology

Free essays available online are good but they will not follow the guidelines of your particular writing assignment. If you need a custom term paper on Technology: Computer Viruses, you can hire a professional writer here to write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written essays will pass any plagiarism test. Our writing service will save you time and grade.

A computer virus is a relatively small program that attaches itself to data and program files before it delivers its malicious act. There are many distinct types of viruses and each one has a unique characteristic. Viruses are broken up into to main classes, file infectors and system or boot-record infectors.
A file infector attaches to ordinary programs usually affecting .COM and .EXE files. These two files are subject to infection though some can infect any program from which execution is requested. On the other spectrum, system or boot-record infectors infect executable codes found in certain system areas on a disk, which are not ordinary files.
Not only are there two main classes of viruses, but there are also many different types. A virus can be classified as a boot sector virus, a program virus, a trojan horse virus, a macro virus, a memory resident virus, a stealth virus, or a polymorphic virus.
A boot sector virus replaces the startup code on a disk with a modified version, which is loaded into the memory when the computer is started.
Program viruses attach to legitimate program files. After attachment the program file will then intercept the program"s execution and take control of the computer system.
Trojan horse viruses are also legitimate programs that are advertised as something desirable, but are actually something that is undesirable. It performs an unauthorized destructive act on your computer when executed. They received their name from the mythical Trojan Horse that was delivered to the gates of the city Troy.
Macro viruses are written in macro language of specific computer programs, such as Word or Excel. These viruses infect files when a program document is accessed, or triggered by user actions, such as certain keystrokes or menu choices.
Memory resident viruses hide in memory and are difficult to detect. When the virus is in memory it will infect any uninfected file that is executed.
A stealth virus hides their presence. They can infect a program by adding bytes to the infected file. It then subtracts the directory entry of the infected file by the same number of bytes. This gives the impression that the file"s size has not changed, therefore, antiviral programs can not detect them through these changes.
Polymorphic viruses modify their appearance and scramble their code periodically. This allows them to replicate so that none of its copies are the same.
These viruses also all have different characteristics. There are three main characteristics that a virus may have. This includes a time bomb, a logic bomb, worm characteristics. A time bomb is characterized as a virus that stops duplicating and becomes active when a certain date registers on the computer system"s clock. On the other hand, a logic bomb is triggered when a particular event occurs and they are activated by the appearance or disappearance of creation data. A virus can also be characterized as a worm. A worm is a virus-like program that creates copies of itself continuously until the computer system is overloaded and stops working. As seen here there are many different characteristics of viruses. It has been said that more than fifteen new viruses are created each day. Equip your computer system with a reliable anti-virus software program to safe guard your system from computer viruses.
 

Other sample model essays:

Conditional and Iterative A programming language cannot be a programming language with out its conditional and iterative structures. Programming languages are built to accomplish the task of cont...
Technology / Cray SuperComputer
The Cray X-MP/22 manufactured by Cray Research Incorporated (CRI) of Minneapolis, Minnesota was delivered and installed at the U of Toronto this September. The Cray is a well respected computer - main...
Technology / Crypography
Cryptography is way you can keep information secure. A person who does not know the method used to change the information to keep it secure cannot copy the method used or reverse the change. The ba...
Technology / Data Compression
Word Count: 1546 "Data Compression" just sounds complicated. Don"t be afraid, compression is our good friend for many reasons. It saves hard drive space. It makes data files to handle. It also...
In today"s business world, information about the customer is a necessity for a businesses trying to maximize its profits. A new, and important, tool in gaining this knowledge is Data Mining. Data Mi...
Technology / Data Parity
December 1996 Parity/Non-parity Parity check Early transmission codes had a serious problem in that a bit could be lost or gained in transmission because of an electrical or mechanical failure/ If the...
Dealing with Conflict 1.1  Potential conflict can arise when two parties or people have a disagreement on a particular subject. For example, a person may have said he was going to comp...
Abstract This essay intends to discuss the following statement; Digital Broadcasting will have a fundamental effect on viewing patterns, popular culture and audience identity. This will be done...
Technology / Do Computers Think?
Can or will computers ever think? Well this has been a subject of much debate between even the greatest minds, and yet there is still no answer. First of all I have would like you to answer a question...
Technology / E-Mail Business
An Economic Comparison of Mail Communications New technologies and advances in electronics have always allowed big business to do things faster, more efficiently, and more professionally than ever bef...
Experience with Dream Essay - Reliable and great customer service. Quality of work - High quality of work.
, ,
Dream Essay - Very reliable and great customer service. Encourage other to try their service. Writer 91463 - Provided a well written Annotated Bibliography with great deal of detail per th
, ,
it is always perfect
, ,
The experience with Dream Essay is stress free. Service is excellent and forms various forms of communication all help with customer service. Dream Essay is customer oriented. Writer 17663
, ,
Only competent & proven writers
Original writing — no plagiarism
Our papers are never resold or reused, period
Satisfaction guarantee — free unlimited revisions
Client-friendly money back guarantee
Total confidentiality & privacy
Guaranteed deadlines
Live Chat & 24/7 customer support
All academic and professional subjects
All difficulty levels
12pt Times New Roman font, double spaced, 1 inch margins
The fastest turnaround in the industry
Fully documented research — free bibliography guaranteed
Fax (additional info): 866-332-0244
Fax (additional info): 866-308-7123
Live Chat Support
Need order related assistance?—Click here to submit a inquiry
© Dreamessays.com. All Rights Reserved.
Dreamessays.com is the property of MEDIATECH LTD