Tuesday, February 12, 2019
How computer viruses work :: essays research papers
How data processor viruses workComputer viruses are not understood very well, further they get your attention. Viruses bespeak us how vulnerable we are, hardly they also show how open and worldly human beings have become. Microsoft and other large companies had to shut out down all their e-mail systems when the Melissa virus became a universal event.A computer virus is passed on from one computer to other computer. A virus must ride on top of some(prenominal) other program to document in order to perform an instruction. afterwards it is running, it female genital organ then infect other programs.Viruses were first seen in the youthful 1980s the first factor was the sp pack of personal computers. Before the 1980s home computers were non-existent or they were used for toys, and the real computers were very rare and they were locked international to only be used by the experts.The second factor was the se of the bulletin progresss any one could get to a bulletin board if th ey had a modem and download programs. Bulletin boards led to the precursor of the virus cognize as the Trojan Horse. It is a program that sounds really cool when you read it, so then people download it, and when people run the program, however, it does something uncool same erasing your disk, so people think that they are getting something neat, but it wipes out their system.The third factor to viruses is the floppy disk. Programs were small and they could fit the run system, or a word processor onto the floppy disk, and then raise on the machine and it would load the operating system and everything else off the disk. Viruses took returns of these three facts to create the first self-replicating programsEarly viruses were pieces of code attached to programs like games or word processors. People could download an infected game from a bulletin board and run it, and a virus like this is a small piece of code embedded in a larger, legitimatise program. The virus loads its self to memory and looks around to see if it can find any programs on the hard disk. When it finds one it modifies it to the viruss code to the program. Then the virus launches the real program, and the user has no vogue of knowing that it is infected. The next time this program is executed, they infect other programs, and the wheel around continues.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment