Thesis about computer worms

topological worms ppt

Computer viruses are written with the sole intention of stealing data or crippling a system. EXE files.

Example of worm malware

Indicators of a computer virus There are several known indicators that a computer has been infected with a virus. Photo by Mot The result? These three concepts are often used interchangeably because they are all malicious programs that can destroy files and data and cause damage to the computers. One of the indicators is when the computer runs slower than usual. Viruses are broken up into to main classes, file infectors and system or boot-record infectors. It can automatically perform system operations such as creating or deleting files, or writing into an existing file. However, computer viruses have existed years before the year In the same manner that a biological virus can be transferred from one person to another a computer virus can likewise be transferred from one computer to another. The consequences were heavy: Several months later, reports indicated that Nimda was still a threat. Inhungry and curious minds downloaded a file called List. Another common way of spreading viruses is through e-mail attachments. A File Infector virus is also another kind of virus. Theseinstructions copy themselves to other programs, a nd the cycle continuesspreading. Computer viruses may also spread from removable media. Computer viruses interfere with computer operation.

Within several hours of its discovery, it had hit nearly 7, essay. A virus is composed of instructions hidden inside a program. This essay has been submitted by a student. Marcia Savage 1 According to Eyad Al-Hazmi citing Computer Economicsbelow is the data on the financial impact on malware attacks from to Because viruses can replicate themselves they can cause annoyance as they reduce the performance of the computer system by taking up huge memory or disk space.

worm security

DOC in the alt. When a user downloads files or programs from the Internet, the same may contain viruses which the user is unaware of. According to wikipedia.

Difference between computer virus and computer worms

COM and. It is capable of modifying the files names and installing various files on the infected machine. The worm took advantage of a buffer overflow vulnerability in Microsoft IIS servers and would self-replicate by exploiting the same vulnerability in other Microsoft IIS machines. Types of Viruses There are different types of viruses. However, other viruses are malicious which are capable of damaging or corrupting data, changing data, erasing files or locking up the whole computer systems. The Michelangelo virus destroys data by overwriting a portion of a hard disk. They have to fight for survival in complex conditions of conflicting computer systems. Just as a biological virus spreads itself from cell to cell and host to host in humans a computer virus spreads from file to file and computer to computer

This virus is a malicious and destructive program that sneaks inside the systems such as the XP or Vista. Sometimes referred to simply as the central processor, but more commonly called processor, the CPU is the brains of the computer where most calculations take place.

There are ways to protect your computer from these nasty things however, you must keep on protecting it and not let your guard down. Some are called stealth viruses because of the way that they hide themselves, and some polymorphic because of the way they change themselves to avoid scanners from detecting them

Rated 10/10 based on 29 review
Computer Viruses