Computer Viruses Essay
Report Computer Viruses Nowaday the speed of development of technology was very fast and progressive, everybody familiar with the Internet. As now you can search many information in internet, such as buy film tickets or online shopping even handle personal finance, so every people were put many time in the internet. Do you pay attention to the security of computer when you browsing Internet? For example some confidentiality information or your banking account and password was stolen.
This is copmuter viruses, it can make a large influence for family user even merchant, if you want to protect your privacy, learn more about viruses, that is a important chapter we need to know. Now we are going to introduce computer viruses. The origin of the virus Malicious intrusions into computer systems in the network, while high-profile hackers, computer virus, the origin of what has been rarely noticed.
Early virus is not indignant or anti-social young people to create a computer expert, but from the University of researchers, system administrators and a group of Old School hackers hand, they have the ability to automatically copy the program as a clever feature. What is a viruses and malignant code? Malignant code refers to some progream damage the computer or network that you can’t expect. Hidden damage include change and steal your information, harm your copmuter system, run some function user don’t want etc. The examples of malignant code include copmuter viruses, worms, Trojan horses, logic bombs, spyware, and backdoor programs.
User must adpot prevent measures to detect and avoid eruption of malignant code, because it will lead the software and information processing equipment have a serious threat. Now we are introduce four types viruses: (a)Trojan Horse (b)Worms (c)Botnet (d)Spyware. Trojan horse is a malignant program, and with the virus The biggest difference is that not usually self-replicating Trojan horses, most of them used to steal computer passwords. In principle, it is only a remote management tool. In itself, without harmful nor contagious, it can’t be alled virus because Trojan horse is steal the information and passwords inside your computer and control computer by hacker and in general is looking for a backdoor Trojan horse program to steal passwords based malignant program. Trojan is a special kind of vicious program, if not careful with the use of a software program contains a Trojan, the Trojan will be planted to the computer, after surfing the web, the computer control completely to the hacker, he will be able to through your computer, steal passwords, credit card numbers and other confidential information, but also a computer monitor, control, view, modify information, etc. perations. Let talk about worms. What is a network worms? Computer worms and viruses similar to, is a self-replicating computer programs. Worm is designed to replicate itself on your computer,but it will also control computer can transfer files or information on the function of automatically copied. Is usually a generally refuse to implement the code, and launch denial of service attacks,and make the computer a great degree of efficiency in the implementation of the reduced. Thereby undermining the normal use of the computer a virus.
With a computer virus is different is that it is not attached to the individual within the program. Once the system is invaded by the worms, it will be replicated. Worms very dangerous place, is that it will conduct a large number of replication,For example: worms may be a copy of itself to send you an e-mail address book for each person listed,The user’s computer will then perform the same action,thus causing a chain reaction occurs, up large amounts of network bandwidth, reduce the entire enterprise network and the Internet speed.
Whenever a new spread of the worm program, they will be spread throughout a very high speed, blocking network traffic and may allow each person to pay twice as much than the normal waiting time. In order to browse the Web. Usually worms are also based on its face subjects were divided into two kinds: – One is the face of large-scale use of computers to launch denial of service network worm virus, – The other is aimed at individual users to carry large amount of garbage code worm.
The spread of the worm is: Permanent worm in one or more machines, usually it will scan other machines have the same kinds of worm infections,if not, it will through its built-in means of communication to infection, in order to achieve the purpose of the computer paralyzed. Its usually in the host machine as a scan source. The commonly used by spam, vulnerability in these two kinds of methods to spread. How to determine whether their computer is infected with worm ?
When you open and implementation of the infected program,you may not be aware that they have infected with virus, unless you find your computer slow down, stop responding, or when the machine, and every few minutes to restart. Virus attacks are sometimes required to start the computer using files, in this case you may need to press the power button, and found that the entire screen is blank. These signs are computer poisoning usually phenomenon – although it may be caused by and the disease, nothing to do with poison caused by the hardware and software problems.
Botnets are highly valued by online criminals, and increasingly become the Internet face a serious problem. What is a botnet? Botnet refers to criminals, the virus attachment in the e-mail, web pages, or packaged into a number of free software, especially the fake anti-virus software free of charge, computer users to open or download, to carry out certain files, in fact it had led to the computer with a virus, but most of them have been poisoned computer users will not know have been poisoned.
The most of the virus will be Trojans, Trojan would create “back door” so that the computer can be poisoned botnet master the order, users will be unaware that allow a computer to become part of botnets. After the criminals will make use of these viruses, spyware, hacking computers, and then hide behind the computer to carry out remote control and then attack, to steal information and send spam e-mail, etc. Sometime misled by those who are difficult to detect. Criminals in foreign countries control other people’s computers for extortion case, in recent years, our “Botnet” an upward trend.
The “Botnet” appeal of the strong, “Is a geometric series is spreading out”, the criminals are not simply “play”, “Their ultimate goal is to remote control another person’s computer,” the use of another person’s computer to attack other sites, web services extension resistance, the spread of junk e-mail and stealing information. How Botnet formed? The first step, hackers are usually attached to a hyperlink through the issue of a large number of e-mail “invitation” computer users. The second step, the computer users to open a hyperlink into the unknown once the site will be Trojans invade.
The third step is to connect a hacker through a “poisoned” the computer form a “zombie network”, computer users are not easily detectable. The third step is to connect a hacker through a “poisoned” the computer form a “zombie network”, computer users are not easily detectable. The fourth step, hackers can “zombie networks” to mobilize tens of thousands of computers, issued a large number of “denial of service information” paralysis of the target site, or junk mail; can continue to log in to certain sites to push traffic .
We should care our computer have infection viruses or not, but how? How to know the computer is infected? These viruses usually do not disable your computer, because the zombie computers must be turned on and connected to the Internet can be operate. If your computer suddenly slow down the speed for example display mysterious messages, or unusual manner and receipt of certain non-sent in by their own “hit back” e-mail, that representatives may have been caught. Lastly, spyware is the one of the most dangerous and threat in the internet, it was created in 1994.
Since 2000 peoples began use spyware popularly, they use spyware invade user computer to steal the personal information of user, and then transfer to other people make commercial use, or provied an advertisement even change user PC setting, they do not have user allow, this is constitute a Netword crime. How can it invade user PC? Spyware will invade PC by different routes, the common rountes is when you download some software you will download the spyware togerther, such as some free software, or share file.
In addition some unkonw web sites link in communication media (MSN, E-mail), when you open it you will increase the chances of infection. Your computer will appear the following phenormenon, the main page of the web browser will change the other web page, and do not have your approve that add some new item in your favorites web list. The browser attacker will coerce user visit the web site they don’t want, than it can increase the number of visit thus make more people click an advertisement in web page. Furthermore the windows of advertisement will appear continuously on the screen even user do not choose any browser.
Besides, spy will auto install the new software (such as: Internet search tool), and do not have user allow. And the suspicious network communcation still appear in copmuter, and user doesn’t perform any online activities. When you infect the sypware, it will keep under surveillance in user computer, if it aware you find some information to crack the promble, it will fiind the way to stop you. The fearful point in sypware is they will monitor your network activities, some survey show the purpose of using sypware, peoples want to increase the income from advertisement and steal bank account and password, that can make some problem in society.
First this behavior of intercept advertisement deprive user right to know, second user personal imformation is confidential, if they stolen and use it , it is a network crime. So, how can we to protect our computer? 1. Unless you are aware the attachments in the e-mail, otherwise, do not open the e-mail, MSN or mobile newsletter in the attachment (even from an acquaintance of the annex). Because attachments may contain viruses. 2. Use an Internet firewall. And need to set up a firewall and by default enabled. 3. To keep your computer updated.
Eg the case of Microsoft’s computer, please enable automatic updates. 4. Please order in line with industry-standard anti-virus software and anti-spyware software and keep it updated the software. 5. Use licensed software products. Botnets are usually primarily by the efficiency of the implementation of operating systems and software for illegal copying of computer version of the composition. Unauthorized software more vulnerable to virus, intrusion, or even in your already installed without the knowledge of the virus in this software. 6. Please do not use illegal downloading.
Because computer users have no idea to download the software or if they contain the virus within the songs. Finally, we want to give a message to every computer user, protect the self property of information is our responsibility, we should not neglect the problem of network security, it can lead the serious effect of our life, maybe data lose, personal information leakage etc. We should improve the awareness of network security, pay attention more about news and learn new knowledge. If meet any questions, we should ask the professionals. Then we can enjoy the Internet safely.