2012年3月22日星期四

Computer Virus Basics

'Virus' may be the most often uttered word in cyberspeak! But we usually utter it without once you know what it actually means. Technically, a virus is really a malicious program or a bit of code that's loaded on your computer without your knowledge and runs against your wishes. They are able to replicate themselves and spread all around the network and in to other networks in so doing.


Viruses are dangerous simply because they may use up all available memory or make your pc crash. A much more dangerous kind of virus is one which can breach security systems and go other networks.


The first virus was the Creeper virus in the times of the ARPANET (Advanced Studies Agency Network - a primitive version of the Internet) in the 1970s.


It had been a self replicating program compiled by Bob Thomas at BBN in 1971. Creeper gained use of the DEC PDP- 10 computers running the Tenex Operating-system through the ARPANET. It copied it self to the remote system where in fact the message: "I'm the Creeper, catch me if you're able to... " was displayed. Later a course called the Reaper was used to delete the Creeper!


The more prevalent kind of viruses are Macro-viruses that have become common because the 1990s. Many of these viruses are written in the scripting languages of Microsoft programs, such as for example Office, and infected Word documents and spreadsheets.


But a virus can also be sent as a website link on the internet. An innocent user might believe that the hyperlink is from the trusted source. And upon clicking, herpes will execute on the machine, unleashing its payload. The most typical method of delivering viruses to potential victims is through attachments on emails.


Once some type of computer has been infected with a virus, it is usually unsafe to keep utilizing it without removing herpes and restoring it to a safe state. In worst case scenarios it might require reinstalling the entire operating-system. The machine Restore option in Windows is available in handy since it restores the registry and critical system files to a previous checkpoint.



没有评论:

发表评论