Erbil Polytechnic University Erbil Technical College Civil Engineering Department 1 Stage / Group (A)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Erbil polytechnic university

Erbil Technical College

Civil Engineering Department

1st Stage \ Group ( A )

Student Name:

Date Of Offering Report:

Supervised By:
1
Computer Virus

Computer virus can infect any computer. Computer viruses even


penetrate the privacy of your computer by stealing your password and can
control your webcam. the most common way to be infected by computer virus
is malware. Malware is computer code designed to disrupt, disable or take
control of your computer system. Computer viruses considered to be a serios
threat as they hack the system and hide in programs that many of us use every
day. A computer virus resembles the flu virus which is spread from a person
to another person and can replicate (copy itself) rapidly. Computer viruses are
known for corrupting and destroying data. A computer virus can attach itself
to a program, file or document. Hackers often create computer viruses.
sending an infect file, document or a program to a person through email will
produce virus in revisers computer. Cybercriminals use computer viruses to
steal files. There are a couple of ways that spread computer viruses, the most
common way is by sending an infect document of file to a person, when that
person opens the file or document, the virus will infect the (victims) computer
hopefully the newer versions are capable of disabling computer viruses.
computer viruses are spread by email, text messages attachments, internet file
downloads, and social media scam links. Moreover, unreliable applications
can infect your device. The problem is that virus hide themselves funny
images, opening unreliable application or links might introduce computer
virus to your computer. Every computer virus must have at least two basic
parts. Firstly, it must contain a search Routine, she locates new files or new
disks, which are. Worthwhile targets for infection. This routine will determine
how first the virus reproduce. Secondly, every computer virus must contain a
routine to copy itself into the program which the routine locates. The copy
routine will only be sophisticating enough to do its job getting caught. The
smaller it’s the better The first computer virus that was detected is called
Concept. It was first noticed in 1995. It was accidently included on a CD-

2
ROM. Another virus was launched in 1999 called the Melissa virus through an
infected word document through email. In addition, that email contained a
message “here is the document you asked for … don’t show anyone else” was
the message. When the receiver opened it, the virus will introduce to his
computer and infected it. It’s believed that the virus infected more than one
million computers. It is believed that the virus infected more than 1 million
computers. Hackers in 2017 created a virus that targeted the Macs. A Macro-
infected word document called "U.S allies and Rival Digest Trump's victory --
Carnegie Endow for international peace.com. When the receiver opened the
documents, his/her Computer was infected. As a result, hacker had access to
the receiver’s browser history, monitor, Webcams, password and Encryption
keys. It is really important and essential to know if your computer is infected
or not. Computer viruses frequently spread in a fast way. Receiving a strange
email will probably cause the propagation of the file viruses. If your computer
is running slowly, strange changes being made, menu items missing,
appearance of unusual dialog boxes might mean that your computer is infected
by computer virus. Printing the propagation of computer virus is extremely
significant. Getting rid of computer virus is not easy. There are several ways
to get rid of computer virus using an antivirus spamming filter updating all
software and patches not opening attachments from unknown senders and
avoiding it clicking on banner ads can protect your computer from the virus
frequent popup windows changes to your homepage mass email being sent
from your email account frequent crashes unless Val slow computer
performance unknown programs and password changes indicate that your
device is infected by computer virus using trusted antivirus Using trusted
antivirus product light Norton antivirus basic protects the computer from
viruses avoiding clicking pop up Advertisement virus that you download
Protects your device There are many soldiers of computer viruses the booth
sector virus is a type of virus that infects the booth sector of floppy disks of
the master boots record of hard Disguise the webs drifting virus is a type of
computer security vulnerability through website is that breaches your web
3
browser Security The browser Hijacker Is a malware program that modifies
web browser stink without the users permission and redirects The user to
website is the user had not Intended virus the resident virus is a computer
viruses that stores itself was in memory allowing it to infect other virus even
when the original infected program is no longer running. The direct-action
virus is a type of file infect her where is that work is by touching itself to an
.exe or .com Fire when installed or exacted The polymorphic virus is a type of
virus that insert (. ) Causes into exactable Files the Multipartite Virus is a
kind of viruses that infect us and spree this in multiple ways antivirus software
programs is a simple way to avoid comfortable virus. In fact, a computer virus
is much more like a simple one-celled living organism than it is like a
biological virus. Although it may attach itself to other programs, those
pogroms are not alive in any sense. Furthermore, the living organism is not
inherently bad, thought it does seem to have a measure of self-will. Just as
lichens may dig into a rock and eat it up over time, (---) certainly dig into your
computer and do things that you don’t want. Some of the most destructive
ones will wipe out everything stored on your hard disk, while any of them will
at least use a few CPU cycles here and there a side from the aspect of self-
will, thought, we should realize that computer viruses per se are not inherently
destructive. They may take a few CPU cycles, however since a virus that gets
noticed tends to get wiped out, the successful virus must take only an
unnoticeable fraction of your system’s resources. Viruses that have given the
computer virus a name for being destructive generally contain logic bombs
which trigger at certain date and then display a message or do something
annoying or nasty. Such logic bombs, however, have nothing to do with viral
self-reproduction that they are pay loads-add ones-to the self-reproducing
code. Computer viruses are normally classified according to the types of
programs the effect and the method of infection employed. The broadest
distinction is between boots actual infect us, which take over the booth sick to
run file in factories, watching fake its ordinary program for us on a disk. Some
viruses, known as (——) Viruses, infect both boot sectors and program files.
4
That program file infectors may be for the classified according to which type
of programs they infect. They may Infect COM call my EXE or SYS files, or
any combination thereof. Then EXC files come in a variety of levels including
plain-vanilla DOS EXE’s, windows (——) or 32-bit EXE’s, OS/2 EXE’s, etc.
These types of programs have considerable difference, and the viruses that
infect them are very different needed. Finally, we must not that the virus can
be written to infect any kind of corn, even could that might have to become
peeled all interpreted before it can be (——). Thus, a virus could infect a C or
Basic program, a batch file, or a Paradox or D base program. Or it can infect a
Microsoft word document as a macro

You might also like