Computer Virus
Computer Virus
Computer Virus
Origins
People create viruses. A person has to
write the code, test it to make sure it
spreads properly and
then release the virus. A person also
designs the virus's attack phase, whether
it's a silly message or
destruction of a hard disk. So why do
people do it?
There are at least three reasons. The first is
the same psychology that drives vandals
and arsonists.
Why would someone want to bust the
window on someone else's car, or spray-
paint signs on
buildings or burn down a beautiful forest?
For some people that seems to be a thrill. If
that sort of
person happens to know computer
programming, then he or she may funnel
energy into the creation
of destructive viruses.
The second reason has to do with the thrill
of watching things blow up. Many people
have a
fascination with things like explosions and
car wrecks. When you were growing up,
there was probably a kid in your
neighborhood who learned how to make
gunpowder and then built bigger and
bigger bombs until he either got bored or
did some serious damage to himself.
Creating a virus that
spreads quickly is a little like that -- it
creates a bomb inside a computer, and the
more computers that
get infected the more "fun" the explosion.
The third reason probably involves bragging
rights, or the thrill of doing it. Sort of like
Mount Everest.
The mountain is there, so someone is
compelled to climb it. If you are a certain
type of programmer
and you see a security hole that could be
exploited, you might simply be compelled to
exploit the hole
yourself before someone else beats you to
it. "Sure, I could TELL someone about the
hole. But
wouldn't it be better to SHOW them the
hole???" That sort of logic leads to many
viruses.
Of course, most virus creators seem to
miss the point that they cause real damage
to real people with
their creations. Destroying everything on a
person's hard disk is real damage. Forcing
the people
inside a large company to waste thousands
of hours cleaning up after a virus is real
damage. Even a
silly message is real damage because a
person then has to waste time getting rid of
it. For this
reason, the legal system is getting much
harsher in punishing the people who create
viruses.
History
Traditional computer viruses were first
widely seen in the late 1980s, and they
came about because of
several factors. The first factor was the
spread of personal computers (PCs). Prior
to the 1980s, home
computers were nearly non-existent or they
were toys. Real computers were rare, and
they were
locked away for use by "experts." During
the 1980s, real computers started to spread
to businesses
and homes because of the popularity of the
IBM PC (released in 1982) and the Apple
Macintosh
(released in 1984). By the late 1980s, PCs
were widespread in businesses, homes and
college
campuses.
The second factor was the use of computer
bulletin boards. People could dial up a
bulletin board
with a modem and download programs of
all types. Games were extremely popular,
and so were
simple word processors, spreadsheets, etc.
Bulletin boards led to the precursor of the
virus known as the Trojan horse. A Trojan
horse is a program that sounds really cool
when you read about it. So you
download it. When you run the program,
however, it does something uncool like
erasing your disk. So
you think you are getting a neat game but it
wipes out your system. Trojan horses only
hit a small
number of people because they are
discovered quickly. Either the bulletin board
owner would erase
the file from the system or people would
send out messages to warn one another.
The third factor that led to the creation of
viruses was the floppy disk. In the 1980s,
programs were
small, and you could fit the operating
system, a word processor (plus several
other programs) and
some documents onto a floppy disk or two.
Many computers did not have hard disks,
so you would
turn on your machine and it would load the
operating system and everything else off of
the floppy
disk.
Viruses took advantage of these three facts
to create the first self-replicating programs.
Symptoms of a
computer virus:
•The computer runs slower than usual.
•The computer crashes, and then it restarts every
few minutes.
•Applications on the computer do not work correctly.
•Disks or disk drives are inaccessible.
•You see unusual error messages.
•An antivirus program cannot be installed on the
computer, or the antivirus program will not run.
•New icons appear on the desktop that you did not
put
•Increases the use of disk space and
growth in file size as virus gets
attached itslef to many files.
•Frequently hangs of the system.
•Shows abnormal write protect error.
•Displays a change in data against the
filename in the directory, when a
virus modifies the file.
•Reformats the hard disk.
•Erase files
•Scramble data on a hard disk
•Cause erratic screen behavior
•Halt the P
•
Difference Between a
Virus, Worm and Trojan
Horse
•Virus cannot replicate themselves but
worm and trojan can do that.
•A virus cannot be spread without a human
action such as running an infected file or
program but worm and trojan have the
capabilities to spread themselves
automatically from computer to computer
through network connetion.
•A virus do not consume system memory
but worm consumes too much system
memory and network bandwidth because
of their copying nature.
•Trojans are used by malicious users to
access your computer information but
viruses and worms can’t do so, they
simply infect your computer.
Trojan Horse
A Trojan virus is one that opens your
computer up to malicious users allowing
them to read your files.
Worm
It is a selfreplicating program,
similar to a computer virus. A virus
attaches itself to, and becomes part
of, another executable program;
however, a worm is selfcontained
and does not need to be part of
another program to propagate itself.
A worm is a computer program that has
the ability to copy itself from machine to
machine. Worms normally move around
and infect other machines through
computer networks. Using a network, a
worm can expand from a single copy
incredibly quickly. For example, the Code
Red worm replicated itself over 250,000
times in approximately nine hours on July
19, 2001.
A worm usually exploits some sort of
security hole in a piece of software or the
operating system.
For example, the Slammer worm (which
caused mayhem in January 2003) exploited
a hole in Microsoft's SQL server.
DOS/Windows/NT platforms
- about 6000 of these are Word macro
viruses
- about 150-200 of these are known to
be widespread "in the wild"
- in 1999, approximately 650 new
viruses were reported each month
(more than 20 a day)
•About 5 are for Linux/Unix/etc, but none
CONCLUSION
In just over a decade, most of us have
been familiar with the term computer
virus. Even those of us who don't
know how to use a computer have
heard about viruses through
Hollywood films such as Independence
Day or Hackers (though Hollywood's
depiction of viruses is usually highly
inaccurate). International magazines
and newspapers regularly have virus-
scares as leading stories. There is no
doubt that our culture is fascinated by
the potential danger of these viruses.
Many people believe the worst a virus
can do is format your hard disk. In
fact, this type of payload is now
harmless for those of us who back up
our important data. Much more
destructive viruses are those which