Computer viruses have two parts: an infector and a detonator. The infector copies the virus to other computers by attaching itself to files like COMMAND.COM, replicating the virus. The detonator then performs the virus's damaging or interfering functions. To prevent viruses, antivirus software like virus shields and scanners should be installed, write-protected floppies used carefully, and pirated software avoided.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
86 views9 pages
How Computer Viruses Work
Computer viruses have two parts: an infector and a detonator. The infector copies the virus to other computers by attaching itself to files like COMMAND.COM, replicating the virus. The detonator then performs the virus's damaging or interfering functions. To prevent viruses, antivirus software like virus shields and scanners should be installed, write-protected floppies used carefully, and pirated software avoided.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9
HOW COMPUTER VIRUSES WORK
Virus Computer
Two Parts
Infector Detonator VIRUSES HAVE TWO VERY DIFFERENT JOBS
1. ONE OF THE FEATURES OF A COMPUTER VIRUS THAT SEPERATES IT.
2. OTHER KIND OF COMPUTER PROGRAM IS THAT IT REPLICATES ITSELF , SO THAT IT CAN SPREAD ( VIA FLOPPIES TRANSPORTED FROM COMPUTER , OR NETWORK) TO OTHER COMPUTERS. OR CD, AND USB DRIVES. 3. After the infector has copied the virus elsewhere,the detonator performs the virus's main work. Generally, that work is either damaging data on your disks, altering what you see on your computer display, or doing something else that interferes with the normal use of your computer. Example
Lehigh Virus : THE INFECTOR PORTION OF LEHIGH REPLICATES
BY ATTACHING ACOPY OF ITSELF TO COMMMAND.COM(AN IMPORTANT PART OF DOS ENLARGING IT BY ABOUT 1000 BYTES So let's say you put a floppy containing COMMAND.COM into an infected PC at your office -that is, a PC that is running the Lehigh program. The infector portion of Lehigh looks over DOS's shoulder, monitoring all floppy accesses. The first time you tell the infected PC to access your floppy drive, the Lehigh infector notices the copy of COMMAND.COM on the floppy and adds a copy of itself to that file.Then you take the floppy home to your PC and boot from the floppy. (In this case, you've got to boot from the floppy in order for the virus to take effect, since you may have many copies of COMMAND.COM on your hard and floppy disks, but DOS only uses the COMMAND.COM on the boot drive.) Now the virus has silently and instantly been installed in your PC's memory. Every time you access a hard disk subdirectory or a floppy disk containing COMMAND.COM,the virus sees that file and infects it, in the hope that this particular COMMAND.COM will be used on a boot disk on some computer someday. Don't worry too much about viruses. You may never see one. There are just a few ways to become infected that you should be aware of. The sources seem to be service people, pirated games, putting floppies in publicly available PCs without write-protect tabs, commercial software (rarely),and software distributed over computer bulletin board systems (also quite rarely, despite media misinformation Many viruses have spread through pirated -illegally copied or broken - games. This is easy to avoid. Pay for your games, fair and square.If you use a shared PC or a PC that has public access,such as one in a college PC lab or a library, be very careful about putting floppies into that PC's drives without a write-protect tab. PREVENT VIRUSES BEFORE ATTACK
YOU MUST INSTALLED ANTIVIRUS PROGRAM, THERE ARE
ACTUALLY TWO KINDS :
1. VIRUS SHIELD, WHICH DETECT VIRUSES AS THEY ARE
INFECTING YOUR PC. 2. VIRUS SCANNERS, WHICH DETECT VIRUSES ONCE THEY HAVE INFECTED YOUR PC. REMEMBER THESE 4 POINTS:
• VIRUSES CAN'T INFECT A DATA OR TEXT FILE
• BE SURE TO COLD-BOOT FROM A WRITE PROTECTED FLOOPY BEFORE RUNNING AN ANTIVIRUS PROGRAM • DON'T BOOT FROM FLOPPIES EXCEPT RELIABLE DOS DISKS OR YOUR ORIGINAL PRODUCTION DISKS • STAY AWAY FROM PIRATED SOFTWARE THANK YOU