Computer Virus
Computer Virus
Introduction
A computer virus is a software program attached to a legitimate program that is destructive in
nature and infects other programs in the system by replicating and attaching itself to other
healthy programs. These harm the computer in many ways such as:
Corrupt and delete the data or files.
Effect the functionality of software applications.
Effect the Hard Disk by erasing everything.
Use e-mail to infect the other computers.
The processing of the computer is also affected.
The virus also spread through the files downloaded on Internet.
The virus cannot infect write protected disks or written documents, already compressed
file and computer hardware, it only infects software.
Computer Virus
Unlike traditional viruses, a companion virus is computer virus which does not
modify any files.
Instead, it creates a copy of the file and places a different extension on it,
usually .com.
This makes a companion virus difficult to detect, as anti-virus software tends to use
changes in files as clue.
The companion virus is an older version of virus that was more prominent during the
MS-DOS.
It needs human intervention to further infect a computer but after the advent of
Windows XP, as there is no use of the MS-DOS, there are fewer ways for this type of
virus to propagate itself.
Some examples include: Stator, Asimov.1539, Stator and Terrax.1069
Email Virus
Logic bombs and time bombs are small malicious programs to cause harm at a certain
point of time but they do not replicate.
They are not even programs in their own right but rather camouflaged segments of
other programs.
A logic bomb may be implemented by someone trying to sabotage a database when
they are fairly certain they won’t be present to experience the effects, such as full
database deletion.
In these instances, logic bombs are programmed to exact revenge or sabotage work.
For example, a programmer could delete the critical sections of code by establishing a
logic bomb if he/she is terminated from the company.
Logic bombs are most commonly installed by the insiders who have the access to the
system.
Macro Virus
The Worm is very similar to a virus and has the ability to self-replicate itself and
infect the computer also.
They travel longer distances by storing themselves in critical areas of the disk from
where they get loaded and have with them sufficient code to transfer themselves
outward from the infected system.
Worms have been known to damage and infect the entire LANs.
It does not modify a program like a virus; however, it replicates so much that it
consumes the resources of the computer and makes it slow.
Worms are independent programs while viruses attach themselves to another
program.
Examples of Worm: Lovgate.F, Sobig.D, Trile.C, PSWBugbear.B, Mapson, Code
Red, Nimda
Trojan Horse
Trojan horse is a hidden malicious code that could alter or delete the information of client
computer or perform any other unauthorized function.
Trojan horses contain programs that corrupt the data or damage the files. It can also corrupt
the software applications.
Trojans can illegally trace important login details of users online – for example E-Banking.
The activities of Trojans are:
i. Deleting data
ii. Blocking data
iii. Modifying data
iv. Copying data
v. Disrupting the performance of computers or computer networks
The Effects of Computer Virus
Computer Virus can slow down your computer performance and become inefficient or
run slowly.
It tends to fill up the computer with useless data.
Virus can corrupt the system files.
It can make the changes in the data of the programs or files and cause erratic results.
It might steal important information from your computer and send the same to some
other person.
It might reset or reboot a computer by sending the required codes.
It might format a disk by sending the formatting command to the system thereby
causing to lose everything on the disk.
The Vulnerability of Operating Systems to Virus
There are many Operating systems in the market such as Mac, Windows, Linux, UNIX,
DOS
etc. which are being used by billions of professional and personal users.
Before selecting any operating system, there is always a question: “Which Operating
System is efficient enough to prevent virus”? Viruses are not restricted to DOS or
Windows.
A virus has the capability of infecting any type of computer, irrespective of the
Operating System it runs.
Virus writers are like other software developers in their desire to develop for the
biggest market.
It depends on the users how long he or she can keep it off of viruses
DOS vs. Linux
As an operating system, Linux works much better than DOS.
In terms of performance Linux is more reliable than any other operating system,
even windows.
It easily lowers the number of viruses.
Linux and Mac operating systems are less vulnerable to virus attack as these two
systems need advantaged access to install and run any kind of viruses.
LINUX can be installed in Super computers to embedded processors and the
Windows is the most recommended OS for desktop.
People across the world are being able to use it without any major support to
minimize the attack of any Malware, especially when it is compared with
windows
Protection from Virus
We all are interested in securing our belongings such as Office, home, locality and
even country also.
So we use different mechanisms to ensure the security- such as we keep our
valuables safely locked in a cupboard, we keep the doors of our houses even
locked;
we keep the guards to keep secure the localities and police security within the city
and armed forces for the country also.
It is always advisable to the follow the dictum “Prevention is better than cure”.
Moreover, since the viruses are made faster than the vaccines, it is a good practice
to follow some simple precautionary measures, which can reduce the possibility of
virus attack.
Use updated anti-virus program.
Do not copy pirated software on your computer.
Use the legal software from the reliable sources only.
Do not download suspicious shareware programs.
Use a secure operating system.
Avoid letting the system to be used by unauthorized users.
Allow you to schedule scans to automatically run for you.
Scan the computer using Virus Scanner while booting up the system.
Avoid loading of games that are passed as freeware.
Proper backup of all data and program files should be kept
Use of Popular Antivirus Software
Norton Anti-Virus
McAfee
Kaspersky
Webroot
Symantec (Norton)
AVG
Microsoft Security Essentials
Quick Heal
EScan