As usual, kesayanganya computer Fascal already menemai for six years. During that time, there were no complaints about the computer's performance. Everything was normal. But this morning, he was surprised when turned on his computer and discovered some important files have changed size of the file. 2.1 MB initially became 15kB, originally measuring 3.5 MB changed to 15kB. All file changes size to 15kB. What's this?
If at any time such a thing happens, it is certain that computers infected with the virus through several media including: Internet, documents, network or email.
We often hear the word "virus" but does not understand exactly what he meant, how they spread, how the characteristics that have been exposed to computer viruses, how to prevent it and how to handle if it is infected or how to avoid them to avoid contracting the virus. All of these questions we must find the answer to a time when the computer virus can be solved easily without causing concern about the threat of the virus.
Some Understanding Virus
"A program that can infect other programs by modifying them to include a slighty altered copy of itself. A virus can spread throughout a computer system or network using the authorization of every user using it to infect their programs. Every programs that gets infected can also act as a viral infection that grows "
(Fred Cohen, the U.S. Computer Specialist)
A computer virus is a computer program that can duplicate itself and spread by inserting copies of itself into other programs or documents. Computer viruses can be spread on computers or networks by making copies of itself without the knowledge of the user's computer. The virus can cause harmful effects, such as starting from displaying messages, steal data or even control the computer remotely. Computer viruses can be destructive (for example by destroying the data on the document), making computer users feel annoyed, or no effect at all.
Istilan "virus" was first used by Fred Cohen in 1984 in the United States. A computer virus called "virus" because it has some fundamental similarities with the virus at a medical term (biological viruses).
Computer viruses can be interpreted as an ordinary computer program. But it has fundamental differences with other programs, which created the virus to infect other programs, change, manipulate and even to damage it. There is to be noted here, the virus will infect only if the trigger program or programs that have been infected had executed. So, for files that have been infected with the virus have not opened it will not infect the other files. But when the file diaktikan / opened, the second was also directly infect the other documents.In medicine, the virus is a living micro-organisms in life that can only be seen uses the electron microscope. In computer science, a virus is a computer program that has the ability to reproduce itself by inserting the program / programming language into another file. There are similarities with biological viruses, computer viruses can spread quickly on the files in a computer, or even infect other files on your computer, either through a network or through exchange activities through several media file storage.
The origin of word "Virus"
In 1949, a mathematician expresses "self altering automata theory" in which the theory is the result of research mathematicians.Then in tahun1960, Bell Labs (AT & T), the experts in laboratory BELL (AT & T) mencob theory expressed by John von Neumann, by making a type of game / game. They create a program that can reproduce itself and can destroy your opponent artificial programs. The program is able to survive and destroy all other programs, would be considered the winner. This game eventually became the favorite game in each computer lab. However, the longer the program that created the more dangerous, so they conduct surveillance and strict security of this game.
If at any time such a thing happens, it is certain that computers infected with the virus through several media including: Internet, documents, network or email.
We often hear the word "virus" but does not understand exactly what he meant, how they spread, how the characteristics that have been exposed to computer viruses, how to prevent it and how to handle if it is infected or how to avoid them to avoid contracting the virus. All of these questions we must find the answer to a time when the computer virus can be solved easily without causing concern about the threat of the virus.
Some Understanding Virus
"A program that can infect other programs by modifying them to include a slighty altered copy of itself. A virus can spread throughout a computer system or network using the authorization of every user using it to infect their programs. Every programs that gets infected can also act as a viral infection that grows "
(Fred Cohen, the U.S. Computer Specialist)
A computer virus is a computer program that can duplicate itself and spread by inserting copies of itself into other programs or documents. Computer viruses can be spread on computers or networks by making copies of itself without the knowledge of the user's computer. The virus can cause harmful effects, such as starting from displaying messages, steal data or even control the computer remotely. Computer viruses can be destructive (for example by destroying the data on the document), making computer users feel annoyed, or no effect at all.
Istilan "virus" was first used by Fred Cohen in 1984 in the United States. A computer virus called "virus" because it has some fundamental similarities with the virus at a medical term (biological viruses).
Computer viruses can be interpreted as an ordinary computer program. But it has fundamental differences with other programs, which created the virus to infect other programs, change, manipulate and even to damage it. There is to be noted here, the virus will infect only if the trigger program or programs that have been infected had executed. So, for files that have been infected with the virus have not opened it will not infect the other files. But when the file diaktikan / opened, the second was also directly infect the other documents.In medicine, the virus is a living micro-organisms in life that can only be seen uses the electron microscope. In computer science, a virus is a computer program that has the ability to reproduce itself by inserting the program / programming language into another file. There are similarities with biological viruses, computer viruses can spread quickly on the files in a computer, or even infect other files on your computer, either through a network or through exchange activities through several media file storage.
The origin of word "Virus"
In 1949, a mathematician expresses "self altering automata theory" in which the theory is the result of research mathematicians.Then in tahun1960, Bell Labs (AT & T), the experts in laboratory BELL (AT & T) mencob theory expressed by John von Neumann, by making a type of game / game. They create a program that can reproduce itself and can destroy your opponent artificial programs. The program is able to survive and destroy all other programs, would be considered the winner. This game eventually became the favorite game in each computer lab. However, the longer the program that created the more dangerous, so they conduct surveillance and strict security of this game.
Twenty years later, ie on tahun1980, these programs eventually known as the "virus". Next Perkembanga, this virus had spread outside the laboratory environment, and begin circulating in the general population.Picture code detected virus program
Criteria virus
If calculated from the initial discovery of the virus in 1980 until now, have not calculated the amount of virus that spread throughout the world and is no longer known names of new viruses, both locally and internationally. You do not be surprised if the virus is called local because there are some viruses that are made by Indonesian students with different goals each.
A program can be called a virus if it meets a minimum of 5 criteria:
1. The ability to obtain information
Generally the virus requires a list of file names contained in a directory in order to obtain a list of files that can be infected. For example, the macro virus will infect all berekstensi *. doc files or in other words, the macro virus will infect all documents processed by Microsoft Word. Here's ability to gather information necessary for the virus can make a list of all files and then sort them by looking for files that can be infected. This data is usually created when the file is opened by the infected user.
If calculated from the initial discovery of the virus in 1980 until now, have not calculated the amount of virus that spread throughout the world and is no longer known names of new viruses, both locally and internationally. You do not be surprised if the virus is called local because there are some viruses that are made by Indonesian students with different goals each.
A program can be called a virus if it meets a minimum of 5 criteria:
1. The ability to obtain information
Generally the virus requires a list of file names contained in a directory in order to obtain a list of files that can be infected. For example, the macro virus will infect all berekstensi *. doc files or in other words, the macro virus will infect all documents processed by Microsoft Word. Here's ability to gather information necessary for the virus can make a list of all files and then sort them by looking for files that can be infected. This data is usually created when the file is opened by the infected user.
Picture Information on a folder
The virus will soon conduct data collection and will usually be placed in RAM, so if the computer is turned off all the data lost. But these data will be created again each time the virus is activated. Usually this data is also stored as hidden files by the virus. If knowing the information in a folder there are 44 objects (plus 4 hidden), then suspect a virus in that folder, although not always the case.
2. The ability to check a program
A virus must also be able to check a file to be infected, for example, he served infect berekstensi program *. doc, then he should check whether the document files have been infected or not, because if it is, will waste menularinya again. This is very useful to improve the ability of a virus in terms of speed infects a file / program. Commonly done by the virus is to have / give alert in the files / programs that have been infected so it is easy to recognize by the virus. Examples of such labeling is to provide a unique bytes in each file that has been infected.
3. Ability to multiply
The core of the virus is the ability mengandakan itself by infecting other files. A virus has been discovered when the victim so she would recognize him with a look. If not infected then the virus will begin transmission action by writing bytes to the file identifier, and so on mengkopikan / write the object code file viruses on the target. folder duplication process by the virus
The virus will soon conduct data collection and will usually be placed in RAM, so if the computer is turned off all the data lost. But these data will be created again each time the virus is activated. Usually this data is also stored as hidden files by the virus. If knowing the information in a folder there are 44 objects (plus 4 hidden), then suspect a virus in that folder, although not always the case.
2. The ability to check a program
A virus must also be able to check a file to be infected, for example, he served infect berekstensi program *. doc, then he should check whether the document files have been infected or not, because if it is, will waste menularinya again. This is very useful to improve the ability of a virus in terms of speed infects a file / program. Commonly done by the virus is to have / give alert in the files / programs that have been infected so it is easy to recognize by the virus. Examples of such labeling is to provide a unique bytes in each file that has been infected.
3. Ability to multiply
The core of the virus is the ability mengandakan itself by infecting other files. A virus has been discovered when the victim so she would recognize him with a look. If not infected then the virus will begin transmission action by writing bytes to the file identifier, and so on mengkopikan / write the object code file viruses on the target. folder duplication process by the virus
Tidak ada komentar:
Posting Komentar