Truth Facts

Computer/Robot

BackHomeNextListen

Help

Computer Viruses

The dreaded computer virus. The thought of getting one of these strikes fear into the stoutest hearted of us. But why would anyone write one of these virus programs? As a person that has experienced having a virus several times in the past, I am starting to believe in capital punishment for these people, just kidding. Seriously though, these viruses can add billions of dollars in added costs to the economy to the products we use every day. The worst part of this is the virus protection we use doesn't always help. Computer viruses are so effective that the governments of the world are developing computer viruses as weapons. This is a great weapon for the smaller countries too, because it is relatively cheap and potentially destructive. Just think if an undetectable computer virus was introduced into the cell phone company computers, whoops there goes the communications. How many of us with our personal computers have spent hours and days trying to restore our computers to their previous status? Just think of trying to do the same thing at the phone company with their myriad of computers and computer equipment, no small task I would say.

A computer virus is a piece of computer code that can replicate itself many times over or destroy computer code, it can also hold your computer data hostage. Holding computer data hostage is done with what is known as ransomware.  You cannot get your data back without a code which will be sold to you for a price. Not all computer viruses are harmful, some just leave annoying messages on your screen, while others can wipe out your drives. Here are some virus types:

BOOT SECTOR VIRUS - It effects the section of a disk that contains operating system file information. Each time you start your PC with an infected disk in your drive, the virus can spread.

FILE INFECTOR VIRUS - Some file infector viruses infect executable files. The file infector virus can get control when the program is first executed. In most cases, the file infector virus will return control to the original program after it has completed its own execution. File infector viruses replace or attach themselves to files with certain extensions such as “.COM” and “.EXE”. Programs become infected when file infector viruses are executed with the virus in memory and operate without revealing their presence. Some attack on a certain date.

MACRO VIRUSES - Macro viruses are programs written in the Macro language, which is provided with some software applications. To spread, Macro viruses exploit the capabilities of the Macro languages to transfer themselves from one infected file to another. First discovered in 1995, they infected documents created with Microsoft Word and Microsoft Excel. This virus Infects documents, spreadsheets, and templates.

COMPANION VIRUS - A companion virus is a virus that creates a new program with the same file name as an existing program, creates this in a different place or gain’s a different file type, so that typing the program's name on the command line causes the virus program to be executed instead of the original program.

PARASITIC VIRUSES - A type of file that changes the contents of the target file while infecting it. The original contents of the file will be completely or at least partly unusable.

POLYMORPHIC VIRUS - A virus which changes its telltale code segments so that it "looks" different from one infected file to another, making the polymorphic virus more difficult to find. It keeps moving to fool virus scanners.

MULTIPARTITE - Multipartite viruses usually infect both boot records and files. Multipartite viruses spread pretty easily. Variations are polymorphic virus and stealth virus. Most difficult to detect and remove.

STEALTH VIRUS - A stealth virus is a virus that actively seeks to conceal itself from discovery or defends itself against attempts to analyze or removes itself. The stealth virus temporarily hides itself so it can't be seen by virus scanners.

Some people accuse the Anti-Virus companies of writing viruses and releasing them to further the sales of their products. I don't think they have to do that, there are plenty of viruses around to keep them profitable. The guess is about 10 to 15 new viruses per day.

David L. Smith, 33, was the author of the infamous Melissa Virus. The Melissa virus attacked the flaws in Microsoft Outlook. The damage was in excess of $80,000,000. This was caused by clogging up corporate email systems. He was sentenced to 20 months in jail and a fine of $5000.

"Despite the fact there have been findings of 3 female virus creators, the typical virus creator is a single male, aged 14 to 24," says Symantecs' Carey Nachenberg, the Architect and Chief Researcher at SARC and widely believed to be the premier person in the world at dealing with viruses at the time of the writing of this article.

Three Dutch teenagers developed a worm virus that changes your browser's home page and then executes taking you to four different porn sites. They claim they did this to demonstrate a new way of advertising.

How can a person protect themselves from the virus threat? Here are some suggestions:

Use Anti-Virus software – Commercial software is the best and I prefer Bitdefender Total Security. Free software is not dependable.
Use a firewall - software, hardware or both, that make it difficult to get to someone's computer. Some anti-virus comes with its own firewall.
Enable viewing of file extensions - become familiar with the types and if you see a strange one check it out.
Don't accept email with attachments - they can easily be a virus
Disconnect from the Internet - when you are not using your computer turn it off if possible
Do regular backups - very helpful if you get wiped out by a virus
Create a boot disk - sometimes this is the only way you can restart windows after a virus attack
Disable Email Scripting - scripts can contain viruses or do malicious things to your computer
Keep program patches up to date - patches contain fixes for software problems that viruses may seek out
Keep a copy on disk or CD of your desktop and important directories- It is nice to know what you had on there so if you have to reinstall programs you know which ones to install
Backup to an external Hard Drive which you can unplug from the computer after the backup.
Enable the Macro Virus Protection - Do this when you run ALL Microsoft applications.
For the extremely worried - don't use windows, use Linux or use an obsolete machine like Amiga, but don't expect to find the same software.

The Ethan virus was a Word 97 virus that killed off other competing viruses. This was the first virus to eliminate the competition before doing its dirty work.

Wireless systems are just as vulnerable to a virus as is your PC. Even the cell phones are a target. Will viruses ever be completely wiped out? I think not. As long as human nature remains the same so will the virus threat.


Article, Photo and drawing Republication:

Permission is granted to copy this article, photos and drawings and post them if no changes are made to the article, photos and drawings and the following notice is placed under the article, photos and drawings:
"Courtesy of Truthfacts.net. The contents hereof are Copyrighted©2019 by Truth Facts and its licensors. All Rights Are Reserved." The Truthfacts.net link must be kept live and unaltered if posted anywhere on the internet and remain unaltered if placed on a print page.


THIS ENTIRE SITE WITH ALL ITS CONTENTS, EXCEPT WHERE OTHERWISE STATED, IS COPYRIGHTED ©2019 BY TRUTH FACTS AND ITS LICENSORS. ALL RIGHTS RESERVED.