Articles Service - Marketing And Unique Articles - Online Directory - Quick Promotion - Free Contents


   

A Thorough Definition Of A Virus



[Valid RSS feed]  Category Rss Feed - http://www.look4articles.com/rss.php?rss=94
By : Jay Stamford    29 or more times read
Submitted 2010-09-27 11:32:57
In 1983, Fred Cohen began the idiom "computer virus", postulating a virus was "a program that could 'infect' other programs by changing them to embrace a perhaps developed copy of itself." Mr. Cohen extended his characterization a year later inside his 1984 document, "A Computer Virus", noting that "a virus can spread all the way through a computer operating system or network working with the authorizations of every user employing it to contaminate their applications. Every application that gets infected could also act as a virus and as a consequence the infection grows."
Using that description, we may view that viruses contaminate program files. Then again, this malicious software can also contaminate specified varieties of data files, particularly those kinds of sensitive data files that support executable content, for instance, files created within Microsoft Office programs that rely on macros. Compounding the classification obscurity, malware additionally exist that display a similar ability to infect data files that don't usually support executable content - for illustration, Adobe PDF files, generally used for file sharing, and .JPG picture files. In spite of this, in both cases, the respective malware has a dependence on an exterior executable and as a result neither malware could be considered more than a plain 'proof of concept'.
In some cases, the data files themselves may not be infectable, but could allow for the introduction of viral code. Specifically, vulnerabilities inside certain programs might allow data files to be manipulated in such a fashion that it will cause the host application to turn out to be unstable, after which damaging code might be released to the system. These examples are provided only to note that this malicious software no longer relegate themselves to simply infecting program files, as was the case whilst Mr. Cohen first coined the phrase. Therefore, to simplify and modernize, it could be safely acknowledged that a virus infects some files, even if program or data.
In contrast to viruses, PC worms are harmful packages that copy themselves from computer system to computer system, rather than targetting legitimate files. For illustration, a mass-mailing email worm is a worm that sends copies of itself by the use of electronic mail. A internet network worm makes copies of itself throughout a internet network, an Online worm sends copies of itself through susceptible computer systems on the Internet, and so on.
Trojans, an additional type of malware, are commonly settled upon as doing something other than the user expected, with that "something" defined as dangerous. Most typically, trojans are associated with remote access packages that execute unlawful operations such as password-stealing or which allow compromised equipment to be used for targeted denial of service attacks. One of these more basic styles of a denial of service (DoS) attack includes flooding a target system with so much data, traffic, and sometimes commands that it could no longer perform its primary functions. When multiple machines are gathered all together to launch such an assault, it is known as a distributed denial of service attack, or DDoS.
While purists depict a definite dissimilarity between viruses, worms, and Trojans, others dispute that it is just a subject of semantics and give the virus moniker to all of the viruses, worms, and Trojans. To please both parties, the term malware, a.k.a. malicious software, has been coined to jointly describe viruses, worms trojans and all other varieties of malicious code.
Malware could possibly be defined as any type of program, file, or code that performs harmful actions on the target operating system without the user's express consent. This is in contrast to Sneakyware, which could easiest be described as any program, file, or code that the user agrees to operate or install without realizing the full implications of that preference. One of the best illustrations of Spyware and adware has been Friendly Greetings, a greeting-card hoax that exploited users' keenness to say Yes without understanding the licensing agreement. By doing so, they were blindly approving to enable the same electronic mail to be sent to all contacts listed inside their address book.

Author Resource:

visit our website where you can buy antivirus software and also find out about the best antispyware software available

Related Articles


HTML Ready Article. Click on the "Copy" button to copy into your clipboard.




Firefox users please select/copy/paste as usual


New Members
select
Sign up
select
Learn more
ASK It!
ASK It!

 
Directory Menu
Home
Login to Directory
Submit Articles
Submission Guidelines
Top Articles
Link Directory
About Us
Articles Directory Advertisement
Articles Directory Advertisement Media Kit
Contact Us
Privacy Policy
RSS Feeds


Categories

Accessories
Advice
Aging
Arts
Arts and Crafts
Automotive
Break-up
Business
Business Management
Cancer Survival
Career
Cars and Trucks
CGI
Cheating
Coding Sites
Computers
Computers and Technology
Cooking
Crafts
Culture
Current Affairs
Databases
Death
Education
Entertainment
Etiquette
Family Concerns
Film
Finances
Food and Drinks
Gardening
Healthy Living
Holidays
Home
Home Management
Internet
Jobs
Leadership
Legal
Medical
Medical Business
Medicines and Remedies
Men Only
Motorcyles
Opinions
Our Pets
Outdoors
Parenting
Pets
Recreation
Relationships
Religion
Self Help
Self Improvement
Society
Sports
Staying Fit
Technology
Travel
Web Design
Weddings
Wellness, Fitness and Di
Women Only
Womens Interest
World Affairs
Writing
 
Actions
Print This Article
Add To Favorites
[Valid RSS feed]

Copyright LOOK 4 ARTICLES FREE DIRECTORY - 2005-2012 - Powered By: HYIP