Hemis tasks tasks 4: score -5 unit 8: security and safety lesson 21. Computer threats. It security and safety. Task 1



Yüklə 381,5 Kb.
səhifə5/7
tarix02.06.2022
ölçüsü381,5 Kb.
#60438
1   2   3   4   5   6   7
Qahhorov Temurbek 630 -21

What Viruses Don't Do
Computer viruses don't infect files on write-protected disks and don't infect documents, except in the case of Word macro viruses, which infect only documents and templates written in Word 6.0 or higher. They don't infect compressed files either. However, applications within a compressed file could have been infected before they were compressed. Viruses also don't infect computer hardware, such as monitors or computer chips; they only infect software.
In addition, Macintosh viruses don't infect DOS-based computer software and vice versa. For example, the infamous Michelangelo virus does not infect Macintosh applications. Again, exceptions to this rule are the Word and Excel macro viruses, which infect spreadsheets, documents and templates, which can be opened by either Windows or Macintosh computers.
Finally, viruses don't necessarily let you know that they are there - even after they do something destructive.
Types of Computer Viruses
Nowadays number of viruses is about 55000. It increases constantly. New unknown types of viruses appear. To classify them becomes more and more difficult. In common they can be divided by three basic signs: a place of situating, used operation system and work algorithms. For example according these three classifications virus Chernobyl can be classified as file infector and resident Windows virus. Further it will be explained what it means.


B DEFINE ANTIVIRUS 
Antivirus software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such. Antivirus programs function to scan, detect and remove viruses from your computer. There are many versions and types of anti-virus programs that are on the market. However, the prime objective of any antivirus program is to protect computers and remove viruses once detected.
Most antivirus programs incorporate both automated and manual filtering abilities. The instant scanning option may check files - downloaded from the Internet, discs that are embedded into the PC, and files that are made by software installers. The programmed scanning process may likewise check the entire hard drive on a day-to-day basis. The manual scanning system enables you to check single documents or even to scan the complete network at whatever point you feel it is necessary.
Since new infections are always being made by PC programmers, antivirus programs must keep an updated database of the most recent malware codes. This database incorporates a list of "malware definitions" that the antivirus software implements when filtering records. Since new infections evolve every day , it is essential to keep your product's infection database up and coming. Luckily, most antivirus programs naturally refresh the infection database all the time.
While antivirus software is basically intended to ensure complete protection for PCs against virus infections, numerous antivirus programs now secure against different sorts of malware for example, spyware, adware, and rootkits as well. Antivirus software may likewise include firewall features, which anticipate unapproved access to your PC. Utilities that incorporate both antivirus and firewall abilities are commonly called "Internet Security Suite".
While antivirus programs are accessible for Windows, Macintosh, and Unix platforms, most antivirus software is compatible with Windows operating system. This is on account of the fact that most infections are focused towards Windows PCs and subsequently virus protection is particularly imperative for Windows clients. If you are a Windows user, it is important to install a third party , feature-packed, robust antivirus program on your PC. Comodo Antivirus has been the best and compelling solution to outsmart even the zero-day and unknown threats with efficient features and technologies like default-deny protection, Host Intrusion Prevention, Auto sandboxing solutions and Containment technology.

Yüklə 381,5 Kb.

Dostları ilə paylaş:
1   2   3   4   5   6   7




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©www.azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin