Truth And Lies About The Computer Virus

Free Articles

Essay, Research Paper

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Truth and Lies About the Computer Virus

Walk into any computing machine shop today and there will be at least twenty or

30 computing machine virus plans. From the expressions of it computing machine viruses have

gotten out of manus and so has the concern of halting it. The computing machine user

must cut through the media ballyhoo of apocoliptic viruses and shareware plans

and detect the existent facts.

Before we even start the journey of researching the computing machine virus we must

foremost extinguish all the & # 8220 ; fluff. & # 8221 ; The computing machine user needs to understand how

information about viruses reaches the populace. Person creates the virus and

so infects at least one computing machine. The virus clangs or ruins the septic

computing machine. A anti-virus company obtains a transcript of the virus and surveies it. The

anti-virus company makes an & # 8220 ; unbiased & # 8221 ; determination about the virus and so

unwrap their findings to the populace. The job with the current system is

that there are no cheques and balances. If the anti-virus company wants to do

viruses seem worse all they have to make is falsify the truth. There is no

organisation that certifies wheather or non a virus is existent. Even more

potentially harmful is that the anti-virus companies could compose viruses in

order to sell their plans. Software companies have and do falsify the truth

about viruses. & # 8220 ; Antivirus houses tend to number even the most undistinguished

fluctuations of viruses for advertisement intents. When the Marijuana virus foremost

appeared, for illustration, it contained the word & # 8220 ; legalise, & # 8221 ; but a reprobate later

modified it to read & # 8220 ; legalize. & # 8221 ; Any plan which detects the original virus can

observe the version with one missive changed & # 8212 ; but antivirus companies frequently

number them as & # 8220 ; two & # 8221 ; viruses. These vague distinctions rapidly add up. & # 8221 ;

hypertext transfer protocol: //www.kumite.com/myths/myth005.htm By the way the Marijuana virus is besides

called the & # 8220 ; Stoned & # 8221 ; virus there by doing it yet another on the list of viruses

that companies protect your computing machine against.

I went to the McAfee Anti-virus Web site looking for information on the

Marijuana virus but was unable to obtain that information. I was nevertheless able

to acquire a transcript of the top 10 viruses of their site. On specific virus called

Drug addict: & # 8220 ; Junkie is a multi-partite, memory occupant, coding virus. Drug addict

specifically marks.COM files, the DOS boot sector on floppy floppies and the

Master Boot Record ( MBR ) . When initial infection is in the signifier of a file

infecting virus, Junkie infects the MBR or floppy boot sector, disables VSafe

( an anti-virus terminate-and-stay-resident plan ( TSR ) , which is included with

MS-DOS 6.X ) and loads itself at Side 0, Cylinder 0, Sectors 4 and 5. The virus

does non go memory occupant, or infect files at this clip. Subsequently when the

system is booted from the system difficult disc, the Junkie virus becomes memory

occupant at the top of system memory below the 640K DOS boundary, traveling

interrupt 12 & # 8217 ; s returns. Once memory occupant, Junkie begins infecting.COM files

as they are executed, and corrupts.COM files. The Junkie virus infects

floppy boot sectors as they are accessed. The virus will compose a transcript of

itself to the last path of the floppy, and so change the boot sector to

point to this codification. On high denseness 5.25 inch floppies, the viral codification will be

located on Cylinder 79, Side 1, Sectors 8 and 9. & # 8221 ; Junkie & # 8217 ; s description is that

of a basic stealth/Trojan virus which have been in existance for 10 old ages. They

& gt ;

besides listed Anti-exe as one of the top 10 viruses but did non acknowlege the

fact that it has three assumed names. It & # 8217 ; s no admiration that the general populace is

confused about computing machine viruses!

I decided to look into the whole girl or diss-information issue a

small farther. I went to the Data Fellows Web site to what the distributers of

F-prot had to state about viruses. It is to no surprise that I found them seeking

to see package with the typical panic tactics: Quite late, we read in the

newspapers how CIA and NSA ( National Security Agency ) managed to interrupt into the

EU Commission & # 8217 ; s systems and entree confidential information about the GATT

dialogues. The stolen information was so exploited in the dialogues.

The EU Commission denies the allegation, but that is a common pattern in

affairs affecting information security breaches. At the beginning of June, the

intelligence in Great Britain told the populace about an incident where British and

American Bankss had paid 400 million lbs in ransom to maintain the felons who

had broken into their systems from publicising the systems & # 8217 ; weaknesses [ London

Timess, 3.6.1996 ] . The amounts involved are merely tremendous, particularly since all

these 1000000s of lbs bought nil more than silence. Harmonizing to London

Timess, the Bankss & # 8217 ; representatives said that the money had been paid because

& # 8220 ; promotion about such onslaughts could damage consumer assurance in the security

of their systems & # 8221 ; . Condemnable hackers are likely encouraged by the fact that,

in most instances, their victims are non at wholly eager to describe the incidents to the

constabulary. And that is non all ; presuming that the information reported by London

Timess is right, they may even acquire paid a & # 8220 ; fee & # 8221 ; for interrupting in? a computing machine is

broken into in Internet every 20 seconds? Whatever the truth about these

incidents may be, the fact remains that current information systems are rather

vulnerable to incursion from outside. As Internet becomes more popular and

spreads of all time wider, felons can interrupt into an increasing figure of systems

easy and without a existent hazard of being caught. & # 8221 ;

Then the following paragraph stated:

& # 8220 ; Even at their initial phases, Data Fellows Ltd & # 8217 ; s F-Secure merchandises run into

many of these demands. It is the end of our go oning merchandise development to

finally address all such information security needs. & # 8221 ; In other words nil

is safe unless you buy their merchandises.

Now that we have cleared the fume on viruses we know that there are

merely approximately 500 basic viruses. These viruses are tweaked, renamed, and re-

cycled.

So, what is a virus? First of wholly, we must be cognizant that there is no

universally accepted appellative pattern or find method for viruses. Therefore

all virus information is subjective and capable to reading and changeless

difference.

To specify a virus we must inquire an expert. Harmonizing to Fred Cohen a

computing machine virus is a computing machine plan that can infect other computing machine plans by

modifying them in such a manner as to include a ( perchance evolved ) transcript of itself.

This does non intend that a virus has to do harm because a virus may be

written to garner informations and obtain concealed files in your system.

Now that you are cognizant of the frauds and miss-information about viruses

you will be better equipped to cover with viral information. The following clip you

hear of a slayer virus merely retrieve what you have learned. You know that all

viruses have the same roots.

Post a Comment

Your email address will not be published. Required fields are marked *

*

x

Hi!
I'm Katy

Would you like to get such a paper? How about receiving a customized one?

Check it out