Valley of the Sun Casual Club
Welcome to VOTSCC . Please enjoy the many features . You may login at anytime to be part of our community .
Valley of the Sun Casual Club
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Log in

I forgot my password

March 2024
MonTueWedThuFriSatSun
    123
45678910
11121314151617
18192021222324
25262728293031

Calendar Calendar

Statistics
We have 474 registered users
The newest registered user is bitaacademy

Our users have posted a total of 43669 messages in 6438 subjects
71 WGT TUTORIALS & 32 YOUNG46 TUTORIALS
CLICK HERE TO SEE OVER 100 YOUTUBE VIDEO TUTORIALS . FROM WGTers , WGT & YOUNG46
FORUM UPDATE
TO THE MANY WELCOME GUESTS . THIS FORUM IS NO LONGER A COUNTRY CLUB WEBSITE FOR A WGT COUNTRY CLUB . PLEASE FEEL FREE TO READ THE FORUMS.
THERE ARE MANY TOPICS OF INTEREST . OR NOT . THIS WEBSITE IS AN INFORMATION AND ENTERTAINMENT WEBSITE ONLY .
MUCH OF THE CONTENT IS ARCHIVES OF PURPOSES PAST .
THERE ARE SOME MORE CURRENT TOPICS .
REGISTRATION IS NOT NECESSARY TO READ THROUGHOUT .
REGISTRATION IS EASY AND FREE . THIS IS AN AD FREE WEBSITE . NOTHING IS EVER REQUESTED FROM REGISTERED MEMBERS .
REGISTRATION ENABLES COMMENTING ON TOPICS . POSTING NEW TOPICS . FULL ACCESS TO THE WEBSITE IMAGE HOST . WHICH IS A VERY COMPLETE AND CONVENIENT TOOL .
PLEASE ENJOY .

Bilko’s Putting Calc
Here is a link to Bilko's Putting Calc and Wind Calc
Just download and install
TIER & AVERAGE REQUIREMENTS
BASIC LEVEL AND AVERAGE REQUIREMENTS , AND SATURATION

WHILE YOUR HERE
WHILE YOUR HERE :
CHECK OUT THE INCREDIBLE PHOTOGRAPHY IN
MY SERIES

THIS USED TO BE THE HOME OF OUR WORLD CLOCK . WHICH CAN NOW BE FOUND IN ITS OWN FORUM ON THE MAIN PAGE ..
THERE ARE MORE WORLD CLOCKS INSIDE HERE .

WORLD CLOCK

FB Like

Understanding Viruses and Malicious Code, Part 1 of 2

Go down

Understanding Viruses and Malicious Code, Part 1 of 2 Empty Understanding Viruses and Malicious Code, Part 1 of 2

Post by Paul Thu 21 Jul 2016, 6:48 am


  • Understanding Viruses and Malicious Code, Part 1 of 2 U2646733_20150613_081659.jpg?0.83.6023Understanding Viruses and Malicious Code, Part 1 of 2 USA.gif?0.83.6023azdewars

    362 Posts
    Thu, Mar 31 2016 12:18 AM

    What is a Virus?
    Simply put, viruses are small programs designed with (usually) malicious intent that attach themselves to other programs or files. They are capable of copying themselves throughout a computer or computers. They are called viruses because of the way they emulate their biological namesakes. A virus will infect healthy programs in a host computer and then spread to other healthy hosts, infecting them as well. Just as biological viruses range from being quite harmless to lethal, computer viruses may simply cause a harmless message to appear on your screen occasionally, or may render your system inoperable.
    Types of Viruses
    Viruses have been categorised into several different types according to the ways in which they infect a system, the part of the system they affect or their behaviours.
    File Infector Viruses
    File infector viruses are those that infect other files or programs on your system. They operate in a number of ways. Once the original 'host' program is run, the virus can stay resident or 'live' inside your systems memory (RAM) and infect programs as they are opened, or they can lay dormant inside another program. Each time that program is run, the virus will infect another program or file.
    A second, more complex file infector is one that doesn't alter the program itself, but alters the route a computer takes to open a file. In this way, the virus is executed first, and then the original program is opened. If a program or file that is infected with a file infector virus is passed from one computer to another, over a network or via floppy disk for example, the virus will begin infecting the 'clean' computer as soon as the file or program is opened.
    Boot Sector Viruses
    Whereas file infector viruses infect programs on a computer's hard drive, boot sector viruses can infect hard drives and removable disks, such as floppy disks. The boot sector is an area at the beginning of a hard drive or other disk where information about the drive or disk structure is stored. Symptoms of a boot sector virus may be a computer that is unbootable or gives error messages upon booting. Frustratingly, boot sector viruses may be present with no noticeable problems.
    One thing should be noted about floppy disks. It does not matter whether the floppy disk is a 'bootable' disk or not, if the disk is infected with a boot sector virus and you inadvertently leave the disk in the drive when you reboot the computer, the virus can still be executed. Ways of preventing this will be discussed in part two of this series.
    Macro Viruses
    Macro viruses are by far the most common type of malicious code found today. This is due to the popularity of software such as Microsoft Office and others such as Corel Draw, which use the macro programming languages extensively in the products.
    Macro viruses use an application's own macro programming language to distribute themselves. Macro viruses do not infect programs; they infect documents. Macro viruses typically arrive in an infected document, a price list written with MS Word for example. When the file is opened, the virus infects the base template on the victim computer, in this case Normal.dot. Normal.dot is the 'framework' that Word documents are created on. Once this template is infected, every document that is opened from then on will be infected as well, making all documents created or opened in Word a carrier of the macro virus. Macro viruses have been written for most Microsoft Office applications, including Excel, Access, PowerPoint and Word. They can also be found in Lotus AmiPro and Corel products to name a few.
    One more warning about macro viruses is that they are not platform specific. They can be found and spread through Macintosh, DEC Alpha, Microsoft NT and Microsoft Windows. In other words, just because you received a Microsoft Word file from a colleague using a Macintosh, doesn't mean you will not be infected by a macro virus embedded in that document.
    Worms
    A worm is a piece of code that can make fully functional copies of itself and travel through a computer network and/or across the Internet through a number of means. A worm does not attach themselves to other programs like traditional viruses, but creates copies of itself, which in turn create even more copies. The computer 'worm' is so-called because of the way in which 'rogue' computer code was originally detected. Printouts of computer memory locations would show random 'wormhole' patterns, much like that of the patterns on worm-eaten wood. The term eventually became shortened and used to describe viruses that could 'worm' or propagate across networks and the Internet, leaving copies of themselves as they travelled.
    Worms are prolific due to the fact that most are created using simple scripting languages that can be created with a text editor and become fully functional 'programs' under the right conditions. For example, if you were to obtain a copy of the 'I Love You' worm and changed the files extension from vbs to txt, you could safely open the file in Notepad and view the structure of the worm. This makes the vbs script worm extremely popular among the'script kiddy' fraternity, as it takes no (or very little) programming knowledge to modify an existing worm and release it into the wild (when a virus is circulating in the computing community or throughout the Internet, it is said to be 'in the wild'.)
    Trojan Horses
    Trojan horses are named after the wooden horse from Greek mythology in which Greek soldiers snuck into the city of Troy. Accordingly Trojans are malicious programs that sneak into a victim computer disguised as harmless software. Trojans may also be 'wrapped' inside another program so that when the original innocent program is installed, the Trojan program is installed as well.
    The most commonly described Trojan has a payload that will allow a user on another computer somewhere else in the world to gain full control and access to the files on your computer. In this way, they can be used to launchdenial of service attacks such as those that brought down Yahoo! and E-bay early in 2000.
    Trojan horses typically consist of two parts, the server and the client. The server is the part that is installed on the victim computer. When the server is installed, it allows the remote client to send commands to the computer as if the other person were sitting at the keyboard. The remote attacker can upload and download files, delete and create files on your system, play with the CD drive and generally control most aspects of the victim machine. Most of the approximately 550 known Trojans will send some sort of message to the attacker to let them know the server is running on the computer. Therefore, every time you connect to the Internet the person who sent the Trojan will know that the system is online and open for abuse.
    Legal Risks Associated with Trojan Infections
    In addition to the effects previously mentioned, a Trojan infection may affect you legally. If your network has been used surreptitiously by an attacker as a launching pad for a denial of service or other attack, you may be held responsible for any legal damages. Further, a Trojan on your system could be used to gain access to another network to steal sensitive information. If the intrusion is traced back to your computer, it may be difficult and expensive to defend yourself against prosecution.
    There is also the risk of losing your sensitive business information; contacts, blueprints, liabilities, etc to a competitor eager to gain an advantage over you. Imagine how easy it would be for a competitor to undercut you if they had access to all your customer accounts and contact details.
    Hoax Viruses
    There are hundreds of hoax viruses that spread like chain letters through e-mail. Although they cause little or no long-term damage, these hoaxes can be as disruptive as real malicious code. The standard response of most people when receiving a virus warning is to pass it on to all people in their organisation and most likely everyone else in their contacts lists. This sets up a chain reaction that not only wastes Internet bandwidth, but also wastes the valuable time of recipients.
    Further, a hoax can be damaging to a company's reputation. For example, NVision Design Inc produced three small games prior to Christmas of 1999. A virus hoax was spread worldwide that these games (Frog-a-pult, Elf-Bowl and Y2K game) contained a delayed action virus that would wipe out the users hard-drive. Not only did this cause damage to the reputation of the games' developer Vectrix, it also caused a deluge of e-mails in peoples' mail servers and inboxes.
    How Can a Virus, Worm or Trojan Infect Your System?
    Malicious code can be spread through just about any computer medium. They can arrive on an infected floppy disk and infect your system when a file on the disk is opened. Worse still, a floppy disk could be inadvertently left in the computer when it is shut down. Upon reboot, if the floppy is infected with a boot sector virus, the infection will be transmitted to your system.
    The most common methods employed to spread viruses and worms are either through e-mail as attachments or through IRC (Internet Relay Chat). Typically, in the case of e-mail, a message will arrive with an attachment, the user clicks on the message and the code is executed immediately. Viruses are capable of bringing down entire networks by clogging e-mail servers with copies of themselves. Some viruses will repeatedly extract addresses from e-mail 'address' books and send themselves to the recipients. Some contact lists can generate potentially thousands of messages, causing massive network bandwidth problems.
    Don't think that just because your new software program is in a shrink-wrapped box it is virus-free either. Viruses have been found on software disks distributed by major software companies, as well as on computer systems that have come fresh from the factory. In 1995, Microsoft inadvertently released a Compact Disc containing the 'Concept' macro virus and as late as last year, IBM shipped an undisclosed number of Aptiva computers infected with the CIH (Chernobyl) virus.
    Potential Damage
    Virus infection can have a variety of effects on an infected system. Some viruses may simply take up space on the computer hard drive until you receive 'low disk space' messages from the system. Others may pop-up messages on a particular date or change system icons. For example, the 4K virus will pop up a message on the screen, 'FRODO LIVES!' on the 22nd of September. The Tentacle2 virus will change your icons to that of a purple 'monster'.
    Other viruses are potentially much more damaging. The CIH, or Chernobyl virus will, if not detected and removed, overwrite files on your hard disk and destroy the BIOS information on your computer. Chernobyl spreads easily and hides in an infected system until the 26th of a particular month depending on which variety it is. The BIOS chip is the 'heart' of your computer. If the information contained in this chip is overwritten by CIH, the system will become unusable, meaning the chip will have to be replaced. However, on some systems, the chip cannot be removed, which means the entire main-board of the computer will have to be replaced, an expensive, time consuming process.
    Parting Thoughts
    ALWAYS create backup or Image file of HDD.  Run virus scan on ALL files. Infections have variable characteristics which may lay dormat until a particular file is opened or be reactionary to install .
     
    john

    Delete
    Edit
    Reply
    Send to Friend
    Report Abuse



  • Understanding Viruses and Malicious Code, Part 1 of 2 U4533210_20160309_152606.jpg?0.83.6023Understanding Viruses and Malicious Code, Part 1 of 2 USA.gif?0.83.6023JimQ916

    2,953 Posts
    Thu, Mar 31 2016 6:08 AM

    Thank you John...very, very informative. I run SuperAntiVirus, MalwareBytes, AVG and Windows Security Essentials on a regular basis....are these sufficient? thanks again...Jim

    Delete
    Edit
    Reply
    Send to Friend
    Report Abuse



  • Understanding Viruses and Malicious Code, Part 1 of 2 U2646733_20150613_081659.jpg?0.83.6023Understanding Viruses and Malicious Code, Part 1 of 2 USA.gif?0.83.6023azdewars

    362 Posts
    Thu, Mar 31 2016 7:57 PM

    Excellent selection of security applications. You got it covered 2 fold. Its smart to run two (2) anti-virus programs, for example,  as one (1) cant possibly cover everything but chosen wisely, the second one has it covered.
    You also added crucial defense, YOU.. people need to understand the need for their VIGILANCE with protecting their data.
    Well done Jim
    John



Paul



Please enjoy

_________________

May the SUN always be with you

home of

https://www.valleyofthesuncc.com/ an information and entertainment only website
Paul
Paul
Admin
Admin

Posts : 41059
Join date : 2013-05-06

https://www.valleyofthesuncc.com

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum