All About Computer Viruses

Written By:
Kara Glover

Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.

You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?

Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.

In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.

In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.

A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.

When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.

This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)

These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.

Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.

For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.

But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking at the site, the virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.

During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.

Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.

Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves.

Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus in the email might just load onto your computer.

So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)

On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files.

Worms sit in your working memory, or RAM, Nachenberg said.

OK, so we’ve talked about how the viruses get into a computer. How do they cause so much damage once they’re there?

Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to the example of the virus that initially infects your Microsoft Word program.

Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect.

This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.

Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said.

There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.

The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.

For these other intentions, we first need to explain the “backdoor” concept.

The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.

Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.

Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate.

Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.

OK, so the virus writers now control these computers. What will they use them for?

One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.

That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don’t want that.

Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.

Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.

Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know!

©2004 by Kara Glover

Feel Free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know where it appeared: kara333@earthlink.net

Kara Glover is a Computer Tutor and Troubleshooter. You can find her articles and tutorials on topics such as Microsoft Word®, Excel®, and PowerPoint® on her website: http://www.karathecomputertutor.com

kara333@earthlink.net

0 komentar:

Posting Komentar

Please write your comments here.Thanks.

Kategori

055CXPRO3 100Hz 1024x768 1080ip 1080p 10MP 10xOptical 121megapixel 121Megapixels 121MP 12Channel 12Ounce 141MP 165LBS 18Volt 19YearOlds 23Inch 240ml 25quot 2746 27Inch 2Pack 30Inch 3255 3265 3265Inch 32Inch 37Inch 37LV3500 3Inch 412Inch 46G310U 46Inch 46Inches 46LA45RQ 46PFL5706F7 46quot 46SL412U 46SL417U 47Inch 5460Inch 55Inch 58Inch 5Piece 60Watt 6by9Inch 732YB482K 800x600 812Inch 998864 accept Accessory Add-ons Mozilla Adsense Advertising Advice Affect Affordable ALAMPLB Alexa American Amplifier Android Annies Antenna Anti Virus Antivirus Antivirus Update Aperture Appetite APTMM2B Aquapac Articulating ATHM50 Attic AudioTechnica Automatic Available awning Backlink Backpack Backrest Bamboo Basics Bathroom Batteries Battery Battle BC12062 BDPS570 Bedding Bedroom Bedrooms Beechwood Before Beginners Benefits Berita Berita Terbaru Better Between Bicycle Binoculars Birthday Bisnis Internet Black Blackberry Blanket Blog Blossom Blue BlueSilver BluRay BoltOn Bose Boyfriend Bracket Brackets Brand BRAVIA Breakfast Brightess Bringing Brother BRPK3AN Bubble Building Bundle Burning Butter Buyers Buying Cabinet Cabinets Camcorders Camera Cameras Capacity Cara Bisnis Online Cara Recovery Data Cara Self Test Printer Cara Service Elektronik Cara Service Harddisk Cara Service Jaringan Cara Service Komputer Cara Service Laptop Cara Service Monitor Cara Service Ponsel Cara Service Printer Cara Service TV Cara Service UPS Carbide Carbon Carved Castings Castle Ceiling Celebrate Celtic Chairs Changeable Changing Charger Charlie Chatbox Cheapest Cheetah Cherry Chocolate Choose Choosing Chopsticks Christmas Cinderblock CINNAMON Cleaning Closer Coaxial Coffee Collapsible Collection College Color Column Combination Comforter Compact Companies Company Compare Compared Comparing Compatible Computer Concept Concrete Consider Consumer Contemporary Control Convertible Cooker Cooler Coolpix Cordless Corner Cotton cpu Crafting Creating Creative Crochet Crocheter Css Cubbies Cutting CX3800 CX3810 CX4200 CX4300 CX4600 CX4800 CX5000C CX7400 CX7800 Cybershot Danica Dawson DC91802 Decorate Decorating Definition Delight Deluxe Design Designer Development Device DEWALT Dietary Difference Different Digital Digital Camera Canon Digital Camera Canon Powershot Digital Camera Fujifilm Digital Camera Lens Digital Camera Nikon Digital Camera Panasonic Digital SLR Camera Discover Display Displays Distressed Distribution DMCLX5 DMCS1 DMCS3 DMCTS2 DMCTS3 DMCZS5 DMCZS9 Dofollow Dollars Domain Dreams Drilling Drills Driver Drivers Drives DSCH70 DSCT10 DSCT90 DSCW310BLDB Dumbbell Dymatize E-book Gratis E370VA E470VLE EA8080 Earthquake EasyShare Ebook ECES80 ECST65 Edition Effective Egyptian ELPLP49 Emoticons Entertainment Ericsson Espresseria Espresso Essentials Ethernet Everyone Everything Excellent Exchange EXFH20 Exilim Experience Explained Extended Extremely EXZ75 Facebook Family Fantastic Fashionable Fashions Faucet Features Fermented Fibromyalgia Finding FinePix Finish Firmness Follow Format Formula Foundation foursquare Freaks Free Software Freeware Fujifilm Function Furniture Future Game Gratis Keren Gaming Generation Getting Girlfriend Glasses Goggles Google Adsense Google Friend Connect Google Translate Google+ GoPro Camera Grey Grinder Hacking Halloween Handheld Handlebar Handset Headboard Headphones Headset heello HighPerformance Hitachi Hollywood Homemade Homework Housing HTML Husks Ilmu Komputer Images Imageshack Importance Important Includes Infant Info Aksessoris Komputer Info Software Information Integrated Intelligent Interface Interlock International Internet Networking Internet Business iPhone Istilah-Istilah Komputer - TI Jacquard KDL46BX420 KDL46EX403U KDL46EX500 KDL46NX810 KDL46S5100 Kegerator Kidkraft Kikkerland Kitchen Ladies Lain-lain Laptops latex LBOAS LC46D78UN LC46LE830U LCDDLP LCDDVD LCDNotebook Leather LEDLCD Lenovo Lensbaby Lenses LHB976 Lightning Lights Limited Linux Lipper Literature Lithium LithiumIon Little LN32B360 LN32D450 LN46A650 LN46B550 LN46B650 LN46B650T LN46C530 LN46C630 LN46C750 LN46D503 LN46D550 LN46D630 LNS4695D Lumens M1924A Magnesium Magnetic Maintenance Management Manfrotto Mansion Marketplace Matte Mattress mattresses Measurements MegaPixel Megapixels memory Menu Horizontal Menu Vertical MF607B MFC8670 Microwave MinoHD Minolta Mobile Model Models Modern Modulator Module Monitor Monitors Motion Mountable Mounting Mounts Movies Moving MP248B MPEG124 MultiPurpose Multiroom MultiSpeaker Muscle Muscles MustHave MX1260 Natural Nautical Newborn Nintendo Nobodys NonFerrous Notebook Novice NSX46GT1 Nursery Nutrition Nutritional Olympus Opened Optical Optimum Optimus Options Optoma Organic Original Ottoman Ottomans Outing Outstanding Overhead Pagerank Painting Pair Panasonic Panduan Service Monitor I Panduan Service Monitor II Pastures pc Personally Philips Phones Photographers Photographs Photography Picking Pictures Pieces Pillows Pink Pinpoint Pixels Plasma Plastic Platinum Player PlaySport PlayStation Pleasure Pocket Polaroid Popular Possible Posters Pounds Powder Powered Powerful PowerShot PreCharged Preparations Presentations Pressure Preview Princess Principle Printer Printers Prints Processor Product Product Review Products Professional Profile Projector Projectors Protector Protein Psyllium Public Pumpkin Purchase Purple Quality Quattron Quickly Quilted Rayovac Reader Really Reasons Rectangle RedCyan Reduction Reference Refresh Release Remote Replace Replacement Reports Research Resetter Canon Resetter Epson Resetter HP Resolution Results Reticle Review Reviews Riding Riflescope Rimfire RoomWithAView RoundAndRound RSS FEED RTB1100 RuggedWaterproof Safety Sakura Samsung Satisfactory Screen Screens Scrutiny SD780IS SDSDHCMMC Seating Seatpost Secrets Section Seniors Sensational Sensor SEO Series Serious Service Elektronik Service Komputer Laptop Service Printer Canon Service Printer Epson Service Printer HP Service Printer Laser Jet Sharpener Sheets Shelved Shelves Shelving Should Silicone Silver Sitemap Slender Software Gratis Pilihan Soldering Solutions Sooner Sourcing Spacesaver SPDIF Speakers Speaking Sports Squeeze SS1000 SSeries Stabilized Standard Standing Stands Staying Steady Stools Storage Streaming Strict Stripe Stripes Students Studio Stylish Subwoofer Suggestions Summer Suncast Supplements Suppress Surround Susan Swivel Swiveling SX10IS SX130IS SX20IS SX210IS SX230HS System T90dvfdblack Tables Tablet TBS421601 TCP46S30 TechFuel Technology Teens Television Televisions Templates Terminology Theater Themed Therapy Think Thinkpad Timelines Tip Trik Internet Tip Trik Windows Tipped Tips and Tricks Tips Blogger-Blogspot Tips Blogging Tips Blogspot Tips dan Trik Tips HTML dan JavaScript Tips Keamanan Komputer Tips PHP Tips Visual Basic Tips Windows Vista Tips Windows XP Tips-Tutorial Photoshop Toddler Toilet Toppers TopSelling Torpedo Toshiba Touchscreen Transcend Transmitter Travel TraysTables Treatment Tripod troubleshouting TS8GSDHC6E Turtle Tutorial Blogspot Tutorial Wordpress TVProtectorTM TwinFull Twitter Twitter Stuff tx1000 Ukur Komponen Elektronika UltraHD UM720S UN46B6000 UN46D6000 UN46D6400 UN55B8000 Understanding Underwater Universal V13H010L49 VariAngle Vaulted Vibration Video VideoSecu Viewing Vision Vitamin WAH1111BA0850 Wallet Walls Warta Terkini Waterproof Wave Website Weight Weller WellOrganized Western Whats White Wholesale WideAngle Widgets Windows Windows Tips Winsome Wireless Within Without Wooden Working WPS18MP X500BK ZoomNikkor