.

Friday, February 22, 2019

Myths and Misconceptions about Viruses and Security Essay

information processing system computer viruses, as they ar commonly known today, are malicious malware design to end and distort the normal working of a estimator. The first known profligate of data processor viruses is estimated to be in the 1960s inverted comma Nat14 l 1033 (Devotta, 2014). The virus was in form of a game called Core Wars, and would self- recapitulate ein truth clock it was run. The group of programmers who demonstrable it also made the first known anti-virus called Reeper. It was not until 1983, that one of these programmers announced the existence of Core Wars CITATION Ant l 1033 (AntivirusWorld, n.d.). In the same era, an influx of personal calculators flooded the market and games became very popular. As a result, malicious viruses like Trojan horse were developed and innocent consumers downloaded them thinking that they were nice games only to feel the repercussions later. Since then, many viruses move over been developed and continue to cause havoc to our computer experience.A computer virus is a malicious code that is written with instructions to replicate itself in a host computer and attaches itself to institutionalises and programs in the machine CITATION All l 1033 (All roughlyCookies, n.d.). Often, this happens without the consent of the user, and once the machine is booted or the infect program is launched, the virus attacks and damages data. In the case where an infected file is saved on a storage device, transfer of that file to another computer repeats the cycle and the virus re-infects the new host computer CITATION Sym10 l 1033 (Symantec, 2010). Viruses are designed to be spread via several(prenominal) media, where they piggyback on emails, programs, or network ashess.The same way myths and misconceptions go up after a deadly disease pandemic, the computer world is rise of myths about viruses. Some of the most common unfounded myths include mac users are virus proof, firewalls englut off viruses, formatting and re- demonstrateing the operating system of an infected computer and then backing up ones data gets rid of viruses, using antivirus programs protects one fully from viruses, signs of error messages pa up on ones computer indicate that the computer is infected, corrupted files and blue screen displays on computers indicate a virus attack CITATION Rak11 l 1033 (Tembhurne, 2011). While some of these misconception hold water, they are not absolutely true all the time.A common scenario for internet users is the appearance of irritating pop-up messages, especially when browsing. While some of these messages are strategies for internet marketing by companies, and are indeed inevitable, it is possible for one to prevent pop-up messages- without purchasing software. First and foremost, there are free downloadable pop-up blockers that are legal on general browser pop-up ads. Examples include, Google Toolbar, Yahoo Companion Toolbar, Pop-up Stopper, PopUp Blocker, WorldIQ Toolbar and CleanMyPC, just to put forward but a few CITATION Kio15 l 1033 (Kioskea, 2015). Peer-to-peer file manduction programs are another source of disturbing pop-ups, especially once you install a program downloaded from these sites. To get rid of search, uninstall any unfamiliar programs from the visit Panel. Most browsers today also come with in-built software that block pop-ups, and contribute be adjusted to block the ads under the Settings tab. A good archetype is Internet Explorer CITATION Uni04 l 1033 (Iowa, 2004). Using Windows XP Service coterie 2 is also another viable option since the latest variate includes a built-in Pop-up blocker CITATION Ram07 l 1033 (Srinivasan, 2007).ReferencesAllAboutCookies. (n.d.). Retrieved from All About Cookies.org http//www.allaboutcookies.org/security/computer-viruses.htmlAntivirusWorld. (n.d.). History of Computer Viruses. Retrieved from http//www.antivirusworld.com/articles/history.phpDevotta, N. (2014, Septemner 4). A short History of Com puter Viruses. Retrieved from COMODO Antivirus https//antivirus.comodo.com/blog/computer-safety/short-history-computer-viruses/Iowa, U. o. (2004, June). Pop-up blocking. Retrieved from Information Technology Services The University of Iowa https//helpdesk.its.uiowa.edu/articles/june2004/popupblocking.htmKioskea. (2015, March). How to get rid of Pop-Up ads. Retrieved from http//en.kioskea.net/faq/104-how-to-get-rid-of-pop-up-adsSrinivasan, R. (2007, October 27). How to block Pop-ups? Retrieved from Rameshs Site http//windowsxp.mvps.org/Popups.htmSymantec. (2010). pc tools. Retrieved from http//www.pctools.com/security-news/what-do-computer-viruses-do/Tembhurne, R. (2011, May 10). 15 Myths and Misconceptions about Viruses and bail Applications. Retrieved from http//rakesh.tembhurne.com/15-myths-and-misconceptions-about-viruses-and-security-applications/Source document

No comments:

Post a Comment