Saturday, May 18, 2019

Myths and Misconceptions about Viruses and Security Essay

Computer computer viruses, as they be commonly cognize today, are malicious malware design to destroy and distort the normal working of a computer. The first known line of reasoning of computer viruses is estimated to be in the 1960s deferred payment Nat14 l 1033 (Devotta, 2014). The virus was in form of a game called Core Wars, and would self-replicate every time it was run. The group of programmers who real it also made the first known anti-virus called Reeper. It was not until 1983, that iodine of these programmers announced the existence of Core Wars CITATION Ant l 1033 (AntivirusWorld, n.d.). In the kindred era, an influx of personal computers flooded the market and games became very popular. As a result, malicious viruses like fifth column horse were developed and innocent consumers downloaded them thinking that they were nice games only to feel the repercussions later. Since then, many viruses have been developed and continue to cause havoc to our computer experience.A computer virus is a malicious order that is written with instructions to replicate itself in a host computer and attaches itself to files and programs in the machine CITATION All l 1033 (AllAboutCookies, n.d.). Often, this happens without the consent of the user, and once the machine is booted or the infected program is launched, the virus attacks and damages data. In the case where an infected file is saved on a storage device, shipping of that file to another computer repeats the cycle and the virus re-infects the new host computer CITATION Sym10 l 1033 (Symantec, 2010). Viruses are designed to be spread via several media, where they piggyback on emails, programs, or network systems.The same(p) way myths and misconceptions arise after a deadly disease pandemic, the computer world is full of myths approximately viruses. Some of the most common unfounded myths include Mac users are virus proof, firewalls hinder out viruses, formatting and re-installing the operating system of an infected computer and then backing up ones data removes rid of viruses, using antivirus programs protects one fully from viruses, signs of error messages popping up on ones computer indicate that the computer is infected, corrupted files and blue screen displays on computers indicate a virus attack CITATION Rak11 l 1033 (Tembhurne, 2011). While virtually of these misconception hold water, they are not perfectly true all the time.A common scenario for internet users is the appearance of irritating pop-up messages, especially when browsing. While some of these messages are strategies for internet marketing by companies, and are indeed inevitable, it is possible for one to block pop-up messages- without get software. First and foremost, there are free downloadable pop-up blockers that are effective on general browser pop-up ads. Examples include, Google Toolbar, hayseed Companion Toolbar, Pop-up Stopper, PopUp Blocker, WorldIQ Toolbar and CleanMyPC, just to name but a few CITAT ION Kio15 l 1033 (Kioskea, 2015). Peer-to-peer file manduction programs are another source of disturbing pop-ups, especially once you install a program downloaded from these sites. To get rid of search, uninstall any unfamiliar programs from the Control Panel. Most browsers today also come with in-built software that block pop-ups, and can be adjusted to block the ads under the Settings tab. A good example is Internet venturer CITATION Uni04 l 1033 (Iowa, 2004). Using Windows XP Service Pack 2 is also another viable preference since the latest version includes a built-in Pop-up blocker CITATION Ram07 l 1033 (Srinivasan, 2007).ReferencesAllAboutCookies. (n.d.). Retrieved from All About Cookies.org http//www.allaboutcookies.org/ warranter/computer-viruses.htmlAntivirusWorld. (n.d.). History of Computer Viruses. Retrieved from http//www.antivirusworld.com/articles/history.phpDevotta, N. (2014, Septemner 4). A short History of Computer Viruses. Retrieved from COMODO Antivirus https//a ntivirus.comodo.com/blog/computer-safety/short-history-computer-viruses/Iowa, U. o. (2004, June). Pop-up blocking. Retrieved from Information Technology operate The University of Iowa https//helpdesk.its.uiowa.edu/articles/june2004/popupblocking.htmKioskea. (2015, March). How to get rid of Pop-Up ads. Retrieved from http//en.kioskea.net/faq/104-how-to-get-rid-of-pop-up-adsSrinivasan, R. (2007, October 27). How to block Pop-ups? Retrieved from Rameshs Site http//windowsxp.mvps.org/Popups.htmSymantec. (2010). pc tools. Retrieved from http//www.pctools.com/security-news/what-do-computer-viruses-do/Tembhurne, R. (2011, May 10). 15 Myths and Misconceptions about Viruses and protective cover Applications. Retrieved from http//rakesh.tembhurne.com/15-myths-and-misconceptions-about-viruses-and-security-applications/Source document

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.