Wednesday, December 25, 2019

The Evolution of the Computer Virus - 1800 Words

The Evolution of the Computer Virus Introduction In simple terms a virus can be defined as software, which is unwanted and executes arbitrary code on systems. It acts as a small software program, which has the capability of exploiting other software programs in order to piggyback[1]. The terms viruses and malwares are used interchangeably, however, in technical terms, the viruses are a subset of malware and so are trojans, worms and rootkits. The name for the â€Å"Computer Virus† has actually derived from its biological counterpart because of their proximity in properties. Similar to the functioning of biological viruses, a computer virus must use another program to exploit some other program in order to start functioning. Hence, this†¦show more content†¦Ã¢â‚¬ËœThe root of virus evolution can be drawn back to 1949 when the scientist John von Neumann introduced the concept of self-replicating programs. The design suggested by Von Neumann for the self-producing programs is said to be the first computer virus. The predecessors of the current form of viruses date back to the 60s.It was then that a game called â€Å"Core Wars† was developed which had the capability of regenerating every time it was run. This game could also the exhaust the memory of the computer of other players. Similarly, another application named Reeper was developed by the founders of â€Å"Core wars†, which could delete the copies made as a result of running of â€Å"Core Wars†. This turned out to be one of the first antivirus applications. During the same time, another malicious code named â€Å"Brain† was created in 1966, which made the contents of the disks inaccessible by infecting the boot sectors of disks. The main target of this malicious program was MS-DOS which itself was relatively new at that time. The same year, another application named â€Å"PC-Write† was developed which served as the first Trojan. During the development phase of viruses it was soon realized that infecting the files could increase the damages caused to the computer systems. Hence, 1987 saw the appearance of â€Å"Suriv02†, a virus infecting COM files and leading to development of other viruses, like Viernes 13Show MoreRelatedComputer Attacks And Its Impact On The Security1466 Words   |  6 PagesIntroduction With the rising evolution of businesses, the evolution of business and institution data security has also evolved exceptionally. Various data security methods have been devised to ensure that vulnerability is mitigated but at the same time cyber criminals such as hackers have also evolved their data hacking methods as they look for the least weaknesses in a company and exploit it. The essay looks into various trends that have emerged in ensuring that data is safe by institution, theRead MoreMac vs. PC Essay1227 Words   |  5 PagesAbstract For many years there have been a small group of Mac users who continue to claim that the hardware and software platforms they have been using is superior to the PC Intel based platforms. America was not buying into that claim and 90% of computers used are Intel based. (Lai, E. (2007) Vista, Mac Use Both Increase. Retrieved January 9, 2008, from PCWorld Web site http://www.pcworld.com/article/id,140422-page,1/article.html). Recently, Mac switched its central processing unit (CPU) to IntelRead MoreAnnotated Bibliography On The Internet1366 Words   |  6 PagesProtocol 5 URL – Uniform Resource Locator 5 Virus 6 Trojan Horse 7 Worm 7 Differences between Computer Viruses 8 Bibliography 9 â€Æ' THE INTERNET Definition Of The Internet There were so many definition for the internet but the one that stand out most to me and gave me a clear understanding of the definition was form the (Collins English Dicitionary- Complete Unabridged) - â€Å"the internet- the single worldwide computer network that interconnects other computer networks, on which end user services, suchRead MoreSecurity in the Computer World1132 Words   |  5 Pageswithout permission. The same thing applies in the computer world, with the only difference being that its virtual. There are closed networks and open networks. The closed networks are available for a person who belongs to that entity. On the other hand, open networks are available for the rest of the people. Previously, networks were designed as closed for a set of people and sites which do not connect to other people. With the advent of personal computers, LANs, and the wide-open world of the InternetRead MoreInternet Crimes And The Internet1719 Words   |  7 Pagesfifteen years that it has increased the use of computers in our daily lives and in the business sector. To keep pace with the rapid increase in technology, industries such as banking, health, education etc. are very dependent on Internet for all its activities. However, what is Internet? Internet is the largest wide area network (WAN) that connects millions of computers worldwide and it is easily accessible at any corner of the world. Since the evolution of the Internet almost 20 years back, it hasRead MoreA Piece Of Software As Malicious Software Or Malware?1286 Words   |  6 Pagesattack in which started on 2015 July 28, hackers used Yahoo ad network to spread malicious code to visitors computer. A windows computer visited the site will automatically download the malware code which hunted down the out-of-date version of Adobe Flash. Certain vulnerabilities in the Flash allowed the malicious code to take control of the system. The malware would either hold the computer for a ransom until the hacker is paid or direct the machine towards sites that paid the adversaries for theRead MoreHuman Genetic Engineering : Genetically Modified Foods1352 Words   |  6 PagesThe world is a magnificent place. Full of plants, animals, humans, bacteria, oh and genetically modified life. Yes genetically modified life is the next step to evolution and its coming without its safety harness. Because of today’s vast growing industry there’s no time to test subjects for long periods so humans have come up with a new idea†¦ let man-kind serve as the guinea pig. Human genetic engineering has been categorized in three basic endangerments, that being its transhumanist ideas, animal-humanRead MoreCyber Crimes, Moral And Ethical Implication1664 Words   |  7 PagesCyber Crimes, Moral and Ethical Implication Introduction The internet’s rapid growth and computer technology has helped people around the world over the past few years. This evolution has also enabled new forms of crime-dubbed cyber-crime. This phenomenon has greatly evoked feelings such as admiration and fear in people mind. Cyber-crime is defined as crimes committed on internet, with computers as the tool, Agathise E Joseph, June 28th 2006. It is not an â€Å"armed robbery†, not a murder but a practiceRead MoreMalware And Its Effects On Our Computer1882 Words   |  8 Pageseven followed the instructions only to learn that we’ve helped a malware program run on our computer. Malware, also known as malicious software, has a deep history behind it. By definition, malware is a code or a software that is designed to damage, disrupt, steal, or inflict malice in some form or another on computer data, personal files, hosts, or networks. It poses a major threat to home and business computers worldwide and there aren’t many means to stop it. Malware comes in a variety of forms, andRead MoreAjdar Foral. Paul Saghbini. English 102. 13 March 2017-.897 Words   |  4 PagesAjdar Foral Paul Saghbini English 102 13 March 2017- Toshiba and Apple laptops The evolution of technology was related to the evolution of mankind’s intelligence. Laptop is an essential part of this technology and laptops witnessed a remarkable evolution. Apple has announced a brand new design for its MacBook Pro family of devices, coming in 13 and 15-inch models on 29 October. Toshiba satellite (L75-C7234) and Apple MacBook are the best laptops nowadays, but to buy a laptop it depends on the customer

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.