Tuesday, April 9, 2019

Myths and Misconceptions about Viruses and Security Essay Example for Free

Myths and Misconceptions about Viruses and Security Essay reckoner viruses, as they ar commonly known today, are malicious malware design to destroy and distort the frequent working of a information processing system. The first known origin of computer viruses is estimated to be in the 1960s reference book Nat14 l 1033 (Devotta, 2014). The virus was in form of a game called eye Wars, and would self-replicate e genuinely time it was run. The conclave of programmers who developed it also made the first known anti-virus called Reeper. It was not until 1983, that one of these programmers announced the existence of Core Wars CITATION Ant l 1033 (AntivirusWorld, n. d.). In the same era, an influx of personal computers flooded the market and games became very popular. As a result, malicious viruses like Trojan horse were developed and innocent consumers downloaded them thinking that they were prim games only to feel the repercussions later. Since then, many viruses have been de veloped and continue to cause havoc to our computer experience.A computer virus is a malicious code that is written with instructions to replicate itself in a host computer and attaches itself to filing cabinets and programs in the auto CITATION All l 1033 (AllAboutCookies, n.d.). Often, this happens without the consent of the user, and once the machine is booted or the infected program is launched, the virus attacks and damages data. In the case where an infected file is saved on a storage device, transfer of that file to another computer repeats the cycle and the virus re-infects the new host computer CITATION Sym10 l 1033 (Symantec, 2010). Viruses are designed to be spread via several(prenominal) media, where they piggyback on emails, programs, or network systems.The same way myths and misconceptions arise after a bitter disease pandemic, the computer world is full of myths about viruses. Some of the most common unfounded myths take Mac users are virus proof, firewalls block o ff viruses, formatting and re-installing the operating system of an infected computer and then backing up ones data gets rid of viruses, using antivirus programs protects one in full from viruses, signs of error messages popping up on ones computer indicate that the computer is infected, pervert files and blue screen displays on computers indicate a virus attack CITATION Rak11 l 1033 (Tembhurne, 2011). darn some of these misconception hold water, they are not absolutely true all the time.A common scenario for earnings users is the appearance of irritating pop-up messages, oddly when browsing. While some of these messages are strategies for internet marketing by companies, and are indeed inevitable, it is possible for one to block pop-up messages- without purchasing software. First and foremost, there are free downloadable pop-up blockers that are effective on general browser pop-up ads. Examples include, Google Toolbar, Yahoo Companion Toolbar, Pop-up Stopper, PopUp Blocker, Wo rldIQ Toolbar and CleanMyPC, just to name but a few CITATION Kio15 l 1033 (Kioskea, 2015). Peer-to-peer file sharing programs are another source of disturbing pop-ups, especially once you install a program downloaded from these sites. To get rid of search, uninstall any unfamiliar programs from the Control Panel. virtually browsers today also come with in-built software that block pop-ups, and can be adjusted to block the ads nether the Settings tab. A good example is Internet Explorer CITATION Uni04 l 1033 (Iowa, 2004). Using Windows XP Service plurality 2 is also another viable option since the latest version includes a built-in Pop-up blocker CITATION Ram07 l 1033 (Srinivasan, 2007).ReferencesAllAboutCookies. (n.d.). Retrieved from All About Cookies.org http//www.allaboutcookies.org/security/computer-viruses.htmlAntivirusWorld. (n.d.). score of Computer Viruses. Retrieved from http//www.antivirusworld.com/articles/history.phpDevotta, N. (2014, Septemner 4). A short History of Computer Viruses. Retrieved from COMODO Antivirus https//antivirus.comodo.com/blog/computer-safety/short-history-computer-viruses/Iowa, U. o. (2004, June). Pop-up blocking. Retrieved from Information Technology Services The University of Iowa https//helpdesk.its.uiowa.edu/articles/june2004/popupblocking.htmKioskea. (2015, March). How to get rid of Pop-Up ads. Retrieved from http//en.kioskea.net/faq/104-how-to-get-rid-of-pop-up-adsSrinivasan, R. (2007, October 27). How to block Pop-ups? Retrieved from Rameshs Site http//windowsxp.mvps.org/Popups.htmSymantec. (2010). pc tools. Retrieved from http//www.pctools.com/security-news/what-do-computer-viruses-do/Tembhurne, R. (2011, May 10). 15 Myths and Misconceptions about Viruses and Security Applications. Retrieved from http//rakesh.tembhurne.com/15-myths-and-misconceptions-about-viruses-and-security-applications/Source document

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.