![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
All About Computer Viruses
Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open. You might have a virus. Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway? Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don't bother to seek your permission at all! Very invasive. In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy's consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc. In this article, though, we're not talking about the good guys, or the agents. We'll be talking about the bad guys, the viruses. A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program. When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave. This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp. Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they're not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.) These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks. As far as web browsers are concerned, Microsoft's Internet Explorer takes most of the heat for spreading viruses because it's used by more people for web surfing than any other browser. Nevertheless, "Any web browser potentially has vulnerabilities," Nachenberg said. For instance, let's say you go to a website in IE you have every reason to think is safe, Nachenberg said. But unfortunately it isn't. It has virus code hidden in its background that IE isn't protecting you from. While you're looking at the site, the virus is downloaded onto your computer, he said. That's one way of catching a nasty virus. During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they're downloading that latest Justin Timberlake song, when in reality they're downloading a virus straight into their computer. It's easy for a virus writer to put a download with a virus on one of these sites because everyone's sharing with everyone else anyway. Here's one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk. Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves. Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it's "loading"? Well, once everything is "loaded," a virus in the email might just load onto your computer. So if I were you, I'd click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.) On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files. Worms sit in your working memory, or RAM, Nachenberg said. OK, so we've talked about how the viruses get into a computer. How do they cause so much damage once they're there? Let's say you've caught a classic virus, one that replicates and attacks various files on your computer. Let's go back to the example of the virus that initially infects your Microsoft Word program. Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect. This process of infecting targets and looking for new ones could eventually use up your computer's ability to function, he said. Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer's hard drive, Nachenberg said. There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment - the reason virus writers would want to waste their time creating viruses in the first place. The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind. For these other intentions, we first need to explain the "backdoor" concept. The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings. Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said. Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren't considered viruses because they don't replicate. Now back to the real viruses. Let's say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn't want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can't be traced. Hotmail email happens to be an example of one such place, Kuo said. OK, so the virus writers now control these computers. What will they use them for? One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said. That's right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don't want that. Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they're NOT from your internet service provider or your bank. They're from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers. Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said. Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know! ©2004 by Kara Glover Feel Free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know where it appeared: kara333@earthlink.net About The Author Kara Glover is a Computer Tutor and Troubleshooter. You can find her articles and tutorials on topics such as Microsoft Word®, Excel®, and PowerPoint® on her website: http://www.karathecomputertutor.com
MORE RESOURCES: Security alert: It’s time to update your iPhone — again KTLA Los Angeles A gun got past security, fair staff reviewing tapes after shooting KFOR Oklahoma City Austin Lauds Mozambique's Leadership on Regional Security > U.S Department of Defense Person arrested at Muhammad Ali International Airport after TSA security checkpoint breach WLKY Louisville Alabama State football suspends player indefinitely for striking security guard after loss Yahoo Sports Are We Really Helping? U.S. Security Assistance to Partner Nations ... Government Accountability Office PCI security is costing you more than you think Payments Dive Nuance notifying radiology patients after data security incident Radiology Business TSA showcases security checkpoint technologies in use at Antonio ... Transportation Security Administration Biden-Harris Administration Announces Final National Security ... US Department of Commerce Biden Administration Announces Additional Security Assistance for ... Department of Defense Pitfalls of relying on eBPF for security monitoring (and some solutions) Security Boulevard Zero Trust Authentication: 7 key principles of the new security concept Innovation News Network Port hires new security director Tacoma Weekly Overcoming Old Access Control Card Security Challenges ... Campus Safety Magazine Tim Roemer hired as Chief Security Officer at Global Market Innovators Security Magazine United States Hosts UNGA Side Event: Addressing the Urgent ... Department of State Secretary Antony J. Blinken At the Addressing the Urgent Security ... Department of State Amazon collaborates with Anthropic to advance generative AI Help Net Security Park Maitland School increases campus security following Communist Party connection allegations WFTV Orlando 'That should not have happened': How did a gun get past security at ... KFOR Oklahoma City Security Comes in Layers - Campus Safety Campus Safety Magazine Australia Says Internal Security Czar to Stand Aside During ... U.S. News & World Report Fact Sheet: The Biden-Harris Administration Takes New Actions to ... Homeland Security Operation Lone Star Bolsters Border Security To Stem Historic Influx Office of the Texas Governor The Rise of Republican National Security Prioritizers The American Conservative Petersburg schools to have additional security following social ... CBS 6 News Richmond WTVR Southeast NHS Trust sign three-year cyber security deal Medical Device Network DHS Homeland Security Investigations Announces Strategy to ... Homeland Security Security guard intervenes during ‘incident’ involving knife at Branford football game - WTNH.com Scattered Spider "bites" in Las Vegas Panda Security Statement by President Charles Michel at the UN Security Council ... Présidence française du Conseil de l'Union européenne 2022 GoFundMe nets nearly $10K for security for BLM activist Zyahna Bryant amid Dove boycott New York Post A New Beginning With Faith- Security Guard Gets Baptized At ... themadisonrecord.com Unveiling the Wireless Ring Scam: The Invisible Threat to Your ... Mid Florida Newspapers Diving Deep Into Key Input on the Access Control Market Security Sales & Integration Why We're Pulling Our Recommendation of Wyze Security Cameras The New York Times Early Edition: September 25, 2023 Just Security |
![]() |
![]() |
![]() |
RELATED ARTICLES
Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. Phishing - Its Signs and Your Options Phishing is the act of some individual sending an email to a user in an attempt to scam the user to release personal information. Is it easy to determine if it's a scam? Sometimes - but not always. Online Shoppers, Beware of a New Scam Beware of a New Scam Aimed at Bargain-HuntersTrying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information. HackAttack P C. owners are constantly at risk from attacks by hackers. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer If you use the internet, you have probably been infected with a virus, trojan or spyware. According to the SANS Internet Storm Center, the average unprotected PC is infected within 20 minutes of normal internet usage. Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc. Adware. Spyware. How to Manage Your Username and Password The Easy and Secure Way Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800. 8 Surefire Ways to Spot an E-Mail Identity Theft Scam! The E-Mail Identity Theft Scam is running Rampant. These E-Mail Scam artists will go to great lengths to Get Your Bank Account information and Steal your Identity. How To Prevent Spyware Attacking Your Computer Spyware is software or hardware installed on a computerwithout a user's knowledge. It gathers information andreports it back to its source. 3 Simple Steps to Stay Safe from Spyware There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D. Mail Forwarding - Why Would You Do It? First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic. Wells Fargo Report Phishing Scam First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. 8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft Ebay is a great site and is used by many to buy and sell new and used Items. It truly is the worlds Largest Garage Sale Unfortunately when an online site becomes as big and popular as E-Bay the scam artists seem to just naturally follow. Dont Get Hacked - A Guide to Protecting Your Business from Thieves You've seen it in the news - 40 million credit cards exposed!With all the news about web sites being hacked and cyberthieves stealing credit card numbers and other personal data,it's no wonder that some shoppers are still hesitant to providepayment information online. You don't have to be. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually. Steganography - The Art Of Deception & Concealment The Message Must Get Through-----------------------------The year is 300A.D. How Spyware Blaster Can Protect Your Computer From Harm By browsing a web page, you could infect your computer withspy ware, ad ware, dialers and hijackers. These, unwelcomeguests, are some of the fastest growing threats on theInternet today. IPv6 - Next Step In IP Security IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete. ![]() |
home | site map |
© 2006 |