A difficult to detect. -Worms :An active

A computer virus is a type of a malicious software program, when
executed replicates itself by modifying other computer programs and inserting
its own code, infected computer programs can include, as well data files and
most of the programs, generally affects the way that computers work, the
ability of a virus to spread and damage a computer depends on the user, he/she
should have first opened a damageable file or a file full of viruses that has
come from an email or another corrupted files.

Information about computer virus

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Viruses are corrupting several of computers and mobiles daily and
that’s why many important files will be lost.

With increasing of computer viruses threat we should learn more
about the properties and the way of working in order to protect our computers.

Computer viruses have many risks such as damaging the world
economy, wasting computer resources, corrupting data and increasing maintenance
costs, etc…

In response, Free and open-source Antivirus have been developed,
which we will talk about it later.

Types of Viruses

There
are so many different types of viruses, some of them are so many weak and
simple but also there are many other types of viruses that are strong and
active, some examples:

                                                                                                            *Ransomware

*Spyware

*Adware

*Trojan

*Horses

*Keyloggers

*Rootkits

*Bootkits

*Worms

-We
will talk about some of them:

 

-Adware: adware is also known as
advertising-supported software, it is software which renders advertisements for
the purpose of generating revenue for its author. The  advertisement are published on the screen
presented to the user at the time of installation, Adware is programed to
examine which internet sites, the user visits frequently and to present and
feature related advertisements. Not all Adware has malicious intent but it
becomes a problem any way because it harms computer performance can be
annoying.

 

-Spyware: this type of malicious Software,
spies on you, tracks on your internet activities, it helps the hacker in
gathering information about the victim’s system, without the consent of the
victim. This Spyware’s presence is typically hidden from the host and it is
very difficult to detect.

 

-Worms :An active
virus, can copy itself and transfer from a computer to another, by getting
benefit from the downloaded programs such as messaging applications, will replicate itself and
destroy information and files saved on the host PC, it works to eat up all the
System operating files and data files on a Drive.

 

 

-Trojan: This type of
virus has a tricky style, for enticmenting 
the user, first they show you so many benefit applications by clicking
them the virus spreads into your computer and you can’t control it anymore,
however not all viruses carry a destructive “payload” and attempt to
hide themselves, the defining characteristic of viruses is that they are
self-replicating computer programs which modify other software without user con???? sent, they maybe programmed to steal
personal and financial information, and 
later take over the resources of the

host
computer’s system files.

 

 

*Ransomware: Ransomware is an advanced type of malware that restricts access to
the computer system until the user pays a fee, your screen might show a pop up
warning that your have been locked out of your computer and that you can access
only after paying  the cyber criminal,
the cyber criminal demands a ransom to be paid in order for the restriction to
be removed, the infamous Cryptolocker is one type of  Ransomware.

 

 

 

 

Historical Development

The first
academic work on the theory of 
“self-replicating computer programs” was done in 1949 by (John
Von Neumann) who gave lectures at the university of lllinois about “theory
and organization of complicated automata” the work of Von Neumann was
later published as the “theory of self-reproducing automata” in his
essay Von Neumann described how a computer program could be designed to
reproduce itself, Von Neumann’s design for a self-reproducing program in
considered the world’s first computer virus, and he is considered to be the
theoretical “father of computer virology”.

After him many
other scientists tried to do researches about virus for example: (Veith Risak,
Jurgen Kraus, Bob Thomas, Michael Crichton..), their goal was to investigate
about how could a virus spread into a computer.

 

What is an Antivirus?

Often Abbreviated as (AV), sometimes known as anti-malware
software.

It is a computer software used to prevent, detect, and remove
malicious software.

Antivirus software was originally developed to detect and remove
computer viruses, hence the name , however antivirus software started to
provide protection from other computer threats.

In particular, modern antivirus software can protect from:
(malicious browser helper objects, Ransomware, Rootkits, Trojan, Worms,
Spyware..) and so many other types of viruses.

 

The first Antivirus

Although the
roots of the computer virus date back as early as 1949 when the Hungarian
scientists John Von Neumann published the “Theory of self-reproducing
automata” which we talked about but the first known computer virus
appeared in 1971 and was dubbed “creeper virus” this virus infected
“Digital Equipment Corporations”.

The creeper
virus was eventually deleted by a program created by “Ray Tomlinson”
and known as “The Reaper” some people consider The Reaper as the
first antivirus software, but it’s important to know that The Reaper was
actually a virus itself specifically designed to remove the creeper virus.

*Before
Internet connectively was wide spread, computer viruses were typically spread
by infected floppy disks, antiviruses software come into use, but was updated
relatively in frequently, during this time virus checkers essentially had to
check executable files and the boot sectors of floppy disks and hard disks,
however as internet usage become common, virus began to spread online.

 

How do you know your computer has been infected by a
virus?

With opening a
computer it starts to work very slowly and will take a lot of time, then you
could notice that your computer has been infected by a virus, but remember that
not every time slowly working of the computer will mean that it has been
infected by a virus.

Sometimes when
your storage is full and there is no enough space your computer will work
slowly, to make sure that the reason is a virus or not, again we should use
antivirus.

 

 

 

How To Protect our Computer from Viruses?

Most of us have had to deal with a Computer Virus or some Sort
of  Malware.

When Our Computers Starts Slowing 
Down Or Behaving  Is An Unusual
Way, we Are Often quick to suspect that we have a Virus,  it Might not be a virus, But it’s  Likely that you have some sort of  malware. Some are malicious and others are
just annoying.

The worst culprits are the hijackers-Malware programs that take
over your browser, or worse yet, your Computer.

That’s why I want to explain 10 ways to protect our computer from
Viruses:

1-install Anti-VirusMalware Software

This tip may go Without Saying,
This Protection is a must-have first step in keeping your Computer Virus Free,
Remember no Anti-Virus program Can detect 100 Percent Of the Millions of
Malware types and Variants.

2-Keep Your Anti-Virus Software up to Date

Having Protection Software is the
first step, Maintaining it is the Second free Anti-Virus Software is better
than nothing, But Keeo in Mind That its not the Best solution,

3- Run Regularly Scheduled Scans with Your Anti-Virus
Software

Many of us forget to do this. Set
up your Software of choice to run at Regular intervals, once a week is
preferred, but do not wait much longer between Scans. It’s Difficult to work on
your computer while your Anti-Virus Software is running, so the best way is to
Run the Software at night when you Aren’t using your Computer.

4-Keep your Operating System Current

Whether Your Running Windows,  Mac OS X, Linux or any other Operating System,
keep it up to Date. Operating System developers are always issuing security
patches that fix and plug security leaks, These patches will help to keep your
System Secure.

5-Secure Your Network

Many of our computers connect to
our files, printers, or the internet via Wi-Fi connection, make sure it
requires a password to access it and that the password is strong, never
broadcast an open Wi-Fi  connection , use
WPA or WPA2 encryption. WEP is no longer strong enough as it can be bypassed in
minutes by experts. It’s also a good idea to not broadcast your SSID (the name
of your Wi-Fi network).

6-Think Before You Click

Do not open an Email attachment
from Somebody or a company that you  do
not know, Do not click on a link  in a
unsolicited email, always hover over a link(especially one with a URL
shortener) before you click to see where the link is really taking you, if you
have to download a file from the internet, an email, an FTP site, a
file-sharing service, etc.., scan it before you run it, a good Anti-Virus
Software will do that Automatically, but make it is being done.

 

 

7-Keep Your Personal Information Safe

this is the most difficult thing to do on the internet , many
hackers will access your files not by brute force, but through social
engineering, they will get enough of your information  to gain access to your online accounts they
will continue from account to account until they have enough of your info, lock
down all of your privacy setting, and avoid using your Real name or identity on
discussion boards.

8-Don’t Use Open Wi-Fi

When you are at the local cafe shop, library, and especially at the
airpot, don’t use the “free” open (non-password, non encrypted) Wi-Fi, think
about it, if you can access it with no issues, what can a trained malicious
individual do?

9-Back Up Your Files

The best thing you can do is back
up your files-all of them, ideally you will have your files in at least three
places, the place where you work on them, on a separate storage device, and
off-site. Keep your files on your computer, back them up to an external hard
drive, then back them up in a different location.

10-Use Multiple Strong Passwords

Never use the same passwords,
Typically, we use the same email address or username for all of our accounts,
those are easy to see and steal if you use the same password for everything ,
or on many things, and it discovered , then it takes only seconds to hack your
account, use a strong password, use lower case, upper case, numbers, and
symbols, in your password, keep it easy to remember but difficult to guess, do
not use dates or pet names.

 

 

 

 What’s the aim of Virus Writers?

There are thousands and thousands
of different viruses and malware on the internet today. So you may be asking,
why do people create viruses and malware?

*Making Money:

Some Malwares is designed to
capture Information about the computer user and send it to the person or
company responsible for making the malware. The information they collect is
then used to target advertisements to your computer that you maybe interested
in viewing these ads come in the form of E-mails, if enough computers get
infected, they can earn money from all the ads displayed, the more ads they
send out, the more chances they have to getting people to buy something or
visit the advertiser .

*Stealing account Information

Maybe a virus is created to steal
online account information associated with online games, using this type of
malware, a person could gain access to a victim’s account and steal there
virtual goods and currency. They could even sell their ill-gotten virtual goods
to other players for real money, or sometimes they will only try to give a
political message.

*Causing Problems

There are some people that create
viruses and malware because they can, they enjoy causing troubles, seeing
computer users get annoyed and have to fix their computers, some malware can
crash an entire network system and cause system outages for large companies,
like banks or production companies, other hackers are trying to demonstrate
that a Vulnerability exist in Software, or simply because they wish to explore
cybersecurity issues , artificial life and evolutionary Algorithms.

 

 

 

Conclusion

out user conceuser concent ther software without
user concent yload” and attempt to hide themselves, the difining ou can’t

*Well most people believe that all computer
threats are due to a virus, but now we know that there are a lot of different
threats beside viruses

*we know that there are different types of virus such as Trojans,
Worms, Spyware..

*Back to viruses we learnt a little bit of what it does such as how
it infects our computer system and destroys it slowly.

*We talked about the importance of Anti-virus and how it works.

*The most important thing we learnt to protect our Computers from
all the types of Viruses and Malware.