Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Anti Virus Software Floppy Disk - 1,641 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

Melissa, Bubble boy, WM Concept, Stoned, Michelangelo, , the list goes on and on. You might ask what do all these names have in common. The similarity between them is that they can cause damage to your computer. In short they are simply known as computer viruses. For most users, the term computer virus is a synonym of the worst nightmares that can happen on heir system. A computer virus is an illegal and potentially damaging computer program designed to infect other software by attaching itself to any software it contacts.

In many cases, virus programs are designed to damage computer systems maliciously by destroying or corrupting data. The viruses can do one or all of the following things: Take control of your computer without your knowledge, cause your computer to act strangely, and cause damage to some files. An infected file that is loaded into memory and executed causes a computer to catch a virus. In a computer the virus first infects the computers memory. The contact can take place by using a virus infected floppy disk, or by opening a virus infected e-mail attachment, or any other method where the virus comes into contact with the computers memory to infect the computer. Also, if the infected software is transferred to or accessed by another computer system, the virus spreads to the other system.

If an infected file is not opened, the virus cannot infect the computer. There are millions and millions of viruses out in cyberspace, and that list continues to grow weekly. However, all these viruses are only one of the 3 types of viruses. The three types of viruses are a boot sector virus, file virus, and Trojan horse virus. The boot sector virus hide on the sector of the disk known as the boot or partition table of a disk. Affecting the computer system during the start-up process.

These viruses are difficult to deal with because they read during the start-up process even before the system is able to load its anti-virus software to detect the virus. It will take control after which it will coy itself into RAM so that when other disks are called on for service, the virus will transfer to their boot sectors. One of the most wide spread virus is the application or fie virus. This attaches to executable. exe or. com files.

This type of virus takes control after the infected file has been ran or executed. When the infected file is running, the virus is loaded into the computers memory where it can infect every program run on the computer till shut down. Some just replicate themselves while others destroy the program being used. Unlike most viruses the stealth virus attempts to hide its presence. Some techniques of hiding include: change in date and time, and hiding the increase in file size. Some prevent anti-virus software for reading the file where the virus is located also encrypting the virus code with encryption techniques aids in the stealth.

Macro viruses which attaches to a word-processing or spreadsheet file as a macro. It can start programs that may be able to delete the users files on the computers hard drive and infect all other document spreading its self. Looking at the above we can see the damage that can occur when viruses are unprecedented. The amount of lost processing time and man-hours to correct the problems associated with them and lead to large amounts of money and equipment.

When the infected boot program executes, the virus is loaded into the computers memory. Once a virus is in the memory, it can spread to any floppy disk inserted in to the computer. A file virus inserts virus codes into program files. The virus then spreads to any program that accesses the infected file. A Trojan horse virus (named after the Greek myth) hides within or is designed to look like a legitimate program.

Some viruses interrupt processing by freeing a computer system temporarily and then displaying sounds or messages. Other viruses contain time bombs or logic bombs. A time bomb is a program that performs an activity when a certain action occurs, such as an employee being terminated. A worm, which is similar to a virus, copies itself repeatedly until no memory or disk space remains. Most of the viruses are received from the Internet. On Friday, March 26, 1999, a virulent and widespread computer virus was found.

This virus spread faster then any other virus all over the globe with in hours if its initial discovery. The virus, known as W 97 M/Melissa, spread by e-mailing itself automatically from one user to another. The virus is activated by modifying the users documents and inserting comments from the TV series The Simpsons. The Melissa virus can send out confidential information from the computer without the users being aware of what is taking place.

The virus was discovered late Friday evening European time, early morning US time. Many multinational companies reported widespread infections, to include Microsoft and Intel. Microsoft closed down their entire e-mail system to prevent the virus from creating further damage. W 97 M/Melissa was initially distributed in an Internet discussion group called alt. sex.

The virus was sent in a file called LIST. DOC, which contained passwords for X-rated websites. When users downloaded the file and opened it in Microsoft word, a macro inside the document executed and e-mailed the LIST. DOC file to 50 people listed in the e-mail address book of the user. Subject: Important message from (name of infected user) Here is the document you asked for...

Dont show anyone else; -) The Melissa virus can arrive in any document, not necessarily just in the LIST. DOC where it will spread initially. Most recipients are likely to pen a document attachment, especially if it is received from a known user. After sending itself out, the virus continues to infect other Word documents. Eventually these files can end up being mailed to other users. This can be potentially disastrous if the user inadvertently sends out confidential data to outsiders.

The virus activated if the is executed when the minutes of the hour match the day of the month - for example 12: 30 on the 30 th day of the month. At this time the virus will insert the following phrase into the document the user has pen in Word: Twenty-two points, plus triple-word-score, plus fifty points for using all my letter. Games over. Im outta here. This text, and the alias name of the virus author, Kwyjibo, are references to the popular Simpsons cartoon TV series. When a big company gets infected, their e-mail servers are seriously slowed down and might even crash, as people start to e-mail large document attachments without realizing it.

W 97 M/Melissa works with Microsoft Word 97, Microsoft Word 2000 and Microsoft Outlook 97 or 98 e-mail clients. You dont need to have Microsoft Outlook to receive the virus in e-mail, but it will not spread itself further in e-mail without it. To prevent or destroy the virus within the computer, people can use an anti-virus program. If a virus is found, the program will clean or delete the virus without loss to data, or harm to the computer that is infected.

Even though, anti-virus software is widely available, there are many steps that one can take to ensure than a computer may not be infected. First dont use illegal software! If the software has been obtained illegally, how can one assume that it doesnt contain a virus? Never boot a computer system from a diskette if at all possible.

If the system needs o has to be booted from floppy then the diskette should be clearly marked, write-protected and used only footing up the computer. If your system uses a fixed disk, never boot from a diskette. Always write-protect your systems and program disks. Write-protect tabs are easy to use and very effective.

Only copy files from the original distribution disks. Always keep at least one set of back-up copies of all original disks. This will not prevent a virus infection, but it will help in the recovery process if an infection occurs. Do not load out program disks.

They may be infected when they are returned. If you must loan out program disks, always check it for viruses or format it before using the disk on your computer system. Make all the. com and. exe system and program fields read only, although some viruses can now circumvent this method it is a good habit. Watch for files that disappear or change size.

Notice when there are attempts to access the disks when there should not be any read or write activity. Keep a lookout for lower memory than what is installed or reduction of disk space. Look for unusual displays on the computer screen or different colors being used. Take caution when using public domain and shareware software or any new software. Even though there have been instances where commercial software has been sold with a virus this is not the norm. If you are downloading software from the Internet or other computer network.

Always download to a diskette. You should then scan the diskette for possible virus infections. Most important of all is to teach anyone using your computer about computer viruses so that they can recognize them. Bibliography: WORK CITED Chambers, Anita R. , and Zachary W. Peters.

Protecting Against virus Attacks. Computers May 1998 Elmhurst, Mark. virus Infection: Where to Obtain Assistance Word 97, Project 3. web 28 Nov. 2000 The Gael Encyclopedia of Science vol. 6 Detroit, MI 1995 Reed, Margaret E.

An Introduction to Using Computers Chicago: West Davidson Jones Publishing Company, 1998 Rich-Encyclopedia 30 Nov. 2000 web Summers, Wayne. Home Page. 29 Nov. 2000 web U = GEEKA 29 -Nov- 00 web search. cgi


Free research essays on topics related to: floppy disk, anti virus software, cause damage, virus infection, trojan horse

Research essay sample on Anti Virus Software Floppy Disk

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com