Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Trojan Horse Microsoft Corp - 1,041 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

Viruses and Worms This paper is about computer viruses and worms. Maybe the term virus is not the first thing to remember when we talk about computers but viruses play an important role in using them. Lets start from the definitions of what are the viruses and worms are. At first I want to emphasize that both viruses and worms are malicious programs, which can damage a computer.

We need to know the difference between the two of them if we want better protection for our computer. Vangie 'Aurora' Beal states A computer virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. Much like human viruses, computer viruses can range in severity; some viruses cause only mildly annoying effects while others can damage your hardware, software, or files (The Difference Between a Virus, Worm and Trojan Horse? ) You need to know that almost all viruses are attached to the executable file. That means that virus can exist on your computer but infects it only when you run or open the malicious program.

We must to remember that viruses are spreading because of the human actions. Mostly, people do it unknowingly. Vangie 'Aurora' Beal explained, Worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the ability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. (The Difference Between a Virus, Worm and Trojan Horse? ) The main danger of the worm is its ability to replicate itself and send hundreds and thousands of copies of itself.

The damage from the worm is much greater than from virus. Vangie Aurora Beal outlined that Due to the copying nature of a worm and its ability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network, bandwidth), causing Web servers, network servers, and individual computers to stop responding. In more recent worm attacks such as the much talked about. Blaster Worm. the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. (The Difference Between a Virus, Worm and Trojan Horse? ) Computer security is very important nowadays and CERT (Computer Emergency Response Team) is the most competent expert in this field. Larry Rogers states Computer security has been, is, and will continue to be a hot topic for discussion (The Goal of Computer Security or What's Yours is Yours Until You Say Otherwise, 2005) The CERT Web site contains various information about viruses latest attacks and protection methods.

The main parts are Vulnerabilities, Incidents and Fixes, Security Practices and Evaluations, Survivability, Research and Analyses, Training and Education. Viruses and worms usually attack computer-based possessions such as disk space, memory, CPU cycles, Internet connectivity and speed, software, files and folders. Having your computer safely protected is very important. Why? Larry Rogers answers on this question Technology changes rapidly, as do the ways intruders take advantage of that technology.

If you know the goal of computer security, you can better adapt to these inevitable technological changes. And you can better safeguard your computer resources against the inevitable intruder attacks, keeping what belongs to you yours until you say otherwise! (The Goal of Computer Security or What's Yours is Yours Until You Say Otherwise, 2005) So lets observe three computers attack and discuss what each attack did, what types of systems were affected, and what course of action or remedy was proposed. September 19, 2005 security researchers at Panda Software reported about new worm that generated a spoofed version of Google. Virus lures users into launching the P 2 Load.

A on their computers using a faked error message. Matt Hines states, Once the virus has been sprung, it immediately modifies the computer's start page, launches the adware and spoofs Google. As part of its delivery function, the P 2 Load. A attack modifies an infected computer's Hosts file so that when an unsuspecting user attempts to call up the search engine, they are instead diverted to the mocked-up version of the site. However, Panda Labs security system stopped the spreading of this worm. Luis Commons, director of Panda Labs advised users to use firewalls and antiviral protection.

Reed Stevenson reported about two worms IRCBOT. WORM and RBOT. CBQ. The worms exploit a recently discovered flaw in Microsoft Corp. 's Windows 2000 operating system. They were causing PCs at more than 100 U. S.

companies to restart repeatedly and potentially exposed them to attackers who could take control of a system. (Worms target Microsoft's Windows 2000 operating system. August 17, 2005) In that case, Symantec Corp. and Mcafee, two large computer security companies, limited the damage to computer systems. At August 15, 2005 Robert McMillan wrote about new virus.

Microsoft Corp. 's Windows 2000 Plug and Play was attacked with so called Zotob. According to Johannes Ullrich, chief research officer with the SANS Institute, a Bethesda, Md. , security training company, The worms spread using the TCP/IP Port 445, which is associated with Windows file sharing, and take advantage of the Plug and Play system bug to seize control of the operating system. Infected computers are then told to await further instructions on an Internet Relay Chat channel, meaning that they could then be used to attack other systems (Zotob worm exploits Windows 2000 Plug and Play, August 15, 2005) Fortunately, Microsoft correct their program mistake and SANS has published instructions on how to check if they are enabled. Bibliography Vangie 'Aurora' Beal, The Difference Between a Virus, Worm and Trojan Horse. Retrieved September 22, 2005 from web Larry Rogers, The Goal of Computer Security or What's Yours is Yours Until You Say Otherwise! , 2005. Retrieved September 22, 2005 from web Reed Stevenson, Worms target Microsoft's Windows 2000 operating system. , REUTARS, August 17, 2005.

Retrieved September 22, 2005 from web Robert McMillan, Zotob worm exploits Windows 2000 Plug and Play, IDG NEWS SERVICE, August 15, 2005. Retrieved September 22, 2005 from web


Free research essays on topics related to: trojan horse, computer security, microsoft corp, computer viruses, operating system

Research essay sample on Trojan Horse Microsoft Corp

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com