0% found this document useful (0 votes)
3K views6 pages

Cause and Effect Essay

Malware comes in many forms including adware, spyware, hijackers, and toolbars. It can harm computers by slowing them down, displaying unwanted ads, and stealing personal information. Malware often installs itself by bundling with other programs, exploiting security holes in browsers, or convincing users to install suspicious programs. Once installed, malware can be difficult to remove completely and may reinstall itself. It is important for computer users to protect against malware using antivirus software, practice safe web browsing habits, and be wary of unauthorized programs.

Uploaded by

tisham5ooooo
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3K views6 pages

Cause and Effect Essay

Malware comes in many forms including adware, spyware, hijackers, and toolbars. It can harm computers by slowing them down, displaying unwanted ads, and stealing personal information. Malware often installs itself by bundling with other programs, exploiting security holes in browsers, or convincing users to install suspicious programs. Once installed, malware can be difficult to remove completely and may reinstall itself. It is important for computer users to protect against malware using antivirus software, practice safe web browsing habits, and be wary of unauthorized programs.

Uploaded by

tisham5ooooo
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Tisha Wilson July 14 2011 Eng 1213 Cause and Effect Essay

Malware and Viruses

Along with viruses, one of the biggest threats to computer users on the Internet today is malware. It can hijack your browser, redirect your search attempts, serve up nasty popup ads, track what web sites you visit, and generally screw things up. Malware programs are usually poorly-programmed and can cause your computer to become unbearably slow and unstable in addition to all the other havoc they wreak. Malware is a term used to describe software that is intentionally installed on a computer to gather information or cause problems for the user (Teacher Librarian). Many of them will reinstall themselves even after you think you have removed them or hide themselves deep within windows making them very difficult to clean. You can get infected by malware in several ways. Malware often comes bundled with other programs Kazaa, iMesh, and other file sharing programs seem to be the biggest bundlers (eWeek). Malware programs, usually pop-up ads sending revenue from the ads to the program's authors. Others are installed from websites, pretending to be software needed to view the website. Still others, most notably some of the Cool Web Search variants, install themselves through holes in Internet

Explorer like a virus would requiring you to do nothing but visit the wrong web page to get infected. The vast majority however must be installed by the user. Unfortunately, getting infected with malware is usually much easier than getting rid of it, and once you get malware on your computer it tends to multiply. A computer virus is a potentially damaging computer program designed to affect or infect your computer negatively by altering the way it works without your knowledge or permission. More specifically, a computer virus is a segment of program code that implants itself in a computer file and spreads systematically from one file to another. Viruses can spread to your computer if an infected floppy disk is in the disk drive. When you boot the computer if you run an infected program or if you open an infected data file in a program, depending on the virus certain actions can trigger the virus. Many viruses activate as soon as a computer accesses or runs an infected file or program. Other viruses, called logic bombs or time bombs, activate based on specific criteria. A logic bomb is a computer virus that activates when it detects a certain condition. An example would be a disgruntled worker planted a logic bomb that began destroying files when his name appeared on a list of terminated employees. A time bomb is a type of logic bomb that activates on a particular date. A well-known time bomb is the Michelangelo virus, which destroys data on a hard disk on March 6, Michelangelos birthday. Some might call it a Terrorist virus (Maclean's). Another type of malicious program is a worm. Although, often it is called a virus. A worm unlike a virus does not attach itself to another program. Instead, a worm program copies itself repeatedly in memory or on a disk drive until no memory or disk space remains. When no

memory or disk space remains, the computer stops working. Some worm programs even copy themselves to other computers on a network. Once it escapes into the general culture there will be no way back (Communications of the ACM). Anti-virus companies are only beginning to pay attention to malware. Aside from some of the latest versions many include the malware scanner in the Internet security most antivirus programs have little to no protection. Those anti-virus programs that do protect are generally not as thorough as a dedicated malware remover. However, some especially virulent malware that malware scanners may miss will be removed by anti-virus programs. So it is generally a good idea to run a virus scan as well. Some of the anti-virus vendors' delay may be caused by worries they will get sued if they start labeling programs spyware, adware, etc., which has already happened. The signature files and data updates are what make an anti- virus programs effective (Information Systems Security). Although, there is no official breakdown we can divide malware into several broad categories of malware: adware, spyware, hijackers, and toolbars. Many if not most malware programs will fit into more than one category. It is very common for people to use the words adware, spyware, and malware interchangeably. Most products that call themselves spyware or adware removers will actually remove all types of malware. Adware is the class of programs that place advertisements on your screen. These may be in the form of pop-ups, popunders, advertisements embedded in programs, advertisements placed on top of ads in web sites, or any other way the authors can think of showing an ad. The pop-ups generally will not be stopped by pop-up stoppers and often are not dependent on your having Internet Explorer open. They may show up when you are playing a game, writing a document, listening to music, or

anything else. Should you be surfing the advertisements will often be related to the web page you are viewing. Programs classified as spyware send information about you and your computer to somebody else. Some spyware simply relays the addresses of sites you visit or terms you search for to a server somewhere. Many instances of spyware can carry out self-update automatically which allows new functions to be introduced and can evade spyware signatures contained in antispyware tools (Communications of the ACM). Others may send back information you type into forms in Internet Explorer or the names of files you download. Still others search your hard drive and report back what programs you have installed, contents of your e-mail client's address book (usually to be sold to spammers), or any other information about or on your computer things such as your name, browser history, login names and passwords, credit card numbers, and your phone number and address. Spyware often works in conjunction with toolbars. It may also use a program that is always running in the background to collect data, or it may integrate itself into Internet Explorer, allowing it to run undetected whenever Internet Explorer is open. Spyware succeeds today because information creates value to advertisers such as virus writers. Toolbars plug into Internet Explorer and provide additional functionality such as search forms or pop-up blockers. The Google and Yahoo toolbars are probably the most common legitimate examples and malware toolbars often attempt to emulate their functionality and look. Malware toolbars almost always include characteristics of the other malware categories which is usually what gets it classified as malware. Hijackers take control of various parts of your web browser. Including your home page, search pages, and search bar. They may also redirect you to certain sites should you

mistype an address or prevent you from going to a website they would rather you not, such as sites that combat malware. Some will even redirect you to their own search engine when you attempt a search. Hijackers almost exclusively target Internet Explorer. Badly infected systems may require a clean reinstallation of all their software in order to return to full functionality. There are many PC surveillance tools that allow a user to monitor all kinds of activity on a computer ranging from keystroke logger, screen capture, snapshots, email phishing, and chat logging. These tools are often designed for parents, businesses and similar environments and can be easily abused if they are installed on your computer without your knowledge. Companies are becoming more aware and threatened by the fact that their computers are prone to attack. Virus scanners are becoming necessities on all machines. Installing and monitoring these virus scanners takes many man hours and a lot of money for site licenses. Many server programs are coming equipped. Computer fraud and computer crime are very prevalent issues facing every computer user. This ranges from system administrators to personal computer users who do work in the office or at home. Computers without any means of security are vulnerable to attacks from viruses, worms, and illegal computer hackers. If the proper steps are not taken, safe computing may become a thing of the past. Many security measures are being implemented to protect against illegalities. Malware and viruses prevention has become a major issue in the computer world. They come in many types and come into your computer in many ways. There are ways to protect your computer from these nasty things. However, you must keep on protecting it and not let your guard down.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy