.

Tuesday, December 10, 2013

Sweet Home Alabama

CHAPTER 1: COMPUTER VIRUSES One of the most familiar forms of bump to data processor security is the computer computer virus. A computer virus is a program written by a turn out or a cracker, designed to perform several(prenominal) miscellanea of fancy upon an unsuspecting dupes computer. In some cases, the hoax performed is mild, such as drawing an offensive moving house painting on the victims screen or changing all of the characters in a document to another language. sometimes the trick is much more severe, such as reformatting the wordless drive and erasing all the data or damaging the motherboard so that it cannot snuff it properly. Types of Viruses Viruses can be categorized by their effects, which pose being a nuisance, destroying data, facilitating espionage, and destroying hardw ar. A nuisance virus usually does no real damage but is an inconvenience. The most gnarly part of a computer to replace is the data on the hard drive. The installed program s, documents, databases, and saved telecommunicates form the heart of a own(prenominal) computer. A data-destructive virus is designed to destroy this data. Some viruses are designed to create a backdoor into a system to get active security. Called espionage viruses, they do no damage but allow a hacker or cracker to enter the system concomitant for the purpose of stealing data or spying on the work of the competitor.
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
Very rarely, a virus is created to damage the computer hardware of the computer system itself. Called hardware-destructive viruses, these bits of programming can cave in or destroy chips, drives, and other components. Methods of Virus Ope! ration Viruses operate and are transfer in a variety of ways. An email virus is commonly transmitted as an attachment to a message displace over the Internet. Email viruses require the victim to click on the attachment, which causes the virus to execute. Another common order of virus infection is via a macro, a small number that allows users to customize and modify certain functions. A macro virus is written for a specific program, which...If you want to get a full essay, prescribe it on our website: OrderCustomPaper.com

If you want to get a full essay, visit our page: write my paper

No comments:

Post a Comment