Viruses and anti-virus programs (2) - Abstract Synopsis of the lesson "computer viruses and anti-virus programs" Computer viruses Victorian anti-virus programs

Zharoznizhuvalny for children is recognized as a pediatrician. Allegedly, there are situations of inconvenient help for feverish women, if the children are in need of giving innocently. Todi dad take on the versatility and constipation of fever-lowering drugs. How can you give children a breast? How can you beat the temperature of older children? What are the best ones?

Computers have become the reference companions of the people, and without them one cannot get by with neither the commercial company nor the state organization. However, the problem of the zahist has become especially acute in the context of the tsim.

Viruses, scho poured a wide extension into the computer technology, burst the whole world. Bagato koristuvachіv computers sturbovanі are sensitive about those who, behind the help of computer viruses, evil men wicked fouls, rob banks, steal intellectual power.

The current mass storage of personal computers, it's a pity, we will be connected with the appearance of the program, so that we can self-create, viruses, that we can change the normal robotic computers, update the file structure of the drives, and start up

All in all, in the context of the mass information, there is information about the development of the anti-human heroes of the computer bullies, about all the more detailed programs that will spontaneously multiply. Not long ago, the infection with the virus of text files became absurd - the infection didn’t have any health at all. Unimportant on the praises of the Bagutian lands, laws on the fight against computer scrapes and the distribution of special software for the destruction of all viruses, a number of new software viruses are constantly growing. Know about the nature of viruses, the ways of getting infected with viruses and how they are infected.

1. Computer viruses

A program is called a computer virus (a program that can be downloaded to a code / instructions), as it is built on its own copy (it’s not necessary to use the original) and to use the computer’s systems in use without the view of koristuvach. The rest of the copy has the potential to expand on it.

Classification of viruses:

1) behind the midst of living of the virus;

Behind the midst of living, viruses can be distributed on fonts, files and overwhelmed. More viruses are distributed across computers, files are sent to files, and files are sent to the boot sector of the disk (Boot-sector), or to the sector, to avenge the system boot-up of the Winchester (Master Boot Record).

2) by the method of contamination of the dovkill;

Ways of infection to spread to residentі non-resident . Resident When a computer is infected, a virus has placed its resident part in the operating memory, because it is possible to overwhelm the operating system before the infection is detected, and it is necessary to get it from them. Non-resident viruses do not infect the computer memory and active interconnections for an hour.

3) for destructive possibilities

For the destructive capabilities of the virus, you can go to:

- not great, tobto. do not pour a computer into the robot (except for the change in memory on the disk, as a result of its development);

- safe, in a flood of those to be interconnected with changes in the memory on the disk that are graphic, sound and in. efects;

4) for the peculiarities of the virus algorithm.

For the peculiarities of the algorithm, you can name the following groups of viruses:

- companion- tse viruses, as do not change files.

- viruis- "hrobaki"(worm) - viruses that can be used in computers, such as companion viruses, do not change files and sectors on disks. The stench penetrates the memory of the computer from the computer framing, count the framing addresses of their computers and supervise the addresses of your copy. Such viruses sometimes create working files on the system disks, or they can go to the computer resources (except for operational memory).

1.2. Creator of awesome programs

The main mass of virusesі Trojan programs at the last were set by students and schoolchildren who didn’t learn the language of the program, wanted to try their strength, or couldn’t know for them a lot of money. Such viruses have been written and are being written by donations for self-asserted authors.

To another group of creators viruses so are young people (often students), who have never heard of the mystery of the program. From the pen of some "smart" often go viral in the provinces of primitive more pomilok ("student" viruses). The life of other viruses has become a bit simpler with the development of the Internet, and with the appearance of numerous websites, published on the basis of computers written by computers. Often, you can immediately know the ready-made texts, in which it is necessary to introduce minimal "author's" changes and compilations using the recommended method.

The third, most notable group, as I launch the launch at the "professional" viruses. Thoughtfully thought out and well-thought-out programs are developed by professional, often even talented programmers. Such viruses are not easy to get through with the original algorithms of penetration in the system area of ​​the data, the gratuity in the systems of security of the operational middle-class, social engineering and in the cunning.

Okremo is the fourth group of authors of viruses - "Doslidniki", as they are engaged in a wine route of principally new methods of infection, preservation, anti-virus infection, etc. At the same time, it’s not safe to go around such “pre-old” viruses, it’s even great - having spent some time on the hands of “professionals” from the front group, and ideas are even more likely to appear in new viruses.

1.3. Description of high-quality programs

Before awkward software security, there must be worms, classic files, viruses, Trojan programs, hacker utilities and programs that start a computer that can run on a computer that stinks.

Polymorphic viruses

Polymorphic viruses- viruses that modify their code in infected programs with such a rank, but two copies of the same virus may not be able to get rid of it. The whole kind of computer viruses on this day is most not safe. Such viruses do not only encrypt their own code, but I transmit the encryption code of the encryptor and encryptor, so that the encryption code of the encrypted ones is sent to the encryption code.

Stealth virus

Stealth virus cheat anti-virus programs and, as a result, become incomprehensible. Tim is not the least, there is a simple way to discover the mechanism of stealth-virus masking. It is enough to lock up the computer from a non-infected system diskette and at once, do not run any programs from the computer disk (which can also be infected), reconvert the computer with an anti-virus program. When the virus is locked from the system diskette, it cannot be rejected and the resident module cannot be inserted into the operative memory, which implements the stealth mechanism. Anti-virus program You can read information that is efficiently recorded on the disk, and it is easy to detect the virus.

Trojan viruses

Trojan kin- The whole program, how to take revenge on the deyaku function, to become more active when the deyakoi deyakoi deyakuvuvannya is instituted. Call these programs to be masked for the corny utilities. "Trojanski kony" є programs that implement all the functions described in the documentation, and those functions, related to damaged safety and destructive actions. The assignment of the stem of such programs was determined by the reduction of the expansion of viruses. Lists of such programs are widely published in the foreign countries. Call the stench to disguise yourself for the games or for the development programs that start the shkodi for the garnie pictures for the music.

Programming bookmarks can also avenge a deyaku function, which creates a shkodi PS, ale tsya functiya, navpaki, and rewires itself to be uncomfortable, because What is more than the program is not wiklikatime p_dozr, what is more, bookmarking the opportunity for pratsyuvati.

Worms

hrobakami They call viruses, which are expanded by global fences, hostile to the whole system, but not by programs. This is the most unsafe kind of viruses, so they will attack in any way information systems sovereign scale. With the emergence of a global Internet net, a kind of destructive security will become the greatest threat, so be it from 40 million computers connected to a net worth.

Behind the midst of living, viruses can be divided into:

File viruses most often it is possible to use a file, how to check it out, how it can be expanded.exe i.com (newer viruses), but you can also use it from a file with components of operating systems, drivers outbuildings, ob'ktnі files and libraries, command package files, program files with procedural program files (infecting every hour of translation of viconuvani files).

Zavanazhvalny Viruses vprovazhuyutsya in the boot-sector, or the sector to avenge the boot-sector system disk(Master boot record). When DOS is locked from an infected disk, such a virus changes the cob lock program to modify the table of files on disk, which is difficult for a robotic computer and makes it difficult to start the operating system.

File-locking viruses integrate the capacities of two groups in front of them and may cause the greatest "efficiency" of the infection.

Merezhevі viruses vikoristovuyt for his extended command and protocols of telecommunication systems ( e-mail, computer fingering).

Documentary viruses(їх often referred to as macro viruses) text files(.doc) files electronic table popular editors.

Combined macroviruses how to infect files of documents, and make copies of these documents by e-mail.

1.4. Chronology of the news

Here is a chronological list of deyakie vіdomykh computers virusesі worms, і nіvіt pіd, as we celebrated in earnest a lot of development.

Since 2007 Worm'yak Storm fix the infected computers, mold Mereja Storm, as at Veresní reached the size from 1 to 10 million computers.
2006

15 birch 2006 rock in ЗМІ there is a notification about the first virus for RFID-Mіtok (div. RFID virus).

20 sichnya 2006 : buv of manifestations worm Nyxem... Winning for the help of mass promotion e-mail... Yogo navantazhennya, yake will be activated on the 3rd of the skin month, fixing 3 fierce, to rob when trying to connect the PZ is connected without baking and distributing files, as well as the files of singing types, such as documents Microsoft Office .

2005 Serpen: worm Zotob (en: Zotob), unaffected by the alarmingly small scale of the Epidemic, ЗМІ In addition, as the guys from them, the bully attacked and became aware of the singing hits.
2004

Breast: running worm Santy (en: Santy) - the first worm'yak, scho vikoristovuє for rozpovsujennya website, and until then vikoristovuє Google for the knowledge of their victims.

Traven: to appear worm Sasser (en: Sasser worm), scho exploiting the OS Windows and a quick response to the numerical problems of the hedgehog, in order to help the organization work in parallel.

Berezen: revealed worm witty (en: Witty) - the first in several categories. Tsei hrobak attacking the kilka version IIS; wіn showed up at a record hour for nudity; win having become the first Internet hrobak, carrying a shkidlivy code in a fair way; And, nareshty, win became the first worm, which is a collection of letters of letters for a long time by adding a list of promiscuous computers.

Sichen: launched worm MyDoom (en: Mydoom), which at that time became the best worm, which can be distributed by electronic means.

2003

Zhovten: launched worm Sober (en: Sober worm), which will adapt its presence in the hedge until 2005 in the older versions.

Serpen: launched worm Sobig (en: Sobig), which can be quickly distributed through e-mail and resources provided for collective access in local fences. One-hour epіdemya of worms Blaster and Sobig is responsible for the education of the worms for the whole world.

Serpen: launched Hrobak Welchia (en: Welchia) - one of the most recent "big worms". Win following the Blaster worm's pins, you can see it from infected computers and stand on them patch OS. To be afraid, however, like and earlier without the need for koristuvachiv, and a lot of it system administrators skarzha, well, Welchia's worm picks up the heels, flashing even more problems - in such a rank, by itself awesome program .

Serpen: worm Blaster (en: Blaster worm), also vіdomy yak Lovesan, grow up all over the world, also notice the great number of smіttєv traffic. Worm'yak revenge images at the address Bill Gates that pomilkovo programmed DoS attack on the OS server Windows .

Sichen: SQL Slammer worm (en: SQL slammer worm), also vіdomy yak hrobak Sapphire Microsoft SQL Server that is a great cross in the Internet.

2001

Zhovten: first revealed worm Klez .

Veresen: bug vector worm Nimda (en: Nimda) to expand vicoristy and all at once a few different ways, including backdoor, lacking Code Red II and Sadmind hogs.

Serpen: to fix the global epidemic after the rewritten version of Code Red Code red ii (en: Code Red II), in the main China... Code Red II, the same alternator will not be bargained for with the classic butts of Internet chrobaks, for a detailed analysis of popular statistics How to 0wn the Internet in Your Spare Time that publications disassembled code of viruses from comments on the site eEye .

Lipen: hesitations worm Code red (en: Code Red (computer worm)) is also attacking.

Lipen: hesitations Sircam worm (en: Sircam), which will be spread over e-mail that resources, visible for collective access to local framing .

Grass: worm Sadmind (en: Sadmind worm) increase the amount of variability in the OS Solaris that program Microsoft Internet Information Servicesпід OS Windows .

Sichen: worm Ramen, which is quite similar to hrobak Morris Information about computers from OS Red Hat Linux version 6.2 and 7, vikoristovuchi irregularities in programs wu-ftpd , rpc-statdі lpd .

2000 Grass: having appeared worm "I love you» (en: ILOVEYOU), one of the most senior in the entire history. For deyakim otsenkami, the fault was reported to the PCs in the whole world more than $ 10 billion.
1999 26 birch: boosters worm Melissa (en: Melissa (computer worm)) for Microsoft Wordі Microsoft Outlook, which generates the number of Internet traffic .
1998

Cherven: Epidemiya rescued to the virus Win95.CIH (en: CIH), also known as Chornobil, which became the most important for all the foregoing rock. Virus learning about information on disks and rewriting Flash BIOS, well, among the people in the fall, they heard the coristas to replace the microcircuit of the memory motherboard board .

Serpen: It is the first virus for Java Strange Brew... Wikipedia texts published in the electronic journal Codebreakers #4.

1996

Veresen: The alt.comp.virus newsgroup has failed to manage the file, infections with the Bliss virus for Linux A new version has come to the fierce offensive rock.

Zhovten: In the electronic journal VLAD# 7, assigned to the writing of computer viruses, published in the original text to the Staog virus for Linux, by Quantum.

1995

First macrovirus is revealed.

Lipen: Mark Lyudvig having written the first virus for OS / 2"Blue Lightening" (OS2.AEP). American Eagle Publications view yogo book Mark Ludwig "The Giant Black Book of Computer Viruses" , ISBN 0-929408-10-1). At the bottom of the handwriting of the text is the Blue Lightening virus, as well as the X21, X23 viruses for FreeBSD .

1992 Virus Michelangelo (en: Michelangelo (computer virus)) born of the publication of publications from the ancient ЗМІ, scho peredbachayut catastrophe 6 birch. Ochіkuvalosya, scho the virus to download information on millions of computers, even those inheritances appeared to be minimal.
1991 The first polymorphic virus Tequila.
1989

Zhovten: revealed Ghostball (en: Ghostball) - first multi-sided virus .

Zhovten: DECnet has widened hrobak Wank worm ».

Computing Systems magazine published an article by Douglas McIlroy "Virusology 101" ( Douglas McIlroy "Virology 101"), in which the butt of viruses for OS is pointed Unix written by my SH .

1988 2 leaf fall: Robert Morris Jr. open Hrobak Morrisa, which information has been connected to Internet computers VAX , DECі Sun for management OS BSD... Hrobak Morris became the first weave a worm, so successfully distributed "in-the-wild", and one of the first types of programs to use re-buffer .
1987

May: Tom Duff conduct a series of experiments at the AT&T lab with viruses written by my SH and assembler for VAX 11/750 for controls UNIX .

Bernd Fix wrote a virus for the IBM 3090 MVS / 370.

To appear (c) Brain (en: (c) Brain) - the first virus of cases for IBM PC-summy PCs.

Zhovten: Rusalimsky virus (en: Jerusalem virus) revealed in Єrusalim... Tsey shkіdliviy virus buv programming on vivid neglect files on Friday, the 13th.

Leaf fall: go virus SCA (en: SCA virus) for the hiding place PC Amiga viklikayuchi tsіlu hvylyu new viruses. With an unbeatable authorization to the virus, let the offensive, rampant shkidlivish virus be released. Byte bandit (en: Byte Bandit).

Breast: epіdemia of the hemlock chrobak Christmas tree". Hrobak of my spellings REXX, having worked at the middle of the VM / CMS and expanded in the stitches of BitNet, EARN, IBM Vnet.

1986 Ralph Burger and Bernd Fix presented viruses for IBM PC "Virus 1.1" and "Rush Hour" at the Chaos Computer Club conference at Gamburza.
1985 In 1985, Tom Neff ran all over the BBS list "The Dirty Dozen", in which the names of the files of the pirate and Trojan programs were pererakhovuvali.
1984

In the magazine Scientific american Oleksandr Dewdney at the column of Tsikaviy Komp'uter (Computer Recreations) publiku describe the gr Biy at the memory((Core War), in yak, yak i in gri Darwin program to fight at the memory.

1983

Leaf fall: Student By Fred Coen (English Fred Cohen ) there is a demo virus written for VAX 11/750 under Unix keruvans. The idea of ​​the Bull was promoted by Fred Coen, and named by Len Addleman for the hour of the seminar with computer security.

Experiments were also carried out using the Tops-20, VMS and VM / 370 systems.

1982

Cherven: Programm to play at the 158th edition of the comix "The Uncanny X-Men".

Berezen: Sounds about experimenting with hogs in the Xerox laboratory at Palo Alto published in CACM ( John Shoch, Jon Hupp "The" Worm "Programs - Early Experience with Distributed Computation", Communications of the ACM, March 1982 Volume 25 Number 3, pp. 172-180 , ISSN 0001-0782 , Div. Xerox worm).

1981 Program Elk cloner (en: Elk Cloner), written by Richard Skrent ( Richard Skrenta) that Virus version 1,2,3, written by Joe Dellinger for DOS 3.3 PC Apple II, vvazayutsya first computer viruses... Offended by the programs, they also added an extension "in-the-wild" - they showed up on computers in a laboratory pose.
1980

Luti: Jürgen Kraus (Jürgen Kraus) student of the Dortmund University of Zahishchaє a diploma robot for programs that self-create ( "Selbstreproduktion bei programmen"), in which the butt of such programs is pointed.

At the Xerox Pre-Slavic Center in Palo Alto, John Shoch and Jon Hupp will conduct experiments with distributed calculations based on software chrobakiv (div. Xerox worm).

1977 Thomas J. Ryan published the novel "Youth Pi-1" ( The adlescence of p-1), one of the main heroes of the ІІ PI-1, є wormlike program, which works on IBM / 360 computers.
1975

John Walker, added by him earlier than Animal for Univac 1100/42 with Exec-8 keruvans with Pervade software.

Zvyazuvannya Animal / Pervade is a yak file worm.

John Branner"On the shock hvily" ( John Brunner "The Shockwave rider" , ISBN 0-345-32431-5), as for the program, which is shifted according to the hedge, the term worm is victorious.

1974 The HIPBOOT program is designed to update the locking sectors of disks in Nova computers, as the company has robbed Data General- One of the first bottles can be used. If the disk was inserted into the computer, the program was in control of the sector of all disks, when you insert the new disk into the disk drive on your computer, for the old PC, then the program was in control of all the locked sectors on your computer.
1973

(exact date unavailable) Bob Thomas with Bolt Beranek and Newman is writing a demo program to self-change Creeper, scho vikoristovu pіdsystem RSEXEC systems Tenex... Ray Tomlinson (Ray Thomlinson) is writing the Reaper program, as it moves along the line, as it is, as the Creeper, and as the Creeper launches, pinning him to the robot.

Have a fantastic movie Westworld term computer virus buv vikoristaniy for the designation of great programs, which can be used in the computer system.

1972 Published a fantastic novel Devida Gerrold(David Gerrold) "Koli Harley Bouv Rіk" ( “When H.A.R.L.I.E. Was One "), as described by worm-like programs.
1970

Chris Tavares robs the program bomb Cookie monster for IBM 2741 pid keruvannyam Multics... Through the special features of the implementation of Cookie Monster, it is often graciously removed the virus.

1966 Already after death John von Neumann(John von Neumann) Arthur Burks (Arthur Burks) Neumann, John von. Theory self-burning automatic . - M .: peace , 1971 . - s .382. / (Von Neumann, J., 1966, The Theory of Self-Reproducing Automata, A. Burks, ed., Univ. Of Illinois Press, Urbana, IL).
1961 The Bell Telephone Labaratories V.A. Vyssotsky, H. D. McIlroy and Robert Morris won Darwin, in a collection of assembler programs, called "organisms", they were entangled with a riddle about a computer and "fought" for resources.
1949 Chest: John von Neumann reads a series of lectures at the Universitat Ilinoisu "Theory and organization of folding automatics." Materials of the school and the first lectures of 1948-1952 rocks form the basis of the theory of self-created automatons

Otzhe, also antivirus? Feel like it’s a lot of great importance, that antivirus can be found to be a virus, so that by launching an antivirus program or a monitor, we can absolutely improve on those hopes. Such a thought is not called virna. On the right in the fact that antivirus is a chain of program, in a snazzy way, written by a professional. With the help of the programs, you will be able to learn and know if you do not have any viruses. Viruses that are not recognized by anti-tier detectors, please write if you have found any information and programs.

With such a rank, it is practically unwise to be 100% cleaned of viruses (it’s hard to rely on uvazi, how koristuvach winks about floppy disks with friends in іgry, and also disclaims information from other dzherels, for example, from a blanket). If you don’t enter the information into the computer, it’s not a matter of getting infected with a virus - it’s not the fault of being born.

Description of anti-viruses:

2.1. Eset (NOD32)

NOD 32 Antivirus System powered by Eset Software will secure a seamless hijacking of personal computers and corporate systems, such as handling Microsoft Windows 95/98 / ME / NT / 2000/2003 / XP, UNIX / Linux, Novell, MS DOS, as well as for mail servers Microsoft Exchange Server, Lotus Domino and інші. The head of the NOD32 th robot і repeatedly brought the ability to catch 100% viruses. Pratsyuvati is simpler with him. Includes 4 modules: Anti-Russian Monitor, Internet Traffic Monitor, Document Monitor MSOffice - capture from macroviruses and anti-virus scanner.


2.2. SymantecNortonAntivirus 2005

Symantec has released Norton AntiVirus ™ 2005 in one of the most popular anti-virus features in the world. The program will automatically see viruses, Internet servers and Trojan components, without the need to switch the code for the robot. The new Norton ™ Internet Worm Protection feature allows you to block a number of the most common and most insecure worms (for example, Blaster and Sasser) before the stench gets into your computer system. In addition, Norton AntiVirus can act as a "spygun" module and make it dirty, but not overwhelmed by its nature. Most of the English language.

2.3. Kaspersky Anti-Virus Personal

Vstanovlennya that vikoristannya Anti-virus Kaspersky Personal does not vykliche you have zhodnyh difficulties. Setting up programs is simpler for the opportunity to choose one of three values ​​for a friend: "maximum kill", "recommendation" and "maximum speed". Zavdyaki manual interface tsya program will become the best friend to navigate for inadequate computers.

In Kaspersky Anti-Virus Personal, there is a modern technology to capture all of the viruses, based on the principles of the heuristic analysis of another generation.

Dvohr_vnevy zahist to shit.

The program is an absolute leader for the retranslation of age groups. Kaspersky Anti-Virus detects viruses in archived and packed files of 700 formats, as well as files in ZIP, ARJ, CAB and RAR formats.

Renovation of the year. Tsіlodobova technical support

2.4. Dr.Web32 for Windows

Dr.Web32 for Win32 is available in two versions: with a graphical interface (DrWeb32W) and without a new one (DrWebWCL). Offense options accept the same set of parameters (keys) command line... For the option with a graphical interface, all adjustments can be displayed from the dialog panels, so you can ring up and down. At the same hour, the option without a graphical interface will require less resources.

2.5. Trend Micro PC-Cіlin Internet Security

Multiple viznavavshis to the finest corporate anti-virus software security.

Trend Micro PC-cillin Internet Security 2004 is a comprehensive, easy-to-use system that detects viruses, hacker attacks and other problems connected to the Internet.

The new function of the Network Virus Emergency Center will secure the best possible capture of the most common cut-and-dried viruses, so that they can continue to run. high shvidkistyu extended. It’s a function of vikoristovuyutsya for the constant increase of corystyvachіv about new sleepers of the hedgehogs and the transfer of the cichviruses themselves to the standard hedgehog sluice, if the stench gets infiltrated into your computer. With the detected activity of the fenestration viruses, the Internet Lock function can be automatically activated, which allows the virus to infect the computer and expand the distance in the fenestration.


2.6. NormanVirus Control

Norman Virus Control v5 - dovo capture koristuvachiv

Friendly interface, automation of robots - the axis of the main characteristics, attached to Norman Virus Control (NVC) v5, assigned for one corystuvach. The program is victorious, there are also components and a corporate version, in addition to the possibilities of managing the hem.

The unique technology of the Norman SandBox II preserves from new and not home computer viruses, worms and Trojans - the most popular types of batch viruses.

Electronic mail to be converted to viruses, persh no stink can be reached by mail screens, converting electronic mail to high-speed programs; conversion of files in real time mode;

2.7. CAT Quick Heal Anti-Virus 2005

QuickHeal is a tough one to optimize the scanning mechanism, which is simple. Win combinu dієvі and shvidki technologies, to guarantee the most beautiful owner from the current viruses.

features:

Reversing and cleansing the same infections personal computer before standing.

The technology of the worms spratsovuє in front of him, as the virus was consumed in the anti-virus base, and also successfully saw the changes that were destroyed by them.

Find out about all kinds of problems, go to the Internet, tobto: porn sites, spygun programs, hacker utilities, etc.

Scan and clean and come up and receive every item.

Quick update module Quickly and quickly take over your car from new viruses.

Perevirka stislikh files that stislikh vikonuvanikh files.

Integration zagist for MSOffice 2000 / XP.

Secure your personal computer from viruses, at that hour you will be shouting information on the Internet.

2.8. MicroWorld eScan AntiVirus for windows

Koristuvach can plan a change to the Supreme Court. Anti-virus monitor inverts on viruses in automatic mode in real time. Automatically updated. NetBIOS sewing system. 24 years and 7 days for a day without a desk. Interactive and telephone support.

2.9. Panda Titanium Antivirus 2004

TitaniumAntivirus 2004 quickly detects viruses, Trojans, worms, programs - "dzvonyuvachi", programs - "hot", high-quality ActiveX codes and non-secure Java applets. The technology of heuristic scanning allows new and unavoidable viruses to appear. The program includes tough tools for active search. TitaniumAntivirus 2004 is even more simple and easy in Vikoristanna: a new intuitively intelligent interface, it’s straight forward automatic update... So, if the computer is going to the Internet, TitaniumAntivirus 2004 will know that it has been corrupted by the update to the file of the viral databases, and it will start the virus before it detects the infection of the leaf.

Comparison of anti-virus programs

The table reveals the indicators of the indicator of the reliability of the latest anti-viruses. Yak vykhіdni danі bulya vikoristanі, the results of the revision of the reaction of the latest antiviruses on shkіdlіvі objects in the period from June 2006 to linen 2007.

Indicators of reliability of anti-viruses

Naymenuvannya
antivirus
Missed Viruses for the last period 2006 - 2007 years Missed
virus z
51 attacks
Yakness
antivirus
10.12 - 23.02 17.05 05.06 - 13.07 12.07 17.07 21.07 24-26.07 27.07 27.07 30.07 31.07 03.08
DrWeb 12 1 0 0 0 0 3 0 0 1 0 0 17 0,667
Kaspersky 11 1 3 1 0 0 2 1 0 0 1 1 21 0,588
AntiVir 13 1 2 0 2 1 0 0 1 0 1 1 22 0,569
Fortinet 14 1 0 0 2 2 1 0 1 1 1 1 23 0,549
Sophos 19 1 0 0 0 1 0 0 1 1 1 0 24 0,529
BitDefender 14 1 3 0 2 1 0 1 1 1 1 1 25 0,510
McAfee 19 0 1 0 2 2 0 0 1 1 0 1 27 0,471
Ikarus 19 1 1 0 2 1 1 0 1 0 1 0 27
eSafe 15 1 4 1 1 2 3 1 1 0 0 0 28 0,451
NOD32v2 16 1 4 0 2 1 0 1 1 1 1 1 29 0,431
CAT-QuickHeal 19 0 3 0 2 2 0 1 1 0 1 1 30 0,412
ClamAV 16 0 3 1 2 2 2 1 1 1 1 1 31 0,392
VBA32 18 0 4 0 1 1 2 1 1 1 1 1 31
Sunbelt 20 1 3 0 2 2 0 1 1 0 1 1 32 0,373
Norman 21 1 1 1 1 1 3 0 1 1 1 0 32
F-Prot 16 1 4 1 2 2 3 1 1 1 1 1 33 0,353
Microsoft 26 1 1 0 0 1 0 0 1 1 1 1 33
Panda 19 1 4 0 2 2 1 1 1 0 1 1 33
Authentium 16 1 4 1 2 2 3 1 1 1 1 1 34 0,333
AVG 18 1 4 0 2 2 2 1 1 1 1 1 34

For the better time in this given test, having taken over Kaspersky Anti-Virus, 17% of the detected viruses will be meritorious for a new rating. In addition, Kaspersky, AntiVir, Fortinet, as they seeded to each other, the third and fourth place, apparently, so the very result of the detection is likely to fail.

Visnovok

You can go to the big story, but the computer virus - the whole computer virus is specially written for a small size of the program, as you can “assign” to yourself some of the programs, and to see the new ones on the computer. The program, all the way to revenge the virus, is called "infected". If such a program is started to the robot, the control unit will be removed from the virus. The virus knows that it "infects" other programs, as well as the one that "infects" the programs (for example, the file can be filed or the table of file distribution on the disk, I will "pick up" the operative memory only). Virus is a program that can be good for self-development. Such a state of affairs is a single power, power for all types of viruses. Virus cannot be borne by the "new isolation". This means that it’s impossible to detect this virus, since it’s not possible to check the code of their programs, information about the file structure, or just find the names of their programs. The reason for this is that the virus is guilty of a way to prevent the transfer of control.

By ourselves in an efficient way To retrieve the information from the computer viruses without entering the information into the computer call. Alas, it's a pity, it's practically unwise to clean up 100% of viruses (in May, on uvaz, I’m talking about floppy disks with friends in іgry, and I’ll also discard information from other dzherels, for example, from a blanket).

List of Literature

1) http://virusy.org.ru/10.html

2)

3) http://ua.wikipedia.org/wiki/%D0%9A%D0%BE%D0%BC%D0%BF%D1%8C%D1%8E%D1%82%D0%B5%D1%80%D0 % BD% D1% 8B% D0% B9_% D0% B2% D0% B8% D1% 80% D1% 83% D1% 81 # .D0.A1.D0.BC ._. D1.82.D0.B0. D0.BA.D0.B6.D0.B5

4) http://ap-ple.ru/shareware.html

5) http://www.computer-mus.ru/polimosfikwisusj.html

6) http://www.glossary.ru/cgi-bin/gl_sch2.cgi?RKusv 8ylwt: l! iowzx

7) http://www.sitysoft.com/modules/articles/item.php?itemid=17

8) http://www.topreferats.ru/comp/6636.html

Federal State Educational Institution of Higher Professional Education "Saratov State Agrarian University of Name M.I. Vavilov"

Topic: Computer viruses and anti-virus programs

1st year student

Absentee Viddilennya

Specialty: land cadastre

Denis Oleksandrovich Yrmachkov

Vikladach: Gamanyuk Mikola Grigorovich

Saratov 2010 r.

1. Understanding the "computer virus" of that power

Computer virus - the most demanding self-reliance software code... You can get access to the viconuvana and command files of the programs, expanding through the enchanted sectors of floppy disks and hard disks, documents of official programs, through e-mail, Web-sites, and other electronic channels. Having penetrated into the computer system, the virus can be surrounded by innocent visual or sound effects, or it can be lost or lost due to the data, the vitality of a special and confidential information. In the middle of the fall computer system attacked by a virus

(Virus - lat.) - The type of program, which is characterized by the building of self-propagated self-propagation types of koristuvach for the training of other programs, computers or fiddles.

The main group of viruses is made up of students and schoolchildren who have learned the assembler's language, want to try their strength. Significant part of such viruses is often not spread by the authors.

Another group is also composed of young people (often students), who have not yet opted for the mystery of the program, but have also violated the writing of this extended version. As a rule, there is a stench of numerical modifications of "classic" viruses, for example, in the provinces of primitiveness and with a great number of pardons. View of the constructors of the viruses, for the help of which it is possible to create new viruses for the minimum knowledge about the operating system and the assembler, meaningfully liable to the robot.

Having become a senior and adolescent, a lot of those from some of the viruses described you to the third, the most secure group, as the opening and launching of the light "professional" viruses. Well thought out and superb programs. Such viruses are often viciously processed by the original algorithms, undocumented and few people see the way of penetration into the system areas of the data.

The fourth group of authors of the viruses is the "pre-dwellers". The whole group is stocked with talented programs, which are engaged in the wine route of new methods of infection, prikhovannya, anti-virus anti-viruses, etc. Stink and see the methods of implementation in new operating systems, architecture of viruses and polymorphic generators. The program to write viruses will not overtake viruses, but sooner overheard the "preliminaries" of the potential of "computer virology".

When a computer is infected with a virus, it is important to show up, the main signs of the nobility show:

Pinning the robot or the wrong robot programs that have been successfully used before;

Power of a computer robot;

The inability to secure the operating system;

Knowing the files and catalogs or making a difference;

Date and time of file modification;

Change of file size;

There are no more files on the disk;

Quite a change in the size of the operational memory;

Vivedennya on the screen of non-transferable images;

Submission of sound signals;

Parts of freezing and malfunctioning in a computer's robot.

It means that it is not necessary to get rid of the presence of the virus, but there may be a lot of reasons. This makes it difficult to correctly diagnose the computer's camp. It is possible to become infected with a computer virus from even more intercourse groups of viruses. Tse:

Launching on a computer with a program infected with a virus;

Connecting to the system driver;

The display of a document infected with a macro virus;

Installed on computers of the computerized operating system.

The computer cannot be infected, when:

Texts and graphic files were rewritten in new (for a vignette of files, which transmits the display of macros);

On a new one, a copy was carried out from one floppy disk to the other for the reason that the file from the floppy disks was not started;

On the computer, the processing of the imported text and graphic files, files of data and information files is carried out (for a vignette of files, which transfer the display of macros);

Rewriting a file infected with a virus on a computer also means an infection with a virus. If an infected program is detected, it is necessary either to run the infected program, or to enable the driver for infection, or to display the infection document (or, of course, to login from the infected diskette). For some reason, you can infect your computer only in the same way, if you run on a new non-revised program and (or) software products, install a non-revised driver and (or) an operating system, get a document for an unreconfigured system. ...

2. Classification of computer viruses

On this year, tens of thousands of children have been seen. Unimportant on such prosperity, there are a number of types of viruses, which are derived from one mechanism, which is extended by the principle of the other, which is even circumscribed. There are various types of viruses that can be brought in one hour to several types. In such a rank, viruses can be classified for such signs:

Living room;

the method of contamination of the dovkill;

Steps injected;

Features of the algorithm.

1. Falsely from dovkilla virus to:

1) hedgehogs - expandable by different computer headers;

2) files - files from razshennyam.com, .exe, rіdshe.sys or overlays modules .exe files. Try to finish writing your copy on the ear, in the middle, or to finish the file and change it in such a rank, so that you can correct the control. Having removed the control, the virus can infect other programs, penetrate the computer's memory, etc. Deyakі z cich viruses do not think about saving the file, how to get infected, as a result of which the file appears to be unreceptive and not to be updated;

3) zavanazuvalny - to recognize the management at the stage of the computer's initialization before the ear of the OS is closed. For an hour, an infected diskette or a hard disk is infected with an infected virus, and a corrupted record BR will be replaced, or a master encrypted record with an MBR. When a cobbled computer is locked, the BIOS reads an encrypted write from the disk of a floppy disk, the result of the virus will be able to control it until the OS is locked. We can copy it to the end of the operative memory and switch over to the BIOS functions. For example, the procedure for the infected virus will be locked to the computer's riddle, the information lock-in sector is transferred and the control is transferred to the computer. Let everything be seen, as if it were, ale virus was already in the memory and could be controlled by the robot of all driver programs;

4) file-entangled - combinated viruses to share the power of file and entangled. Yak the butt can be extended with the file-locking virus OneHalf. Penetrating into a computer from MS-DOS OS, the virus infects the head record. Pid hour zavanazhennya virus step by step cipher sector of hard disk, fixing the remaining sectors. Virus OneHalf is a vicarious development of masking mechanisms.

2. For the method of infection viruses are sent to:

1) resident - when the computer is infected (information), it stores its resident part in the operating memory, so that the operating system is overwhelmed until it becomes infected (files, which are used to keep the sectors) in them. p align = "justify"> The resident viruses are located in the memory and they must be active until the computer is opened or re-installed;

2) non-resident viruses do not infect the computer's memory and є actively interconnect for an hour.

3. For steps into the stream viruses can be distributed to:

1) it is safe, it does not affect the computer's robots, it does not change much of the operational memory and memory on the disks, even if such viruses appear in any graphic or sound effects;

2) not safe viruses, which can cause damage to the robotic computer;

3) it is especially not safe, which can lead to the loss of programs, depletion of tributes, erasing of information in the system areas of the disk.

4. For features of the algorithm:

The great versatility of the viruses of the victories is difficult in the current classification for this acquaintance.

2) invisible viruses (stealth-viruses) - get comfortable with your presence at the computer. Smell there is a resident module, which is constantly being transferred to the operating memory of the computer. The whole module is transferred to the disk system of the computer. If the operating system reads the file with infected programs, then the virus will provide information about the file that is not infected with the programs. For this, the resident module can see the virus from an infected file for hours. When the robot finishes the file, it becomes infected again. Zavanazhuvalny stealth-viruses play for this very scheme. If the program reads data from the entailing sector, replace the infected one with the help of entailing sector.

3) macro viruses. Files of documents in Microsoft Office can be a mystery of small programs for processing of documents, stored in my Visual Basic for Applications. There are Access data bases and Power Point presentation files. Such programs run from macro commands, so viruses that live in official documents are called macro commands. Macro-commands are distributed all at once from document files. In order to infect a computer with such a virus, it is enough just to open the document file from the current program. The widest type of viruses in the significant world with the popularity of Microsoft Office. The stench can be infected with documents, if they are not remembered for the next hour.

: learn about viruses from the understanding of viruses, anti-virus program, types of viruses, modern anti-viruses, and ways to fight against viruses.

  • Razvivayucha:
  • development of my thoughts in discussion, computer literacy, educational activity.
  • Vikhovna:
  • vikhovuvati respect, neatness, thrifty delivery to the PZ and PC.

    Possession:

    • Computer class
    • Projector
    • Security software: electronic lecture ( Dodatok 1), Microsoft Power Point, Microsoft Excel, Microsoft Security, Avast
    • Flash card infected with a virus
    • Tokens with numbers

    Literature:

    • N. D. Ugrinovich Computer Science. Basic course 7th class Moscow, BINOM, 2005
    • www.metod-kopilka.ru (presentation of the teacher Zhuravlyov A.A. MBOU ZOSH № 3 m. Donetsk)
    • http://ua.wikipedia.org/
    • http://www.ctspi.ru/
    • http://informatika.sch880.ru/
    • http://www.leon4ik.com (cartoon)
    • Verbal (lecture, talk-discussion).
    • Onochny (electronic presentation, look around the anti-Russian).
    • Igrove (study of studies on the topic)

    Go to lesson

    1. Organizational moment

    2. Introduction of new material (electronic presentation).

    1.Historical views

    The first virus infection became fatal in the United States in 1986. Virus on im'ya "Brain" (brain) infecting floppy disks, opening it by Pakistani programmer Alvi. The US has lost the virus by defeating 18 thousand PCs.

    If the viruses felt like they were breaking up, then they were repeating their pre-old character, but in a step-by-step manner they transformed themselves to the best of the way.

    2. What are the computers viruses?

    Computers viruses - the program is well written, as you can multiply, copy yourself, just go to the other programs and it is inconceivable for those who do not know how to use the code from the document file, Web-based news on the Internet.

    3. Signs of the appearance of viruses

    1. Pinned or wrong robot programs, which functioned earlier.
    2. Robot PC
    3. Unwanted OS
    4. Knowing the files and folders or creating the file vmistu.

    4. What is the incompatible computer virus?

    If a virus is infected with a PC, you can activate (or prokunyutsya) and share your school life.

    Activation of the virus can be tied with yakimis podіy; (for example):

    • The approach of the singing date
    • Launching programs
    • Document display

    5. See computers viruses

    Computers are viral to develop beyond the middle of living and behind the step in the flow.

    Behind the "step into the stream"

    • Safe
    - As a rule, tsі viruses clog the memory of the computer with the way of their own multiplication and can organize other caposti - I’ll add a melody to them or show a picture;
  • Nebezpechny
  • - tsі virusi zdatnі otriti deyakі damages at funcіonuvannі PC - zboyi, re-zapping, freezing of PC, the main robot of the computer is too small;
  • Even better
  • - unsafe viruses can destroy programs, erase important data, drive in the enchanting system areas of the hard disk, which can be vicious.

    Computer viruses in the middle

    • File viruses
    vprovadzhuyutsya at the programs and to be active at їх launch. If you run an infected program, you can infect your files until the computer is opened or the operating system is re-enabled .
  • Macroviruses -
  • Infection is displayed when a document file is displayed in a program that does not have the ability to display macros (macros).
  • Merezhevі viruses
  • You can transfer your program code to computer fences and run it on computers connected to a complete framing. Infected with a low-grade virus can become an hour of robots by electronic means, or during the "rise in prices" to All-round pavutinny.

    6. Tsereba nobility

    As soon as you go to the site you have, it seems that your computer has been infected with one or more anti-virus viruses, do not keep up with the proprietary translation of your computer and installed for cyclical purposes with a hostless program. We have added an extended version of the so-called rogueware, hibny antivirus, how to pay pennies for a paid version, a little bit of antivirus protection. If you just wait with such an installation, the program will work on your computer, if you will continue to block and understand viruses, show your goodness. In reality, the program does not spoil anything, but just a kind of screen about the viruses and suggestions to buy a paid version. As a result of Symantec's data, the United States already has dozens of millions of computers, with 250 versions of such popular anti-virus programs installed.

    7. Not safe viruses

    I wouldn’t be safe to set up postal stock viruses, which are distributed on computer stocks at attachments at the postal file. Activation of the postal virus and the infection of the computer can be seen before the hour of looking at the electronic mail.

    Display of computer viruses (look at 11 slides).

    8. The All-Sunday Epidemic infection with the post-production virus has fallen into disrepair 5 May 2000 rock, if dozens of millions of computers, connected to the Internet, were sent by mail according to the adorable name I LOVE YOU... As a matter of fact, the file attachments were replaced by a virus. For this purpose, after reading the news, the virus infecting the computer and repairing the problem file system.

    9. How can you protect yourself from viruses?

    Because of the proactive search for all computer viruses, it is not recommended to launch programs, to display documents and information about electronic mail, to discard from the most common jerels and, in the meantime, not to be modified by anti-virus programs.

    10. Anti-virus programs

    The most effective anti-virus programs for dealing with computer viruses. Anti-virus programs will permanently update lists of types of viruses, which include the name of the virus and the software code.

    If the anti-virus program detects the program code of the virus from any file, then the file becomes infected with the virus and “lykuvannyu”, so that the program code of the virus can be seen.

    If you are not happy, then the file will be seen again

    11. The process of virus infection and file recovery. (Look at slides 16-17)

    12. Anti-virus programs

    • Anti-virus scanners
    , as for the launch, the files are inverted and the operative memory for the manifestation of viruses and will not be able to neutralize them.
  • Anti-virus "guards"
  • (monitor) is permanently located in the operative memory of the computer so that the conversion of files in the process is locked into the operative memory.

    Most effective anti-virus programs for dealing with computer viruses:

    • Kaspersky Lab Anti-Virus
    • Doctor Web
    • NOD 32
    • AVAST
    • Microsoft Security
    • Avira

    13. Most popular viruses of the last season. (slide 20) (Before the lesson, it is necessary to update the tsі danі.)

    3. Conversation-discussion with scholars

    1. Yak you vvazhaєte, who are you most likely to open computers viruses?
    2. What is more beautiful: the anti-virus in the Internet and the licensed anti-virus?

    (Kozhen uchen is guilty of hanging his hypothesis and reaching his point of view)

    4. Review and analysis of antivirus Microsoft Security and Avast. Lіkuvannya flash cards for additional antivirus Microsoft Security.

    5. The lesson is held at the form "Vryatuєmo computer from viruses"

    Scientists will receive power for 6 power. For the skin, it is correct to read the token with the number, if it is not correct, then the token cannot be seen. Take off the tokens of the scholarly responsible for the code, enter it into the computer (in front of the opening of the sheet in the Microsoft Excel ( Dodatok 2)).

    Power supply:

    1. To what fate did the virus become infected? (token 6)
    2. What fate did the virus get infected with? (Token 2)
    3. Yak named the first computer virus? (Token 3)
    4. What is the best way to fight against viruses that are most effective? (Token 5)
    5. See viruses (token 1)
    6. See antivirus (token 4)

    Home zavdannya

    p. 1.7, records at Zoshiti

    For a lesson, the scholars will learn to marvel at the cartoon Thunderstorm (24 series) from the Chomuchka cycle.

    Computer virus - it is specially written, small for the size of the program, as you can "assign" to oneself up to the other programs for displaying whether they are shkіdlivnyh dіy - psuє files, I will notice the operative memory, etc.

    I have a lot of young viruses. It is cleverly possible to classify it like this:

    1) BOOT viruses infect boot sectors of disks. Even more importantly, you can completely lose all information, so that it can be saved on disk;

    2) files and viruses infect files. Submit to:

    viruses that infect programs (files with extensions .EXE and .COM);

    Macrovirus viruses that infect data files, for example Word documents or Excel workbooks;

    Viruses-supporters viciousness of the name of their files;

    viruses of the DIR family create system information about file structures;

    3) enforced-file-viruses of the enemy, such as the boot-sector code, and the file-code code;

    4) invisible viruses, or STEALTH-viruses falsify information, I will read from the disk in such a way that the program, which is designated as information, will neglect the neuron data. This technology, as it is called Stealth technology, can be used as in BOOT viruses, as in file viruses;

    5) infect retroviruses with anti-virus programs, if they are damaged or not;

    6) viruses-hrobaki will not be aware of a small number of e-mail messages, as the title is called, as for its own sutta є the Web-address is the location of the virus itself. When you try to read it, you will be able to repair it through globally The Internet has its own "tilo" and when it is blocked by an initiative, it is destructive. It’s even more important, because it’s even more important to see if a file is infected.

    It’s not possible to live in for the capture of all computer viruses, the inheritance of the infection can be even more serious. In the Low Countries, criminal legislation is passed on the transfer of evidence for computers of malignancy, and for the growth of evidence for viruses. For the retrieval of information from viruses, you can use the software in the background.

    Prior to the programmatic input, I will introduce new anti-virus programs (anti-virus). Antivirus is the whole program, which shows that foreign computers are viruses. It means that you have violated anti-virus programs in your development, so there is no 100% guarantee of security if you regularly use anti-viruses. Anti-virus programs can emerge and reduce the risk of seeing viruses, with the appearance of a new computer virus. However, a lot of current anti-virus packages may have a special software module in their warehouse, which is called a heuristic analyzer, which is readily readable instead of files in response to the code typical for computer viruses. So yes, you can quickly emerge and talk about the security of the new virus.


    The following types of anti-virus programs are developed:

    1) programs-detectors: signs for the known infection of files in one of the types of viruses. Deyakі programs-detectors can also pick up files from viruses in order to know the infected files. Check specials, so that detectors and polyphages can be used to fight against one virus;

    2) programs-licars: designations for detecting infected disks and programs. Lіkuvannya programs polagє in viluchennі from infected programs tіla virus. It can be either polyphagous or special;

    3) revision programs: the detection of virus-infected files, and the retrieval of new files. The program will memorize the data about the program and the system areas of the disks in the normal mill (before the infection) and the process of the data in the process of the computer's robots. In cases where there is no evidence of infection, there is a possibility of infection;

    4) Likari-revizori: the designation for detecting changes in files and system areas of disks and, in case of changes, to rotate them in the cob.

    5) program-filters: signs for overcrowding animals to the operational system, such as vikoristovuyutsya viruses for propagation and thus about the corystuvach. A coristvach can allow you to fence in a general operation. Such programs are resident, so that they work at the operational memory of the computer.

    6) program-vaccines: to process files and boot-sectors to prevent infection with viruses (for the most part, the method is used more and more often).

    Power supply for self-control.

    1. What is the same program?

    2. It is included in the witness " programmatically secure"?

    3. Name and characterize the main categories of software security.

    4. Who has a sense of application programs from system and instrumental?

    5. What to enter before the system software security?

    6. Who has the operating system?

    7. Describe the main classes of operating systems.

    8. Describe the installation of the operating system in the memory of the computer.

    9. What is the file?

    10. How is the file system organized?

    11. What module of the operating system and file service?

    12. To guide the butt of the hierarchical file structure.

    13. What is the basic input-to-output system (BIOS) and in any memory distribution?

    14. Which main modules are stored in the MS-DOS operating system?

    15. Name the main versions of the utility and give them a short description.

    16. What is the Norton Commander software suite for?

    17. Yaky viglyad to the interface that is great for a koristuvach - is it a commanding one?

    18. Why is Norton Commander so popular?

    19. What kind of computer viruses do they have?

    20. How do you know how to deal with computer viruses?

    21. Who has the essence of the process of compressed information?

    22. Describe the main features of Windows-NT and Windows 95 operating systems.

    23. So also OLE technology?

    1. So also OLE-object, OLE-server, OLE-client?
    2. In what ways is it possible to prod uvadzhuvati that po'vyazuvat znіshnі ob'єkti with the document-priymach?
    3. Pererahayte that characterize the way of linking the OLE-server object with the document-acceptance.
    4. Comparison of methods of storage and connection of objects.
    5. As the world adopts OLE technology Windows programs? Hover butt.
    6. What are the possibilities of OLE technology?
    7. Yakim є the characteristic of Windows service programs?
    8. How do I access Windows service programs?
    9. Why should the ScanDisk program be victorious?
    10. What are the options for standard and general conversion with ScanDisk programs?
    11. How often do you carry out a standard rewiring of your hard drive?
    12. Yakim є the definition of a disk defragmentation program?
    13. What about disk defragmentation?
    14. What is the format of the discs? Do any vipads go in to the format?
    15. Yak vikonati formatuvannya disk?

    39. What are the special features of the quick and easy format of discs?

    1. Who are the archives? What software do they call architects?
    2. Why are the methods of squeezing, for which money is received in the place of the tribute, called non-gate?
    3. To guide the butt of the formats with the help of the waste of information.
    4. Who has a polyagaє perevaga of werewolf methods of squeezing over non-vortexes? And what about the failure?

    44. What is the lack of debris between the efficiency of the squeezing and the effective method of squeezing?

    1. So also a computer virus?
    2. Does the Yak virus infect a computer?
    3. Yak dyut computers viruses?
    4. Do you know Dzherela infected with a computer virus?
    5. For what signs can you know the fact of being infected with a computer virus?
    6. Do you know tipi viruses? What destructive things are you good at?
    7. Do you live to get infected with a computer virus?
    8. What is anti-virus too? Do you know what type of anti-virus?
    9. So also a heuristic analyzer? What are the functions of the vicon?

    LECTURE 5. TEXT EDITOR WORD. [:]

    Text processor Word є a popular way to edit text documents That comes before the Microsoft Office suite. The main elements of the Word window are shown by a small one. As you can see the panels of the formatting and the other elements of the window, the appearance between the areas of the text, the sign of the end of the paragraph, begins by the clerk himself, which can be the only ones, or they are visible.

    The text that is included in the Word processor is called a document. Documents can be saved in different formats, however, the main one is the "Word Document" format, in which name the file is automatically expanded ..doc. Word allows you to check the folding of the formatting of texts, create, insert that redaction of the little ones and tables, write down the mathematical formulas, reverse the spelling of the text, insert the worm and the big amount of the documents for the editing. For the automation of repeated Word operations, I have introduced a system for automatic recording of macros, which is done with my Word Basic program.

    formulate an understanding of the computer virus; learn about the types and types of viruses, pathways infected with PC viruses and the main methods of fighting viruses;

    Kichkina Marina Petrivna, 10.09.2017

    1210 167

    Вміст rozrobki

    Group No. 1

    Computer virus

    ______

    ________________________________________________________________________________________

    Warmaker - ____________________________________________________________________________

    ________________________________________________________________________________________

    ________________________________________________________________________________________

    Three axioms of a computer virus:

    Perche, viruses _______________________________________________________________________

    ______________________________________________________________________________________________

    In a different way: virus is not ______________________________________________________________________

    ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

    Third: computers viruses infect a computer __________________________________

    At Viruses 3 stepsдії:

    1.____________________________(____________________________________________);

    2._____________________________(______________________________________________________________________________________________________________________);

    3 .______________________________ (if there are enough copies of the software virus, it will fix it, it will fix the robotic OS program, see the information on the hard disk, the best will fix it. format disk).

    Deyaki viruses can __________________________________________________________________

    ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

    Вміст rozrobki

    Group No. 2

    Classification of school programs(computer viruses):

    1.in the middle of your stay


    2. by way of infection

    1.Resident -__________________________________________________________________________
    ________________________________________________________________________________________
    ________________________________________________________________________________________

    2.Non-resident --________________________________________________________________________

    ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

    3. behind the step into the inflow:


    4.

      Nayprostishі - _____________________________________________________________________

    ______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

      Virusi-replicatori (hrobaki) - _______________________________________________________

    __________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

      Invisible viruses (stealth-viruses) -___________________________________________________

    __________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

      Virusi-mutanti –_____________________________________________________________

    __________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

      Quasiviruses ("Trojan" programs) - _________________________________________

    __________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

    Вміст rozrobki

    Group No. 3

      __________________________________________________________________________________

      __________________________________________________________________________________

      __________________________________________________________________________________

      __________________________________________________________________________________

      __________________________________________________________________________________

      __________________________________________________________________________________

      __________________________________________________________________________________

      __________________________________________________________________________________

      __________________________________________________________________________________

      __________________________________________________________________________________

      __________________________________________________________________________________

      __________________________________________________________________________________

      __________________________________________________________________________________

      I have accumulated knowledge,

      _________________________________________________________________________________

    ra.

      connect the computer to the local network and the Internet, where are the connections before them;

      emergency engagement Windows ;

      __________________________________________________________________________



    Вміст rozrobki

    Group No. 4

    Anti-virus programs - _________________________________________________________

    __________________________________________________________________________________________________________________________________________________________________________

      watchman chi detector –_______________________________________________
      ____________________________________________________________________________

      _____________________– the signs for the emergence of that usunennya vіdomіvіvіrіvіv, vіdalyayuchi іх іf thіl programs аnd wіll be thrown її at the wihіdniy countries. Nybіlsh vіdomimi representatives є Dr.Web, Aids Test, Norton Anti Virus.

      _______________________ - the stench controls the urgency of the most attacked computer components, the memory of the service areas and the files is lost, and the development of changes will cause the attackers.

      - Permanently perebuyut at the memory of the computer for detecting a test of unauthorized actions. In case of development of suspicion of development, there will be power supply for confirmation of operations.

      vaccines–__________________________________________________________________

    ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

      Norton Antivirus (Symantec),

      Vims Scan (McAfee),

      AntiVirus (IBM),

      Kaspersky Lab

    Yak will be hunted from viruses

    __________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

    ___________________________________________________________________________

    Вміст rozrobki

    Pidsumkovy synopsis

    Computer virus The program is straightforward, but it automatically assigns itself to the other software products, changing or lowering them.

    Warmaker - lyudin, yaka "write" virusi .

    Persistently uncontrolled expansion of the virus in the net of the emerging - 2 leaf fall 1988 rock.

    Three axioms of a computer virus:

    Perche, viruses do not recognize themselves- іх open up the trash of the hacker software і distribute on the basis of the transmissions or download them on the computers known to them.

    In a different way: virus cannot log into your computer by itself- either they were sent on floppy disks or browsed on a CD, or they were hooked up from a computer net, or the virus is alive on your computer from the very cob, or (most of all) the programmer-hacker is alive at your house.

    By tertє: computers viruses infect a computerand nothing more, that does not need to be afraid - through the keyboard that Misha will not transmit the stench.

    It is necessary for the nobility, who should not be built from the viruses to be able to drive the computer. The maximum, on a very high level of viruses, is information on the hard disk, which is produced before the OS is updated. If you want to get around the wrong situation, it can be fatal for you, as it is a virus to inform important documents.

    At Viruses 3 stepsдії:

    1. Infected (drinking to the computer);

    2. Breeding (You can customize the code for yourself in all programs);

    3. Virusna attack (If there are enough copies of the software virus to fix it, it’s broken down to the robotic OS program, the information on the hard disk is seen, the best to run the virus on the hard drive format).

    Classification of school programs(computer viruses):

    1. in the middle of your stay


    2. by way of infection

      Resident - to work up to the operational memory of the computer, if you are in the memory, you can manifest your activity until the computer is re-enabled;

      Non-resident - there is no way to solve the riddle, and there is an hour, if you have been tied to the singers of the singers;


    3. behind the step into the inflow:

    4. for the peculiarities of the robot algorithm:

      Virusi-replicatori (hrobaki)- expand with computer fences, count the addresses of fenced computers and write down your copy of the addresses;

      Invisible viruses (stealth viruses) - Even more importantly, the odor of the stench will overwhelm the operation system before the files and sectors of the disks are defeated and replace their own type of uninfected disk;

      Virusi-mutanti - Revenge with encryption-encryption algorithms, making copies of one and the same virus do not lose the lance of bytes, which will be repeated;

      Quasiviruses ("Trojan" programs)- not built up to self-promotion, a little more not safe, oskilki masquerade for the program, run the enchanting sector and the file system of disks.

    Indirect signs of an infected computer:

      vivedennya on the screen of non-transferable occasion;

      submission of non-transmitting sound signals;

      Unable to open and close the tray CD / DVD ;

      reliable launch of any programs on computers;

      parts of the "freeze" and the wreckage of the robot computer;

      the basis of the computer's robot from the hour to start;

      zniknennya or change of files and folders;

      often burned to the hard drive.

      friends that know to talk about the rejection of all of you, since you did not overpower;

      Your postal screen will take revenge on a large number of cases without a headline address.

    The penetration of viruses on the computer:

      Global hedge Internet .

      Electronic mail.

      Local fancy.

      Computers "Zagalny Priznachennya".

      Pirateske program is secured.

      Repair robots.

      I have accumulated knowledge, on which files are infected with the virus.

      A hard disk, like having consumed a virus.

      Virus, who has been lost in the operative memory of the letter from the front man.

    Diy for the obvious signs of a computer infectedra.

      connect the computer to the local network and the Internet,
      where are the connections before them;

      as a symptom of an infected field ale logged in from the hard disk of the computer ter vidaє pompilka, if you turn it on) enlist in the mode of capturing from the wrongs or from the disk emergency engagement Windows ;

      run the anti-virus program


    Anti-virus programs values ​​for to prevent infection of the computer with a virus and liquidation of the inheritance of the infection.

    It is consistent with the principle of developing such anti-virus programs:

      watchman chi detectorSigns for detecting infected files in viruses, as well as indicating the potential for infection.

      lykaryaSigns for the emergence of that usunenny of all types of viruses, seeing them from their programs and turning them around the country. Nybilsh with our representatives є Dr . Web , AidsTest , Norton Anti Virus .

      revizoriThe stench controls the urgency of the most attacked components of the computer, the memory of the service areas and files is lost, and the development of changes will cause the corystuvache.

      resident monitors abo filterPermanently perebuyut at the memory of the computer to see if the victim of unsanctioned acts. In case of development of suspicion of development, there will be power supply for confirmation of operations.

      vaccinesFiles are infected with viruses. Virus is susceptible to infection, and it is not possible to get it. The most frequent vicarists are Aidstest Lozinsky, Drweb, Dr. Solomon.

    Sered anti-virus software products it is possible, for all intents and purposes, packages:

      Norton Antivirus (Symantec),

      Vims Scan (McAfee),

      Dr. Solomon AV Toolkit (S&S IntL),

      AntiVirus (IBM),

      InocuLAN (Computer Associates)

      Kaspersky Lab

    Yak will be hunted from viruses

      install an anti-virus program on your computer.

      before re-examining the information brought on a flash card (diskette) from your computer, change it with an antivirus;

      send the archived files to one at a time, convert them to viruses (not all anti-virus programs may have a shkidlivy code in archives, or it may not work correctly);

      periodically convert the computer to a virus (if you actively use the Internet - run it once a day, or even more often);

      more often than not backup copies important information (backup);

      use the antivirus software firewall as the computer is connected to the Internet;

      configure your browser (the program for viewing web sites - IE, Opera too) for the launch of active html-sites instead of running.

    Get ready for the project - please, dyakuyu!
    Read also
    How can I put the trellises in the iPhone? How can I put the trellises in the iPhone? Updating iOS in three different ways Updating iOS in three different ways Mode "Do not turbuwati" mode that silent mode in the iPhone "Do not turbuwati" at night