Network Virus are programs designed to destroy or hamper some function of the computer. By doing this they either destroy information or slow down processing capabilities of the computer system. In recent years they have also had a destructive presence on computer networks and on the internet.
Many people do not understand what is a computer virus? In computing terminology it is a self replicating/self producing automated program. This program spreads by inserting itself into executable code or documents that are present on the computer system. This process of insertion of a virus is called infection. The file into which the code is inserted is called an infected file. Each file has an extension; document files have 'doc' as an extension. The files that are infected the most are executable files which have extensions 'exe' and 'com'. Presently any file in which there is some programming capability is infected. There is a wide list of files that can be infected. A biological virus can be contracted only when you come into contact with it similarly a computer virus is spread if your computer gets into contact with any infected file. By now you might know; when is a computer subject to infection by a virus. But are still curious about the various other terms like Trojans, worms and malware(malicious software). Malware is a more broad term. If you still are confused as to what is computer virus just remember computer virus can only affect software and cannot damage hardware. That's why I do not use my PC too often. With a best laptop in my hand, i can easily install any software wherever I want to.
TABLE OF CONTENTS
TABLE OF CONTENTS
1.1 STATEMENT OF THE PROBLEM
1.2 PURPOSE OF THE STUDY
1.4 DEFINITION OF TERMS
1.5 ASSUMPTION OF THE STUDY
2.0 LITERATURE REVIEW
History of Viruses
2.1 GETTING VIRUS ALERTS TO PREVENT HARMFUL VIRUSES FROM DESTROYING YOUR PC
2.2 ARE SECURITY ALERTS EFFECTIVE?
2.3 WHICH COMPANIES RESPOND FIRST TO NEW VIRUS ALERTS DISCOVERIES?
2.4 HOW CAN I GET REGULAR SECURITY ALERTS?
2.5 SO WHAT HAPPENS IF I GET AN ALERT? WILL MY ANTIVIRUS SOFTWARE FIX IT OR DO I NEED A PATCH?
3.0 NETWORK VIRUS CREATION
3.1 MEANS OF INFECTION
3.2 REMOVAL OF COMPUTER WORMS
4.0 NETWORK VIRUS PREVENTION
4.1 VIRUS IDENTIFICATION PATTERNS
4.3 ROOTKIT DETECTION
5.1 LIMITATION OF THE STUDY
5.2 SUGGESTION FOR FURTHER RESEARCH
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2012, 11). Network Virus: Creation And Prevention.. ProjectStoc.com. Retrieved 11, 2012, from https://projectstoc.com/read/270/network-virus-creation-and-prevention
"Network Virus: Creation And Prevention." ProjectStoc.com. 11 2012. 2012. 11 2012 <https://projectstoc.com/read/270/network-virus-creation-and-prevention>.
"Network Virus: Creation And Prevention.." ProjectStoc.com. ProjectStoc.com, 11 2012. Web. 11 2012. <https://projectstoc.com/read/270/network-virus-creation-and-prevention>.
"Network Virus: Creation And Prevention.." ProjectStoc.com. 11, 2012. Accessed 11, 2012. https://projectstoc.com/read/270/network-virus-creation-and-prevention.
- Related Works
- Design And Implementation Of An Online Shopping System
- E-mail Server Using Threaded Sockets
- Intrusion Detection In Wireless Ad Hoc Network
- Design And Implementation Of Online Public Share Offering Information System For Capital Market
- Design And Implementation Of A Computerized Procedure For Privatization Of A Corporate Enterprise (a Case Study Of Nitel Ltd Enugu)
- Design And Implementation Of Electronic Learning (e Learning) System For Nigeria Universities (case Study Of University Of Nigeria Nsukka)
- The Impact Of Computer Technology On Accounting System And Its Effect On Employment
- Location Aided Routing For Mobile Ad-hoc Networks (case Study Of Easy Link Cafee)
- Design And Implementation Of A Computerized Birth Registration Information System (a Case Study Of Unth Enugu)
- Statistical Techniques For Detecting Traffic Anomalies Through Packet Header Data