Tuesday, June 4, 2019
Antivirus Is Protective Software Computer Science Essay
Antivirus Is Protective Softw atomic number 18 Computer Science EssayAntivirus is protective softw atomic number 18 designed for protecting your computing machines system pine cell phones against Virus, trojan horses Hijackers etc. These save Viruses, Trojans Win32 etc argon called Malicious Software in computer world. All Antivirus software system run in the background at all times to protect defense your computers system smart cell phones to a greater extent or less antivirus are mechanically updated through lucre some antivirus are needs manual updated through meshing to protect your systems against Malicious software.IntroductionAntivirus software provides an m either essential layer for multitude of the Virus, win32, Trojans worm etc. The first document remotion of the computer viruses was written by Bernd Fix. there are two types antivirus application in the computer world so that the time of the Atari ST platform designed in 1987 the first one was G Data se cond was UVK 2000 made by Bernd Fix in 1987.The word Antivirus is come from the word Antibiotic which means implies invade with an invading force of the curriculums. Fred Cohen designed the strategies relative to an Antivirus software program in 1988 to solve the virus problems. The old previews years Antivirus software are not so good because those software only detected the Virus Spyware etc remove it from your computers system ravish your some run system files inside your computers now AntiVirus software oft better than old ones because it detected the virus remove it without deleting your operating system files inside your computers it also fight against new malevolent software which come from internet network. Well in the preview years Antivirus software are not completely free downloadable on the internet means you could only find some antivirus software with trial version now Antivirus software are completely free download without trial version . New Antivirus also checked the elect(postnominal) outgoing mail, email attachments etc. It also use up internet security for internet threats.Advantages and DisadvantagesAntivirus software is very useful in the preventing, controlling, virus many more viruses program, which endure damage the computers components from inside operating system files to.Antivirus software are apply for the methodologies for searching killing Viruses some of the well knows patterns of computer data programs.Antivirus programs are very effective against the viruses program, whose is the biggest threat for your computer systems.Antivirus program has some limitations drawbacks on the other hand, which effect on the computer system performance.In the computer world, young users can adopt many problems with the antivirus programs or software such as inabilities to understand, threats of the software success of the antivirus programs software are dependent on the ability of the user to understand Or knowing th e right kind of balance between the positives negatives things in the computer world.Antivirus software or programs can cause problems during the installation window in the computer system or upgrade the Windows Service packs in the computer system.Antivirus software can be hampered some few software programs because it utilise it own firewall to block application to store in the computer system. e.g. True Crypt.Some Antivirus program pull up stakes not knowing by the policy assessment before make it own policy when it install in the computer system.There are three major types of detection which is used to constitute the emf threats in the computer system such as Signature based, Heuristic based File emulation method.Signature based detectionIn this method, you can identify the viruses malware virus software. Antivirus software can also compare the content files of the computer system to dictionary files of virus signatures because viruses are embed into themselves in the f iles skeletal system or in pieces shape to infect the computers.Heuristic based detectionIn this method, you can only detect malicious activity relative to viruses identify unknown viruses in the computer system.File emulationIn this method, it has apply the heuristic type approach which it executing the program in a virtual(prenominal) environment which effect the action of the program performs it also carries out the disinfection actions relative to the programs which run in the computer.What is a Virus?Viruses are the category of malicious program code software, viruses are used for attempted to breach security value break them damage data of the computer system display unwelcome messages on the display screen when the antivirus program for gabbing user passwords on a networks are called LOGIN.EXE. These real LOGIN.EXE programs which have intruder or infect the user programs are called Trojan Horses when viruses program fall into the Trojans category than these viruses program have the ability to reproduce themselves again again until users computer systems slow down performance processing to any application it infected the your operating system.Why Do Viruses Exist?Now-a-days every computer virus programs are written by someone who cute it to infect damage other peoples computer systems smart cell phones our world. So these Viruses program coding pass from computer to other computers system these viruses may be not have direct effect on the some computers but it affects on the other resources same(p)(Disk space Memory) thats why these viruses are harmful it coding are very complex it also contain some serious bugs which damages the computer system pretty badly.How do I know if I have a virus want to protect my computer systems?If the someone computer systems are very running slower, freezing it displaying error messages again again than you should have the viruses in yours computers or operating system than u must install Antiviru s software behold your computer system with latest internet updated of the Antivirus programs security to agnize your computer with viruses.How did I get this horrible viruses on my computer system or operating system?Computer systems can be infected by viruses becauseUser using the Internet without having the latest updates of the Antivirus programs security installed into your operating system.User using the Internet without having a working firewall on the operating system or Antivirus software.User who opening the email attachments without knowing that whos will send him or her.User visiting unreliable website pages than viruses automatically stored into your computer because these website pages contains the infected viruses programs.How do I get rid of the virus?To get rid of the Viruses you should used latest Antivirus software or latest Antivirus program security updates now-a-days many new Antivirus software are able on the Internet free cost with one yeas updates free e .g. Norton Antivirus, McAfee Antivirus Kaspersky Antivirus etc.What are types of Virus in the computer world?There are several types of viruses in the world which your computers your operating systems for examples Worms, Trojan horses, Logic bombs, Mutated viruses, Polymorphic viruses, Bounty hunters, Boot sector viruses Macro viruses etc.WormsWorms Viruses are used to spread everyplace a network of the internet hacks the computer system or operating system which connects with internet networks.Trojan horsesTrojans viruses are used to build a security hole in the computer programs or operating system infected the system files inside.Logic bombsLogic bombs viruses are used to offset the specific event means computer systems date programs of remote activation etc.Mutated virusesMutated viruses are used to rewritten by hacker users to change the behavior or signature of the programs made the five-fold versions of the same viruses that infected the computer programs or operat ing system. So these viruses are also called variants.Polymorphic virusesViruses which are used to automatically change their appearance, like a chameleon by giving the virus a signature of the programs in encrypt-decrypt function so virus can only be recognize its own signature of the program. This kind of virus is called Polymorphic viruses.Bounty huntersBounty hunters viruses are used to modify signature program stored by Antivirus program in order to render them inoperable in the operating system.Boot sector virusesA recoil sector viruses are used to infecting the boot sector of a hard drive of the computer system.(just like MBR Master boot record) it also have infected the go of the processer.Macro virusesViruses which came from email, email attachments etc to damage the operating system or hack the computer system.What is Firewall Spyware?FirewallFirewall is software or program which have security tool to help limit internet network traffic with hackers or viruses to getti ng in your computer system. Firewall helped protects your computer from future hackers new incoming viruses.SpywareSpyware are used to a multitude of malicious software programs which access your computer system. When Spyware viruses infect your computer system or operating system than it will slow down your operating system speed performance your computer system going to hang again again.Issues relative with the Antivirus softwareUnexpected renewal costsSome of the commercial antivirus software which includes end-user authorise agreements which effect on the subscription automatically renewed it, cost so much which you not expected.False positivesAntivirus software can used to identify non-malicious files which having the viruses so that it will be cause serious problems for the computer system because false positive make operating system files very unstable because of the viruses.System interoperability related issuesWhen the treble antivirus programs running on the compu ter or operating system than it will degrade the performance of the operating system create conflicts in every programs running on the operating system. So this plan is called Multiscanning If the functionality of the few software programs can be hampered by the active antivirus software on the operating system.EffectivenessThe effectualness of antivirus programs have been decreased in the previews year because of new good Antivirus software launch on the markets computer threat going dropped from 40-50% to 20-30% in this preview year.RootkitsRootkits are major challenge for antivirus programs on the operating system it had admin area access to the system to control, invisible hidden the EXE from the running processes of the task manager on the computer system.What is Cloud antivirus method?Cloud antivirus method is a technology that used the lightweight agent software to protect the computer system or operating system it also used for analysis the data with providers infras tructure. To implement this Cloud antivirus method we used the multiple antivirus engines which scanning suspicious files from the operating system this concept is called Cloud AV. Cloud AV was designed to send programs on the internet network where detection programs are used to improve the detection rates with multiple antivirus behavioral on the internet network.Online ScanningSome of the Antivirus provides maintain of websites with free online scanning on the internet with the entire computer such as like local disks, critical area files relative to the computer systems. Well as you know that internet becomes the vehicle for communication in this world people using digital communication on the internet with very fast speed scope so that new kinds of viruses are increasing spread all over the world of the internet network. If someone will not want to install antivirus on his or her computer than he or she can easily scan his or her computer online this is quickly possible s olution.What do u means by the bear rate death rate of the viruses?The Birth rate of the virusesThe birth rate of the viruses depends upon the one infected computer system or operating system which can spread this infection to other computer system or operating system.The Death rate of the virusesThe death rates of the viruses depend upon the infection found on the computer system or operating system undo that computer system.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.