SlideShare a Scribd company logo
Yadav 1
Pahdi Yadav
Professor Milton
English 101
5 May 2008
Antivirus Programs
Today, people rely on computers to create, store, and manage critical
information, many times via a home computer network. Information transmitted over
networks has a higher degree of security risk than information kept in a user’s home or
company premises. Thus, it is crucial that they take measures to protect their computers
and data from loss, damage, and misuse resulting from computer security risks.
Antivirus programs are an effective way to protect a computer against viruses.
An antivirus program protects a computer against viruses by identifying and
removing any computer viruses found in memory, on storage media, or on incoming
files. When you purchase a new computer, it often includes antivirus software. Antivirus
programs work by scanning for programs that attempt to modify the boot program, the
operating system, and other programs that normally are read from but not modified. In
addition, many antivirus programs automatically scan files downloaded from the Web, e-
mail attachments, opened files, and all types of removable media inserted in the
computer (Karanos 201-205).
One technique that antivirus programs use to identify a virus is to look for virus
signatures, or virus definitions, which are known specific patterns of virus code.
According to Shelly and Cashman (Antivirus Programs), many vendors of antivirus
programs allow registered to update virus signature files automatically from the Web at
no cost for a specified time. Updating the antivirus
_________________
Buloswki points out that most antivirus program also protect against worms and
Trojan horses (55-61).
Yadav 2
program’s signature files regularly is important, because it will download any new virus
definition that have been added since the last update.
Methods that guarantee a computer or network is safe from computer viruses
simply do not exist. Installing, updating, and using an antivirus program, though, is an
effective technique to safeguard your computer from loss.

More Related Content

What's hot

Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
Antivirus program ----neri
Antivirus program  ----neriAntivirus program  ----neri
Antivirus program ----neriaejay_neri
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)
richbryansalvo
 
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}richbryansalvo
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2maranan_zyra
 
(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2maranan_alexa
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
nikkinikhita
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
Shreya Singireddy
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!amoY91
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
culltdueet65
 
Anti virus
Anti virusAnti virus
Anti virus
Marlon San Luis
 
Anti virus
Anti virusAnti virus

What's hot (20)

Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
llagas j.
llagas j.llagas j.
llagas j.
 
antivirus
antivirusantivirus
antivirus
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
R esearch report with footnote
R esearch report with footnoteR esearch report with footnote
R esearch report with footnote
 
Antivirus program ----neri
Antivirus program  ----neriAntivirus program  ----neri
Antivirus program ----neri
 
Chap 2 lab2 (Ej
Chap 2 lab2 (EjChap 2 lab2 (Ej
Chap 2 lab2 (Ej
 
Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)
 
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Anti virus
Anti virusAnti virus
Anti virus
 
Anti virus
Anti virusAnti virus
Anti virus
 

Viewers also liked

The Effect of Sample Size On (Cusum and ARIMA) Control Charts
The Effect of Sample Size On (Cusum and ARIMA) Control ChartsThe Effect of Sample Size On (Cusum and ARIMA) Control Charts
The Effect of Sample Size On (Cusum and ARIMA) Control Charts
INFOGAIN PUBLICATION
 
Tarea de logica 5 (comenzada)
Tarea de logica 5 (comenzada)Tarea de logica 5 (comenzada)
Tarea de logica 5 (comenzada)
Sebastian Lara
 
Las redes sociales son consideradas redes de Aprendizaje
Las redes sociales son consideradas redes  de AprendizajeLas redes sociales son consideradas redes  de Aprendizaje
Las redes sociales son consideradas redes de Aprendizaje
Pia Esmeralda Valencia Bejarano
 
Jugendmedienschutz und Social Media - Worauf Schulleitungen achten müssen
Jugendmedienschutz und Social Media - Worauf Schulleitungen achten müssenJugendmedienschutz und Social Media - Worauf Schulleitungen achten müssen
Jugendmedienschutz und Social Media - Worauf Schulleitungen achten müssenPhilippe Wampfler
 
Lima 700(3)
Lima 700(3)Lima 700(3)
Lima 700(3)
Fernando Quiroz
 
13 persönliche Prinzipien zum gymnasialen Unterricht
13 persönliche Prinzipien zum gymnasialen Unterricht13 persönliche Prinzipien zum gymnasialen Unterricht
13 persönliche Prinzipien zum gymnasialen Unterricht
Philippe Wampfler
 
Tipos de memoria
Tipos de memoriaTipos de memoria
Tipos de memoria
Jhoanna Carrillo
 
Fichas validadas de la cuenca cochas RPNYC
Fichas validadas de la cuenca cochas RPNYCFichas validadas de la cuenca cochas RPNYC
Fichas validadas de la cuenca cochas RPNYC
JuSPTURISMO
 
Virus del Ebola, Investigación Epidemiológica
Virus del Ebola, Investigación Epidemiológica Virus del Ebola, Investigación Epidemiológica
Virus del Ebola, Investigación Epidemiológica
Francisco Ramon Hernandez Garcia
 
Zukunft der Pflege: Stationärer Pflegemarkt im Wandel
Zukunft der Pflege: Stationärer Pflegemarkt im WandelZukunft der Pflege: Stationärer Pflegemarkt im Wandel
Zukunft der Pflege: Stationärer Pflegemarkt im Wandel
TECLA e.V.
 
Revista rumbo empresarial publirreportaje 15 12-11
Revista rumbo empresarial publirreportaje 15 12-11Revista rumbo empresarial publirreportaje 15 12-11
Revista rumbo empresarial publirreportaje 15 12-11Perú 2021
 

Viewers also liked (20)

The Effect of Sample Size On (Cusum and ARIMA) Control Charts
The Effect of Sample Size On (Cusum and ARIMA) Control ChartsThe Effect of Sample Size On (Cusum and ARIMA) Control Charts
The Effect of Sample Size On (Cusum and ARIMA) Control Charts
 
Wordprees 2
Wordprees 2Wordprees 2
Wordprees 2
 
Tarea de logica 5 (comenzada)
Tarea de logica 5 (comenzada)Tarea de logica 5 (comenzada)
Tarea de logica 5 (comenzada)
 
Las redes sociales son consideradas redes de Aprendizaje
Las redes sociales son consideradas redes  de AprendizajeLas redes sociales son consideradas redes  de Aprendizaje
Las redes sociales son consideradas redes de Aprendizaje
 
Reporte de la observación (2)
Reporte de la observación (2)Reporte de la observación (2)
Reporte de la observación (2)
 
Jugendmedienschutz und Social Media - Worauf Schulleitungen achten müssen
Jugendmedienschutz und Social Media - Worauf Schulleitungen achten müssenJugendmedienschutz und Social Media - Worauf Schulleitungen achten müssen
Jugendmedienschutz und Social Media - Worauf Schulleitungen achten müssen
 
Lima 700(3)
Lima 700(3)Lima 700(3)
Lima 700(3)
 
Perros
PerrosPerros
Perros
 
Trabajo 2.0
Trabajo 2.0Trabajo 2.0
Trabajo 2.0
 
Ticccc(2)
Ticccc(2)Ticccc(2)
Ticccc(2)
 
13 persönliche Prinzipien zum gymnasialen Unterricht
13 persönliche Prinzipien zum gymnasialen Unterricht13 persönliche Prinzipien zum gymnasialen Unterricht
13 persönliche Prinzipien zum gymnasialen Unterricht
 
Tipos de memoria
Tipos de memoriaTipos de memoria
Tipos de memoria
 
Fichas validadas de la cuenca cochas RPNYC
Fichas validadas de la cuenca cochas RPNYCFichas validadas de la cuenca cochas RPNYC
Fichas validadas de la cuenca cochas RPNYC
 
Virus del Ebola, Investigación Epidemiológica
Virus del Ebola, Investigación Epidemiológica Virus del Ebola, Investigación Epidemiológica
Virus del Ebola, Investigación Epidemiológica
 
Zukunft der Pflege: Stationärer Pflegemarkt im Wandel
Zukunft der Pflege: Stationärer Pflegemarkt im WandelZukunft der Pflege: Stationärer Pflegemarkt im Wandel
Zukunft der Pflege: Stationärer Pflegemarkt im Wandel
 
Revista rumbo empresarial publirreportaje 15 12-11
Revista rumbo empresarial publirreportaje 15 12-11Revista rumbo empresarial publirreportaje 15 12-11
Revista rumbo empresarial publirreportaje 15 12-11
 
Weekly report template
Weekly report templateWeekly report template
Weekly report template
 
Daniel scheinson fotos
Daniel scheinson fotosDaniel scheinson fotos
Daniel scheinson fotos
 
Enero1 copia
Enero1   copiaEnero1   copia
Enero1 copia
 
Hinweise zum blogprojekt
Hinweise zum blogprojektHinweise zum blogprojekt
Hinweise zum blogprojekt
 

Similar to Chap 2 lab 2

Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Alireza Ghahrood
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
harsh gajipara
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
ollyabraham
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...UltraUploader
 
Policy report barrat & associates ltd
Policy report  barrat & associates ltdPolicy report  barrat & associates ltd
Policy report barrat & associates ltd
Eugene Mukuka, BSc. MBA, MSc
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
Blogger
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
S.M. Towhidul Islam
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
Diane M. Metcalf
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
Blogger
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
jeeva9948
 
Software Antivirus.pdf
Software Antivirus.pdfSoftware Antivirus.pdf
Software Antivirus.pdf
Expertprinter Solutions
 
Software Antivirus.ppt
Software Antivirus.pptSoftware Antivirus.ppt
Software Antivirus.ppt
Expertprinter Solutions
 

Similar to Chap 2 lab 2 (18)

Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Mjtanasas
MjtanasasMjtanasas
Mjtanasas
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...
 
Policy report barrat & associates ltd
Policy report  barrat & associates ltdPolicy report  barrat & associates ltd
Policy report barrat & associates ltd
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
Software Antivirus.pdf
Software Antivirus.pdfSoftware Antivirus.pdf
Software Antivirus.pdf
 
Software Antivirus.ppt
Software Antivirus.pptSoftware Antivirus.ppt
Software Antivirus.ppt
 
Antivirus
AntivirusAntivirus
Antivirus
 

More from Elma Valdehueza

Poem
PoemPoem
Birthday card
Birthday cardBirthday card
Birthday card
Elma Valdehueza
 
Midterm exam in word processing
Midterm exam in word processingMidterm exam in word processing
Midterm exam in word processingElma Valdehueza
 

More from Elma Valdehueza (19)

Chap3 case2
Chap3 case2Chap3 case2
Chap3 case2
 
Chap3lab1
Chap3lab1Chap3lab1
Chap3lab1
 
Sayings
SayingsSayings
Sayings
 
Poem
PoemPoem
Poem
 
Birthday card
Birthday cardBirthday card
Birthday card
 
Canaan cover letter
Canaan cover letterCanaan cover letter
Canaan cover letter
 
Craft barn
Craft barnCraft barn
Craft barn
 
Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
 
Research paper
Research paperResearch paper
Research paper
 
Midterm exam in word processing
Midterm exam in word processingMidterm exam in word processing
Midterm exam in word processing
 
Play musical instrument
Play musical instrumentPlay musical instrument
Play musical instrument
 
Ice cream shop
Ice cream shopIce cream shop
Ice cream shop
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lot
 
Rent a cabin
Rent a cabinRent a cabin
Rent a cabin
 
Blooming deals flyer
Blooming deals flyerBlooming deals flyer
Blooming deals flyer
 
Airplane rides
Airplane ridesAirplane rides
Airplane rides
 
Play ball flyer
Play ball flyerPlay ball flyer
Play ball flyer
 
Autumn festival flyer
Autumn festival flyerAutumn festival flyer
Autumn festival flyer
 
Learn to ride2
Learn to ride2Learn to ride2
Learn to ride2
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Chap 2 lab 2

  • 1. Yadav 1 Pahdi Yadav Professor Milton English 101 5 May 2008 Antivirus Programs Today, people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses. An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, e- mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201-205). One technique that antivirus programs use to identify a virus is to look for virus signatures, or virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman (Antivirus Programs), many vendors of antivirus programs allow registered to update virus signature files automatically from the Web at no cost for a specified time. Updating the antivirus _________________ Buloswki points out that most antivirus program also protect against worms and Trojan horses (55-61).
  • 2. Yadav 2 program’s signature files regularly is important, because it will download any new virus definition that have been added since the last update. Methods that guarantee a computer or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus program, though, is an effective technique to safeguard your computer from loss.