SlideShare a Scribd company logo
Pahdi Yadav<br />Professor Milton<br />English 101<br />5 May 2008<br />Antivirus programs<br />    Today, people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses.<br />     An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on stage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, E-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201- 205).<br />     One technique that antivirus programs use to identify a virus is to look for virus signatures, or virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman(antivirus programs), many vendors of antivirus programs allow registered users to update virus signature files automatically from the Web at no cost for a specified time. Updating the antivirus<br /> ________________<br />      Bulowski points out that most antivirus programs also protect against worms and Trojan horses (55-61) program’s signature files regularly is important, because it will download any new virus definitions that have been added since the last update.<br />     Methods that guarantee a computer or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus program, though, is an effective technique to safeguard your computer from loss. <br />
Dungogan chap 2 lab 2

More Related Content

What's hot

Antivirus program ----neri
Antivirus program  ----neriAntivirus program  ----neri
Antivirus program ----neriaejay_neri
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2maranan_zyra
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}richbryansalvo
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)
richbryansalvo
 
(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2maranan_alexa
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!amoY91
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
nikkinikhita
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham_Indrawat
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirusVishwarajYadav
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
Shreya Singireddy
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 

What's hot (19)

Yadav 1(2)
Yadav 1(2)Yadav 1(2)
Yadav 1(2)
 
R esearch report with footnote
R esearch report with footnoteR esearch report with footnote
R esearch report with footnote
 
Antivirus program ----neri
Antivirus program  ----neriAntivirus program  ----neri
Antivirus program ----neri
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
Chap 2 lab2 (Ej
Chap 2 lab2 (EjChap 2 lab2 (Ej
Chap 2 lab2 (Ej
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)
 
(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 

Similar to Dungogan chap 2 lab 2

Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...UltraUploader
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
ollyabraham
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Alireza Ghahrood
 
Policy report barrat &amp; associates ltd
Policy report  barrat &amp; associates ltdPolicy report  barrat &amp; associates ltd
Policy report barrat &amp; associates ltd
Eugene Mukuka, BSc. MBA, MSc
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
harsh gajipara
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
Blogger
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
Diane M. Metcalf
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
jeeva9948
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Nicholas Davis
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
Stay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus SoftwareStay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus Software
SoftwareDeals
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
thatfunguygeek
 
Software Antivirus.pdf
Software Antivirus.pdfSoftware Antivirus.pdf
Software Antivirus.pdf
Expertprinter Solutions
 

Similar to Dungogan chap 2 lab 2 (18)

Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
Mjtanasas
MjtanasasMjtanasas
Mjtanasas
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Policy report barrat &amp; associates ltd
Policy report  barrat &amp; associates ltdPolicy report  barrat &amp; associates ltd
Policy report barrat &amp; associates ltd
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Stay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus SoftwareStay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus Software
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Software Antivirus.pdf
Software Antivirus.pdfSoftware Antivirus.pdf
Software Antivirus.pdf
 

More from ricky098

Chap2 lab3 (ricky) sheet1
Chap2 lab3 (ricky) sheet1Chap2 lab3 (ricky) sheet1
Chap2 lab3 (ricky) sheet1ricky098
 
Solver dollars stuck_club_(rikcy_ne_brad))
Solver dollars stuck_club_(rikcy_ne_brad))Solver dollars stuck_club_(rikcy_ne_brad))
Solver dollars stuck_club_(rikcy_ne_brad))ricky098
 
College cost and financial support (dungogan)
College cost and financial support (dungogan)College cost and financial support (dungogan)
College cost and financial support (dungogan)ricky098
 
Scissors office supply (dungogan)
Scissors office supply (dungogan)Scissors office supply (dungogan)
Scissors office supply (dungogan)ricky098
 
Kona's expresso coffee (dungogan)
Kona's expresso coffee (dungogan)Kona's expresso coffee (dungogan)
Kona's expresso coffee (dungogan)ricky098
 
Dungogan chap 3 lab 1
Dungogan chap 3 lab 1Dungogan chap 3 lab 1
Dungogan chap 3 lab 1ricky098
 
Zamayla chap3 lab 1
Zamayla chap3 lab 1Zamayla chap3 lab 1
Zamayla chap3 lab 1ricky098
 
Dungogan chap 2 lab3
Dungogan chap 2 lab3Dungogan chap 2 lab3
Dungogan chap 2 lab3ricky098
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1ricky098
 
Dungogan chap 1 lab 3
Dungogan chap 1 lab 3Dungogan chap 1 lab 3
Dungogan chap 1 lab 3ricky098
 
Dungogan chapter 1 lab 2
Dungogan chapter 1 lab 2Dungogan chapter 1 lab 2
Dungogan chapter 1 lab 2ricky098
 
Dungogan chapter 1 lab 1
Dungogan chapter 1 lab 1Dungogan chapter 1 lab 1
Dungogan chapter 1 lab 1ricky098
 

More from ricky098 (13)

Chap2 lab3 (ricky) sheet1
Chap2 lab3 (ricky) sheet1Chap2 lab3 (ricky) sheet1
Chap2 lab3 (ricky) sheet1
 
Ricky
RickyRicky
Ricky
 
Solver dollars stuck_club_(rikcy_ne_brad))
Solver dollars stuck_club_(rikcy_ne_brad))Solver dollars stuck_club_(rikcy_ne_brad))
Solver dollars stuck_club_(rikcy_ne_brad))
 
College cost and financial support (dungogan)
College cost and financial support (dungogan)College cost and financial support (dungogan)
College cost and financial support (dungogan)
 
Scissors office supply (dungogan)
Scissors office supply (dungogan)Scissors office supply (dungogan)
Scissors office supply (dungogan)
 
Kona's expresso coffee (dungogan)
Kona's expresso coffee (dungogan)Kona's expresso coffee (dungogan)
Kona's expresso coffee (dungogan)
 
Dungogan chap 3 lab 1
Dungogan chap 3 lab 1Dungogan chap 3 lab 1
Dungogan chap 3 lab 1
 
Zamayla chap3 lab 1
Zamayla chap3 lab 1Zamayla chap3 lab 1
Zamayla chap3 lab 1
 
Dungogan chap 2 lab3
Dungogan chap 2 lab3Dungogan chap 2 lab3
Dungogan chap 2 lab3
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Dungogan chap 1 lab 3
Dungogan chap 1 lab 3Dungogan chap 1 lab 3
Dungogan chap 1 lab 3
 
Dungogan chapter 1 lab 2
Dungogan chapter 1 lab 2Dungogan chapter 1 lab 2
Dungogan chapter 1 lab 2
 
Dungogan chapter 1 lab 1
Dungogan chapter 1 lab 1Dungogan chapter 1 lab 1
Dungogan chapter 1 lab 1
 

Dungogan chap 2 lab 2

  • 1. Pahdi Yadav<br />Professor Milton<br />English 101<br />5 May 2008<br />Antivirus programs<br /> Today, people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses.<br /> An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on stage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, E-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201- 205).<br /> One technique that antivirus programs use to identify a virus is to look for virus signatures, or virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman(antivirus programs), many vendors of antivirus programs allow registered users to update virus signature files automatically from the Web at no cost for a specified time. Updating the antivirus<br /> ________________<br /> Bulowski points out that most antivirus programs also protect against worms and Trojan horses (55-61) program’s signature files regularly is important, because it will download any new virus definitions that have been added since the last update.<br /> Methods that guarantee a computer or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus program, though, is an effective technique to safeguard your computer from loss. <br />