SlideShare a Scribd company logo
Pahdi Yaday<br />Professor Milton<br />English 101<br />5 May 2008<br />Antivirus Program<br />               Today people rely on computers to create, store, and mange critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus program are an effective way to protect against viruses.<br />               An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, e-mail attachment opened files, and all types of removable media inserted in the computer (Karanos).<br />               One technique that antivirus programs use to identify a virus is to look for virus signatures, or virus definitions, which are known specific patterns of virus code. According to (Shelly and Cashman) (Antivirus Programs), many vendors of antivirus programs allow registered users to update virus signature files automatically from the Web at no cost for a specified time. Updating the antivirus <br />             1  (Bulowski) Points out that most antivirus programs also protect against worms and Trojan horses (55-61), program’s signature files regularly is important, because it will download any new virus definitions that have been added since the last update.<br />               Methods that guarantee a compute or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus program, though is an effective technique to safeguard your computer from loss.  <br />Works Cited BIBLIOGRAPHY Bulowski, Dana. quot;
Protection and Precaution: Keeping Your Computer Healthy.quot;
 Computing Today February 2008: 55-61.Karanos, Hector. Internet Security. Vols. 201-205. Indianapolis: Citywide Cyber Press, 2008.Shelly, Gary B. and Thomas J. Cashman. Antivirus Programs. Course Technology. 7 February 2008 <www.scsite.com/wd2007/pr2/wc.htm>.<br />
R esearch report with footnote
R esearch report with footnote

More Related Content

What's hot

Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
Jennifer Cataluña
 
Hamilton lara 2011
Hamilton lara 2011Hamilton lara 2011
Hamilton lara 2011
Lorie Jane Abao
 
Cataluña antivirus program
Cataluña antivirus programCataluña antivirus program
Cataluña antivirus program
Jennifer Cataluña
 
Chap 2 lab 2
Chap 2 lab 2Chap 2 lab 2
Chap 2 lab 2
Elma Valdehueza
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
fernando_bruaj
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
brittneytaylor
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
maranan_zyra
 
Yadav 1(2)
Yadav 1(2)Yadav 1(2)
Yadav 1(2)
jeremargwapo
 
Antivirus program ----neri
Antivirus program  ----neriAntivirus program  ----neri
Antivirus program ----neri
aejay_neri
 
Chap 2 lab2 (Ej
Chap 2 lab2 (EjChap 2 lab2 (Ej
Chap 2 lab2 (Ej
Enriquee Guevarra
 
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}
richbryansalvo
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)
richbryansalvo
 
(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2
maranan_alexa
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
Bhavesh soni
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
VishwarajYadav
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
nikkinikhita
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
Rc Os
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
amoY91
 

What's hot (20)

Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
 
Hamilton lara 2011
Hamilton lara 2011Hamilton lara 2011
Hamilton lara 2011
 
Cataluña antivirus program
Cataluña antivirus programCataluña antivirus program
Cataluña antivirus program
 
Chap 2 lab 2
Chap 2 lab 2Chap 2 lab 2
Chap 2 lab 2
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
Yadav 1(2)
Yadav 1(2)Yadav 1(2)
Yadav 1(2)
 
Antivirus program ----neri
Antivirus program  ----neriAntivirus program  ----neri
Antivirus program ----neri
 
Chap 2 lab2 (Ej
Chap 2 lab2 (EjChap 2 lab2 (Ej
Chap 2 lab2 (Ej
 
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)
 
(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 

Viewers also liked

Hannah
HannahHannah
Hannah
slimsurf4
 
Addressing the audience
Addressing the audienceAddressing the audience
Addressing the audience
Emily sheppard
 
scan0008
scan0008scan0008
Yêu và Thích - Teresa Ngọc Nga
Yêu và Thích - Teresa Ngọc NgaYêu và Thích - Teresa Ngọc Nga
Yêu và Thích - Teresa Ngọc Nga
Daklak Training College
 
Iphone 5 johana gonzalez - erick molina
Iphone 5   johana gonzalez - erick molinaIphone 5   johana gonzalez - erick molina
Iphone 5 johana gonzalez - erick molina
Erick El Sultan
 
Svjedodžba - Ruđer Bošković
Svjedodžba - Ruđer BoškovićSvjedodžba - Ruđer Bošković
Svjedodžba - Ruđer BoškovićMarko Berecki
 
Innoa innovation growth slideshare
Innoa innovation growth slideshareInnoa innovation growth slideshare
Innoa innovation growth slideshare
Rogier van Kralingen
 
Medicina basada en evidencias pregunta de primera línea
Medicina basada en evidencias pregunta de primera líneaMedicina basada en evidencias pregunta de primera línea
Medicina basada en evidencias pregunta de primera línea
Centro Infantil Montessori
 
Thomas Ellison Resume2.1
Thomas Ellison Resume2.1Thomas Ellison Resume2.1
Thomas Ellison Resume2.1
Thomas Ellison
 
El principito
El principitoEl principito
El principito
Adbel Rodriguez
 
Address Tab Review
Address Tab ReviewAddress Tab Review
Address Tab Review
SWX-WAL
 
Carnival in Rio
Carnival in RioCarnival in Rio
Carnival in Rio
ddkermitfrog007
 
Qr codes
Qr codesQr codes
Theology of mission biblical bases (english)
Theology of mission   biblical bases (english)Theology of mission   biblical bases (english)
Theology of mission biblical bases (english)
QLang Project
 
A Winter Evening In Canada...
A Winter Evening In Canada...A Winter Evening In Canada...
A Winter Evening In Canada...
Makala D.
 
Tarea luis rey vicencio arenas materia historia
Tarea luis rey vicencio arenas materia historiaTarea luis rey vicencio arenas materia historia
Tarea luis rey vicencio arenas materia historia
Sergio Gómez Atta
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
satish kumar
 

Viewers also liked (17)

Hannah
HannahHannah
Hannah
 
Addressing the audience
Addressing the audienceAddressing the audience
Addressing the audience
 
scan0008
scan0008scan0008
scan0008
 
Yêu và Thích - Teresa Ngọc Nga
Yêu và Thích - Teresa Ngọc NgaYêu và Thích - Teresa Ngọc Nga
Yêu và Thích - Teresa Ngọc Nga
 
Iphone 5 johana gonzalez - erick molina
Iphone 5   johana gonzalez - erick molinaIphone 5   johana gonzalez - erick molina
Iphone 5 johana gonzalez - erick molina
 
Svjedodžba - Ruđer Bošković
Svjedodžba - Ruđer BoškovićSvjedodžba - Ruđer Bošković
Svjedodžba - Ruđer Bošković
 
Innoa innovation growth slideshare
Innoa innovation growth slideshareInnoa innovation growth slideshare
Innoa innovation growth slideshare
 
Medicina basada en evidencias pregunta de primera línea
Medicina basada en evidencias pregunta de primera líneaMedicina basada en evidencias pregunta de primera línea
Medicina basada en evidencias pregunta de primera línea
 
Thomas Ellison Resume2.1
Thomas Ellison Resume2.1Thomas Ellison Resume2.1
Thomas Ellison Resume2.1
 
El principito
El principitoEl principito
El principito
 
Address Tab Review
Address Tab ReviewAddress Tab Review
Address Tab Review
 
Carnival in Rio
Carnival in RioCarnival in Rio
Carnival in Rio
 
Qr codes
Qr codesQr codes
Qr codes
 
Theology of mission biblical bases (english)
Theology of mission   biblical bases (english)Theology of mission   biblical bases (english)
Theology of mission biblical bases (english)
 
A Winter Evening In Canada...
A Winter Evening In Canada...A Winter Evening In Canada...
A Winter Evening In Canada...
 
Tarea luis rey vicencio arenas materia historia
Tarea luis rey vicencio arenas materia historiaTarea luis rey vicencio arenas materia historia
Tarea luis rey vicencio arenas materia historia
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 

Similar to R esearch report with footnote

Mjtanasas
MjtanasasMjtanasas
Mjtanasas
mj tanasas
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
kent neri
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
fernando_bruaj
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Alireza Ghahrood
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
Blogger
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...
UltraUploader
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
ollyabraham
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
jeeva9948
 
Policy report barrat &amp; associates ltd
Policy report  barrat &amp; associates ltdPolicy report  barrat &amp; associates ltd
Policy report barrat &amp; associates ltd
Eugene Mukuka, BSc. MBA, MSc
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
harsh gajipara
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Nicholas Davis
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Sejahtera Affif
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
Danny Doobay
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
Cyber Security Infotech
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
Progressive Integrations
 
An introduction to computer viruses
An introduction to computer virusesAn introduction to computer viruses
An introduction to computer viruses
UltraUploader
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
Wollo UNiversity
 

Similar to R esearch report with footnote (17)

Mjtanasas
MjtanasasMjtanasas
Mjtanasas
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
Policy report barrat &amp; associates ltd
Policy report  barrat &amp; associates ltdPolicy report  barrat &amp; associates ltd
Policy report barrat &amp; associates ltd
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
An introduction to computer viruses
An introduction to computer virusesAn introduction to computer viruses
An introduction to computer viruses
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 

More from Guevarra Institute of Technology

Lucagbo.... chap2 case1 weight-loss (1)
Lucagbo.... chap2 case1 weight-loss (1)Lucagbo.... chap2 case1 weight-loss (1)
Lucagbo.... chap2 case1 weight-loss (1)
Guevarra Institute of Technology
 
Lucagbo.... chap2 case1 weight-loss (1)
Lucagbo.... chap2 case1 weight-loss (1)Lucagbo.... chap2 case1 weight-loss (1)
Lucagbo.... chap2 case1 weight-loss (1)
Guevarra Institute of Technology
 
Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
Guevarra Institute of Technology
 
Lucagbo.... Chap2-Case3 Fund Raising
Lucagbo.... Chap2-Case3 Fund RaisingLucagbo.... Chap2-Case3 Fund Raising
Lucagbo.... Chap2-Case3 Fund Raising
Guevarra Institute of Technology
 
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
Guevarra Institute of Technology
 
Lucagbo Chap2-Case1 Doze-Now
Lucagbo Chap2-Case1 Doze-NowLucagbo Chap2-Case1 Doze-Now
Lucagbo Chap2-Case1 Doze-Now
Guevarra Institute of Technology
 
Lucagbo Chap1-Case 2 Quarterly Environmental Friendly
Lucagbo Chap1-Case 2 Quarterly Environmental FriendlyLucagbo Chap1-Case 2 Quarterly Environmental Friendly
Lucagbo Chap1-Case 2 Quarterly Environmental Friendly
Guevarra Institute of Technology
 
Qnx
QnxQnx
QNX OS
QNX OSQNX OS
Lucagbo sheet1
Lucagbo sheet1Lucagbo sheet1
Lucagbo sheet1 (1)
Lucagbo sheet1 (1)Lucagbo sheet1 (1)
Lucagbo sheet1 (3)
Lucagbo sheet1 (3)Lucagbo sheet1 (3)
Lucagbo sheet1 (2)
Lucagbo sheet1 (2)Lucagbo sheet1 (2)
Chap2 lab2 jackson's bright ideas sheet1
Chap2 lab2 jackson's bright ideas sheet1Chap2 lab2 jackson's bright ideas sheet1
Chap2 lab2 jackson's bright ideas sheet1
Guevarra Institute of Technology
 
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
Guevarra Institute of Technology
 
Six sigma...by raziel lucagbo
Six sigma...by raziel lucagboSix sigma...by raziel lucagbo
Six sigma...by raziel lucagbo
Guevarra Institute of Technology
 
Android...by raziel lucagbo
Android...by raziel lucagboAndroid...by raziel lucagbo
Android...by raziel lucagbo
Guevarra Institute of Technology
 
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
Guevarra Institute of Technology
 
Lucagbo 1 sheet1
Lucagbo 1 sheet1Lucagbo 1 sheet1
Lucagbo 1 sheet1
Lucagbo 1 sheet1Lucagbo 1 sheet1

More from Guevarra Institute of Technology (20)

Lucagbo.... chap2 case1 weight-loss (1)
Lucagbo.... chap2 case1 weight-loss (1)Lucagbo.... chap2 case1 weight-loss (1)
Lucagbo.... chap2 case1 weight-loss (1)
 
Lucagbo.... chap2 case1 weight-loss (1)
Lucagbo.... chap2 case1 weight-loss (1)Lucagbo.... chap2 case1 weight-loss (1)
Lucagbo.... chap2 case1 weight-loss (1)
 
Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
 
Lucagbo.... Chap2-Case3 Fund Raising
Lucagbo.... Chap2-Case3 Fund RaisingLucagbo.... Chap2-Case3 Fund Raising
Lucagbo.... Chap2-Case3 Fund Raising
 
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
 
Lucagbo Chap2-Case1 Doze-Now
Lucagbo Chap2-Case1 Doze-NowLucagbo Chap2-Case1 Doze-Now
Lucagbo Chap2-Case1 Doze-Now
 
Lucagbo Chap1-Case 2 Quarterly Environmental Friendly
Lucagbo Chap1-Case 2 Quarterly Environmental FriendlyLucagbo Chap1-Case 2 Quarterly Environmental Friendly
Lucagbo Chap1-Case 2 Quarterly Environmental Friendly
 
Qnx
QnxQnx
Qnx
 
QNX OS
QNX OSQNX OS
QNX OS
 
Lucagbo sheet1
Lucagbo sheet1Lucagbo sheet1
Lucagbo sheet1
 
Lucagbo sheet1 (1)
Lucagbo sheet1 (1)Lucagbo sheet1 (1)
Lucagbo sheet1 (1)
 
Lucagbo sheet1 (3)
Lucagbo sheet1 (3)Lucagbo sheet1 (3)
Lucagbo sheet1 (3)
 
Lucagbo sheet1 (2)
Lucagbo sheet1 (2)Lucagbo sheet1 (2)
Lucagbo sheet1 (2)
 
Chap2 lab2 jackson's bright ideas sheet1
Chap2 lab2 jackson's bright ideas sheet1Chap2 lab2 jackson's bright ideas sheet1
Chap2 lab2 jackson's bright ideas sheet1
 
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
 
Six sigma...by raziel lucagbo
Six sigma...by raziel lucagboSix sigma...by raziel lucagbo
Six sigma...by raziel lucagbo
 
Android...by raziel lucagbo
Android...by raziel lucagboAndroid...by raziel lucagbo
Android...by raziel lucagbo
 
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
 
Lucagbo 1 sheet1
Lucagbo 1 sheet1Lucagbo 1 sheet1
Lucagbo 1 sheet1
 
Lucagbo 1 sheet1
Lucagbo 1 sheet1Lucagbo 1 sheet1
Lucagbo 1 sheet1
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

R esearch report with footnote

  • 1. Pahdi Yaday<br />Professor Milton<br />English 101<br />5 May 2008<br />Antivirus Program<br /> Today people rely on computers to create, store, and mange critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus program are an effective way to protect against viruses.<br /> An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, e-mail attachment opened files, and all types of removable media inserted in the computer (Karanos).<br /> One technique that antivirus programs use to identify a virus is to look for virus signatures, or virus definitions, which are known specific patterns of virus code. According to (Shelly and Cashman) (Antivirus Programs), many vendors of antivirus programs allow registered users to update virus signature files automatically from the Web at no cost for a specified time. Updating the antivirus <br /> 1 (Bulowski) Points out that most antivirus programs also protect against worms and Trojan horses (55-61), program’s signature files regularly is important, because it will download any new virus definitions that have been added since the last update.<br /> Methods that guarantee a compute or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus program, though is an effective technique to safeguard your computer from loss. <br />Works Cited BIBLIOGRAPHY Bulowski, Dana. quot; Protection and Precaution: Keeping Your Computer Healthy.quot; Computing Today February 2008: 55-61.Karanos, Hector. Internet Security. Vols. 201-205. Indianapolis: Citywide Cyber Press, 2008.Shelly, Gary B. and Thomas J. Cashman. Antivirus Programs. Course Technology. 7 February 2008 <www.scsite.com/wd2007/pr2/wc.htm>.<br />