1. Computer viruses. - Free Online Library
Another drawback of Samsung NC10 we understood is that, the netbook battery is attached out of
the base by an additional 5mm to the netbook depth. Saving money and time is as easy as point and
click, open a totally free online checking account. The dv9000t has a 2.16-GHz Intel Core 2 Duo
processor that provides excellent performance without being stunning. Get your favourite books at
your doorsteps while buying them online. This is a safe, encrypted connection and is a great way to
go when linking to the web through a public access point. Have you ever needed to miss out on a
major televised sporting event, a tv unique, and even an episode of your favorite TELEVISION drama
since you were at work or away on business?
Do computers get sick? You bet. They laid low--by a virus!
2. So, the chances are really that you are most likely to be attacked by malware. Any information about
you that is public need to not form the basis of your password. You can type in the URL address of
a website to either block or add it to your harmful or safe zone respectively. Afterwards, an USB
gadget or CD could be used to transfer the program to the contaminated computer system. Windows
users need to likewise make sure that Windows Update is made it possible for. See to it you have an
approximately date security bundle on your PC.
You switch on your computer, eager for it to boot up so you can join thrill-seeker Lara Croft as she
searches for the ancient Emperor's palace in the Great Wall of China in Tomb Raider II. Wait!
Where's the familiar green screen? Something's wrong. Ding! Whrrrr! Crrrrrash! You turfi off the
computer, then on again. This time--NOTHING.
What happened?
Your computer has just been zapped by a computer virus--a malicious program that at worst could
wipe out all your computer files. Gone is your dog Frosty's photo. Gone is Lara. And erased is every
homework assignment, including the American History term paper that took a week to grind out.
Could this really happen to you? You bet. And getting a computer virus has become much easier
than before.
NASTY NEWS
As recently as five years ago, a virus could spread from computer to computer mainly through
shared floppy disks. Now, just opening up your electronic mail, or e-mail, can launch a nasty virus
into your system.
Last summer, headlines proclaimed that widely popular e-mail programs like Microsoft's Outlook 98
and Outlook Express, as well as Netscape Mail, and Qualcomm's Eudora, are vulnerable to virus
attacks. "You can get an e-mail that looks like any other e-mail," explains Alex Haddox, head of
Symantec AntiVirus Research Center in Santa Monica, California. "Except when you open up the e-mail
itself, by the time you read it, it's too late." You've got a virus!
Who would perpetrate such a potentially harmful trick? Virus writers are mostly males age 14 to 24.
For these digital delinquents, unleashing a new virus is an ego trip, says Haddox: "'Can I do it? Can I
push the limits of technology?' Their greatest thrill is to have their name or their virus posted in the
news worldwide."
One 26-year-old British virus writer who identifies himself only as Rajaat admits, "I do get personal
gratification out of it. For me, it's a challenge to see if I can outsmart antivirus software, and to try
to think of innovative ways to do this."
NO EASY TRICK
Creating a computer virus is no easy trick. Just like computer games and word-processing software,
a virus is a program--step-by-step instructions that tell a computer what to do. Unlike games and
other software, however, a virus attaches itself to other programs in your computer. "It's essentially
a digital parasite," explains Haddox.
A virus contains instructions that tell it to self-replicate, or copy itself over and over again. When it
first enters your computer--through an infected floppy disk, e-mail, or a program downloaded from
3. the Internet--the virus copies itself to your computer's memory (see computer diagram, below). From
there, it attaches itself to any program you open up. "The virus actually rewrites a program to
incorporate itself into the program," says Haddox. "It rewrites the program so the virus will run
first."
Every time you open up another file or program, the virus plants itself into that file and takes over.
In the process, it can cripple your machine's ability to find the files it needs to start up or operate.
The infection doesn't end there. A computer virus, like the common cold, is highly contagious. Its
primary purpose is to spread to as many computers as fast as possible, says Haddox.
Computer virologists, programmers who try to combat the digital plague, say 10 to 15 new viruses
are launched every day. The virus population, currently about 18,000, nearly doubles every year.
Today, the sneaks invade 35 of every 1,000 computers each month. (About 200 million personal
computers are in use today.) And thanks to the Internet, the "information superhighway" that
connects computers worldwide, outbreaks go global in just weeks or less. With Internet usage
exploding, the average user is now 20 times more likely to contract a computer virus.
COMPUTER PERIL
Most viruses are actually harmless, merely displaying silly messages ("I feel good!") or tunes
("Yankee Doodle Dandy") when you boot up. But destructive viruses have swelled to 35 percent of all
computer invaders, up from 10 percent just six years ago. The worst of them garble data, hinder
printing, or wipe out entire hard drives. The most common computer culprit is the macro virus--a
type of virus that infects data documents like letters and spreadsheets--which accounts for more
than 80 percent of all computer viruses. A macro is a legitimate mini-program, or procedure list,
embedded in popular wordprocessing and spread sheet software, like Microsoft Word and Excel. It
enables a user to write a simple program that executes a series of commands within a document,
like automatically adding up numbers and presenting a total. Because macros were meant to be
written by the average computer user, they're very easy to learn.
"I call the macro virus the `every man's virus'," Haddox says, Anyone with ill-intent can easily write a
virus using macros. In fact, one macro virus, called Format_C, formats, or erases, your hard drive
with just three lines of instructions.
PREVENTIVE MEDICINE
So how can you protect your machine from a virus? Several antivirus software programs (costing
between $30 and $60 each), available in computer stores, locate and remove viruses from your
computer. Most viruses are easy to detect because they follow a specific sequence of instructions,
and the first part is always self-replication. Antivirus products periodically check files for suspicious
strands of software code, especially in the critical parts of a hard drive that contain operational
instructions.
While an antivirus software is an essential tool, preventive medicine is always best. Download
programs only from reliable sites on the Internet, like well-known companies or organizations; avoid
downloading material from personal Web pages. Find out where floppy disks have been before
swapping them with friends. And beware of junk e-mail, or spams. They could contain a virus.
Catching a virus is as easy as, well, catching a cold.
RELATED ARTICLE: FROM PLAYFUL TO DANGEROUS
4. As long ago as 1949, computer pioneer John von Neumann speculated that a program could
reproduce itself. Three programmers at AT&T'S Bell Laboratories proved him right. They hatched
self-replicating electronic "organisms." The programmers watched their creations fight for control of
a computer in a bizarre after-hours experiment called "Core Wars."
In 1986, a University of Southern California student named Fred Cohen coined the term "computer
virus." He observed that electronic viruses, like their biological counterparts, attach themselves to
hosts and replicate.
The first computer viruses were playful. An early strain that surfaced on college campuses, for
example, flashed the screen message: "I want a cookie." But it didn't disrupt a computer's operation
in any way.
Real damage hit computers in 1987, when a snippet of code known as the Brain erased hard-drive
data on some 100,000 IBMPCs--including 10,000 at George Washington University alone. The
"Brain" was traced to two brothers who ran a discount computer store in Lahore, Pakistan. They
later admitted to injecting the virus into computers they sold to bargain-hunting tourists. The Brain
was followed by a swarm of malignant strains like Jerusalem, which trashed any program run on a
Friday the 13th.
Finally, in 1992, "Michelangelo" became the first virus to threaten large numbers of home users.
Headlines predicted it would erase millions of IBM-compatible computers on March 6, the Italian
artist's birthday. In the end, the bug's bark was worse than its bite--though it did wipe out thousands
of computers worldwide.
RELATED ARTICLE: HOT JOBS VIRUS HUNTER
Name: Alex Haddox
Hot Job: Product Manager
Where: Symantec AntiVirus Research Center
Computer history: I bought my first computer, an AppleIIC, while at Santa Monica High [Santa
Monica, California] back in the '80s. It actually sat on my desk for an entire year before I ever turned
it on.
What hooked you? Games. I've never been what you might call a true programmer. I tinkered with
computer programming, but my real interest is more in the theories of how things work, rather than
the actual hands-on part.
College major? English. I went to several colleges.
Why the interest in computer viruses? My first PC (non-Apple computer) came complete with two
viruses. It was a brand new computer, but the store had pre-installed a whole bunch of software for
me.
How old were you when you started at Symantec? Barely 21. I worked full-time and went to college
part-time. I'm only 28 and I've done about everything at the company except be president.
5. So what do you do now? I analyze virus outbreaks in various parts of the world, and supervise a
research team who writes anti-virus programs.
Is virus hunting exciting?. It's almost like being in an emergency room. Every day there is some virus
outbreak with some company in the world that we're called on to help. We need to make sure we
stay one step ahead of the problem. If our research takes a wrong turn, a lot of computers will be
hurt. I really feel I make a big difference.
Advice to young computer fanatics? Take advanced computer science courses in college. The
computer field is a great one to work in.
Thanks, Alex. We'll call you if we have a computer virus. By the way, do you make house calls?
COPYRIGHT 1998 Scholastic, Inc.
No portion of this article can be reproduced without the express written permission from the
copyright holder.
Copyright 1998, Gale Group. All rights reserved. Gale Group is a Thomson Corporation Company.