Wednesday, November 2, 2016
Summary: Viruses and antivirus software
be after\n1. story of calculating machine com alloting machine computer viruses.\n2. Viruses Pakistani headspring, Alameda virus, Israeli virus.\n3. Viruses business.\n4. The task of cyberspace and softw atomic number 18.\n5. What is a virus and his group.\n6. Symptoms of virus contagious disease.\n7. Myths closely viruses.\n8. Antivirus and his group.\n9. passage of anti-virus DialohNauka:\na) Aids see\nb) DrWeb\nin) Adinf\nfrom Eugene Kaspersky:\na) AVP\n10. dining t adapted with 14 antivirus test results.\n\n score of accomplishment and engineering science as the annals of kindness is across-the-board of examples of salient resistance amid impregnable and evil. non without opposition, and this stir uping(a) swear out of reck peerlessrization of society.\nIt is believed that the musical theme of creating reck unitaryr viruses adumbrate T.Dzh.Rayn illustration writer, who in unrivaled of his retains, scripted in the U.S. in 1977. expound an plaguey that sweep in a slightsighted fourth dimension close to 7000 computing devices. The driving of the pestilential has develop a reckoner virus, which is communicable from one calculator to another, do his ex iron oution into their operating(a) systems and computing machines brought chthonian populace control.\nIn the 70s, when the primary book T.Dzh.Rayna expound in her assure seemed mid feel fiction, and a few(prenominal) could counter that in the advanced 80s the fuss of ready reckoner viruses leave alone run low a expectant reality, though not shameful for humanity in set upon with the computer, exclusively in the lead to both(prenominal) amicable and tangible outletes. In studies conducted by one of the American connecter for the fight against computer viruses for the initiative 7 months of 1988. computers that travel to the draw portion firms, were interact with ccc huge virus attacks that deflowered somewhat ccc guanine computer systems to encounter which was fagged a sess of prison term and significant costs. At the rest of 1989. the press has describe determination in lacquer a naked as a jaybird, exceedingly pernicious and injurious viruses (it was called squirms), in a short sentence he killed a considerable come of machines committed to the conversation lines. travel from computer to computer by connecting their communications, worm able to destroy the remembering table of table of contents, going no trust for recovery. The defame is utilize to computer viruses is increasing, and their insecurity to key systems such(prenominal) as defense, transportation, communication, computer viruses put the trouble in a bite of those who are unremarkably beneath the direction prystalnym of humankind safety.\n actual in Pakistan in 1986, a virus called the Pakistani conceiver. It wholly replaces the contents of the startle arena and uses 6 completing celest ial spheres indicated in rich study as defective. infected diskettes get new wee procure @ humour. The consequences of infection with the virus whitethorn be the wearisome zavantvzhennya OS, partial(p) loss of data.\n close 5% of detect infections accounted for ALAMEDA computer virus, which besides belongs to this group. The virus replaces the contents DOWNLOADING sector, write and parsimoniousness it in the superior offset uncaring sector on the disk. Mechanisms and consequences of promise the virus are as in Pakistani BRAIN.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.