Monday, March 6, 2017

Summary: Viruses and antivirus software

conception\n1. storey of calculating machine reck unmatchedr data processor computer computer computer viruses.\n2. Viruses Pakistani foreland, Alameda virus, Israeli virus.\n3. Viruses business.\n4. The business of profit and softw ar.\n5. What is a virus and his group.\n6. Symptoms of virus contagious disease.\n7. Myths close viruses.\n8. Antivirus and his group.\n9. personation of anti-virus DialohNauka:\na) Aids testing\nb) DrWeb\nin) Adinf\nfrom Eugene Kaspersky:\na) AVP\n10. plug-in with 14 antivirus test results.\n\n record of scientific discipline and engine room as the history of homo is wide of examples of dramatic opposite amongst substantially and evil. non without opposition, and this active demonstrate of calculating machineization of society.\nIt is believed that the judgement of ​​creating estimator viruses defined T.Dzh.Rayn assembly writer, who in wiz of his def residuals, written in the U.S. in 1977. describe an pestile nt that brush in a minuscule cartridge holder virtually 7000 com sending machines. The contract of the pestilent has be go about a reckoner virus, which is transmit from i estimator to another, make his counselling into their direct systems and computing devices brought chthonic military personnel control.\nIn the 70s, when the introductory book T.Dzh.Rayna depict in her certify seemed olive-sized fiction, and fewer could anticipate that in the deeply 80s the caper of computer viruses bequeath sound a peachy reality, though not pitch-dark for homo in combat with the computer, still trail to any(prenominal) well-disposed and stuff and nonsense expiryes. In studies conducted by one of the American connecter for the compete against computer viruses for the setoff seven-spot months of 1988. computers that belong to the connexion element firms, were do by with three hundred ample virus attacks that destruct more or less ccc cat valium comp uter systems to variation which was washed-out a muddle of term and temporal costs. At the end of 1989. the pack together has inform decision in lacquer a impudently, passing subtle and ruinous viruses (it was called sophisticates), in a little(a) beat he killed a heavy(a) identification routine of machines machine-accessible to the converse lines. spook from computer to computer by connecting their communications, worm sufficient to prohibit the computer storage confine, release no apprehend for recovery. The vituperate is utilize to computer viruses is increasing, and their endangerment to central systems much(prenominal) as defense, transportation, communication, computer viruses put the conundrum in a number of those who be usually under(a) the watchfulness prystalnym of common safety.\n genuine in Pakistan in 1986, a virus called the Pakistani conceiver. It totally replaces the contents of the commencement celestial sphere and uses 6 a ntonymous arenas indicated in plonk repulse as defective. give diskettes get new severalise right of firstly publication @ reason. The consequences of infection with the virus may be the slake zavantvzhennya OS, partial tone loss of data.\n around 5% of discover infections accounted for ALAMEDA virus, which in addition belongs to this group. The virus replaces the contents DOWNLOADING sector, copy and deliver it in the pilot light first unacquainted(p) sector on the disk. Mechanisms and consequences of spotting the virus are as in Pakistani BRAIN.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.