Types of VirusesLogic bombs are specially written codes that are forcibly inserted into computer software to make it work in a destructive way, if certain conditions are met (clock time, or any action within a computer). The consequences of the activation of a logic bomb can be really horrible, sometimes even the destruction of the whole system. Viruses like to stick to the existing software. Every time you activate that software, the virus is activated as well, beginning its dark job of cloning itself. The most vivid examples of a virus, working on your computer, is shortage of virtual (RAM) as well as physical (hard drive) memory. Trojan horses are usually confused with simple viruses due to the way of their spreading. The interesting thing about this type of harmful software is that Trojan pretends to be not harmful at all. You think you have downloaded a piece of media, for example a film or a song, but after double-clicking on it, nothing happens. Nothing visible happens, however, you personally activated a Trojan that can either erase your data, send your personal information to somewhere else, or even crash the entire system. Worms also have similar duplicating method comparing to viruses. However, while viruses work usually with offline software, worms like to find security breaches in networks and then spread themselves through those security holes to other machines. The speed of duplicating is extremely high, thanks to online self-distribution. Computer viruses made the life of the society extremely vulnerable as well as dangerous. The world has seen a lot of examples where a few lines of code cost multimillion corporations the half of their wealth. Usually, viruses are created just for fun, however, there have been cases, when the vital communication as well as life support systems were damaged, consequently taking lives of innocent people. Therefore, it is extremely important to protect computer systems against virus contamination and, surely, look for a way to prevent those harmful programs from being created.
Dec 21, 2016 in Analysis Essay