Essays

Computer-Virus

Category : Essays



"A computer virus is a kind of software that in facts programs, data or dices and can reproduce itself in the same or other form. Despite till preventive measures, the viruses are becoming an order of the day. I 'irises are enemies of computers and destroy whatever is stored in it, innocently, calmly and intelligently."

It was Fred Cahen who incidentally coined the expression 'Computer Virus'. The term 'Virus' and 'worm' used in science fiction novels in the early 1970's. Around the same period, researchers at Xerox Corp., created and demonstrated a self replicating code, called viruses.

A virus is a program that can modify another program is deemed infected. This can also become an evolved copy of the original virus program. Every program that gets infected may also act as a virus and thus the infection multiplies. The key property of a virus is its ability to infect other programs. Every general purpose system currently in use is open to viral attack in some secure systems, virus tends to spread further when created by some user of the system. A virus has the potential to spread throughout any system which allows sharing. The virus can be generated and introduced by a hacker. The perpetrator gets the satisfaction of demonstrating human superiority over a cybernetic system.

With the advent of Internet a haven has been created for virus mongers. An important ongoing research involves detennining how quickly a virus could spread to a large percentage of computers in the world. Studies through simplified mathematical models of virus -spreading in typical computer networks have been going on. Obviously virus-like programs have to be written, injected imo systems and the effect has to be studied. In a simulated environment, the extent, speed and effect of infection is studied. Several experiments have been systematically carried out. The anti-virus program writers must be doing similar experiments before eventually bringing out their anti-virus packages.

 Virus study indicates a set of undecidable detection problems'. A list could be

as follows:

  • ·         Detection of a virus by its appearance.
  • ·         Detection of a virus by its behavior.
  • ·         Detection of evolution of a known virus.
  • ·         Detection of a triggering mechanism by its appearance.
  • ·         Detection of a triggering mechanism by its behavior.
  • ·         Detection of evolution of a known triggering mechanism.
  • ·         Detection of a viral detector by its behavior -
  • ·         Detection of evolution of a known viral detector.
  • ·         Safety of a protection scheme.

 

 

 

With networking becoming the order of the day, a virus may get initiated only through a particular node or through a few nodes and may give an appearance of having originated from some other node. A virus may also get kindled at some stages' of a program in an executable file and not necessarily whenever the program is called for.

Experts say that a virus need not be used only for evil purposes. A very interesting theory in compression through virus has been developed. It can be explained that a simple virus can be written to find uninfected executable file, compress them and insert itself into them. Upon execution the infected program decompresses itself and executes normally. Studies indicate that such a virus could save over 50 percent of the space taken up by the executable files in an average system, The performance of infected programs decreases slightly as they are decompressed,' and then the 'compression virus' implements a particular 'time space trade off.

Another example could be that a virus program can be written in such a way to find 'uninfected' executable. It will plant itself fat their beginning. After a given date and time the virus would cause the executable to 'refuse service' by going into an' indefinite loop. And in modem networking with the level of sharing that is prevalent, the entire system would become unusable as of that moment. Anti-virus operators might find a great deal of hard work is required to treat/undo the damage caused by such a virus.

Types of Viruses Non-TSR file virus :

This is the simplest form of virus to write-and the least effective, so one  unlikely to be troubled by them. When an infected program is first run, the virus code' carries out its task checking that an executable file in not infected, then attaching copy to it. It then runs the original program to which it is attached. In contrast, TSR viruses load themselves into memory when they are executed and are able to infect any executable program they can reach from that point.

Boot sector Virus:

This is the other major type of virus. Most of the boot sector consists of a simple, small program that is used to start DOS, or whatever operating system is installed, Boot sector viruses replace this with virus code and typically move the boot sector to another part of the disc. When the PC boot, the virus code is executed first. Then the virus runs the real boot sector. A very slow boot from an infected floppy with an excess of floppy disc activity is a common symptom of an infected machine.

Multipartite Viruses:

These combine both techniques. They can infect both boot sectors and files. The file version of Tequila', for example, infects the Master Boot Record. Once the PC has been booted from an infected MBR, the virus goes memory resident and infects all accessed. EXE files.

Companion Viruses:

Companion viruses create a .COM companion to an .EXE file. Because DOS executes .COM files before .EXEs. the virus is run before the .EXE file of the same name. The virus then runs tile original .EXE.

Polymorphic viruses:

These aim to foil anti-virus packages that search for a specific strain by looking for a known sequence of bytes. No two copies of a true polymorphic virus are alike. When polymorphic viruses run they first decrypt themselves and then behave like any other virus. Programs such as the 'Nuke Encryption Device' (NED) and the 'Trident Polymorphic Engine' have been written that turn a standard virus into a polymorphic . virus. Fortunately, once measures have been taken by an anti-virus company to defeat r each 'engine', all viruses processed by it are detectable.

Stealth:

Stealth covers a variety of techniques that viruses use to disguise their presence from anything as simple as hiding the increase in files size of executable to full-blown detection of the tools used to detect the virus and the taking of appropriate action to fool them.

Trojans:

Trojans are not viruses at all. They are programs that hide a malevolent code within a seemingly innocuous program but they do not replicate. For this reason the chances of being caught out accidentally by Trojans are low. Macro viruses: Macro viruses have been predicted for a while. It was recently appeared when it was sent out accidentally by Microsoft on a CD-ROM to OEMs. They called it a 'Prank Macro'. It is the first virus that will run on both PCs and Macs. It replicates using an auto-executing Word Basic macro embedded in a document. When the documents loaded, it copies the macro to Word's settings file NORMAL.DOT. and replaces the File Save command with a routine that also saves a copy of the macro in each document. PREVENTION FROM A VIRUS ATTACK The most fundamental precaution against virus attacks is to limit access to a machine to avoid tamper with the system. In case of floppy discs, the simplest form of protection is to place write-protect tabs on all discs so that any attempt by a virus to write to the disc would result in an error message. The write-protect tab should be  removed only when data has to be expressly written to the floppy.

 It should be remembered that even the simple act of inserting floppy disc and getting a directory listing can be enough to infect a machine. Though write-protect facilities are generally not available for hard discs, hardware products have started appearing in the market offering users the ability to write-protect hard discs. But bein; expensive, these are not likely to be used widely.

Software products to write-protect hard discs are also available. But the render themselves vulnerable to virus attack also. In network environments, the use of disk less or hard-disc-only systems is becoming popular. Control of software is then restricted to the file server and network administrators only.

Tips for Prevention of Virus Infection

Even if one buys and uses several anti-virus applications, the best defense is to avoid infection in the first place. There is no absolute guarantee against infection. But the risk can be minimized by following the guidelines listed below:

* Boot the system with a write-protected and already scanned floppy disc, which has the boot and system files and

set of files of a qualified virus scanned program.

* Even if there is a hard disc and the PC normally boots from that disc, start by first booting the system with the un

infected and write-protected disc boot floppy in the 'A' drive.

* All floppies should be scanned individually and periodically by using a qualified and uninfected virus scanning (or

detection) program.

* Discourage the use of floppies of other users unless these are individually scanned and checked for any virus.

* Do not use previously formatted floppies brought by others even if these are apparently empty. Reformat all

empty floppies with your uninfected system before further use.

* Avoid lending floppies.

* The most popular carriers of dangerous viruses are floppies containing different popular computer games,

horoscopes, astrological predictions etc. These should be avoided.

* Use of pirated software should be completely avoided as most of them are virus carriers.

* Take back-ups regularly. A full back-up once a week, with incremental back-ups daily, if necessary, is advisable.

Uninfected back-ups allow overwriting infected files. Even infected back-ups permit recovery from logic bombs. Disinfect restored files right away.

* Write-protect and back-up the installation discs before installing any new  software. If it is not done and the system

already has virus infection, the original program discs could be permanently infected during installation.

* Scan network drives used regularly. The files attached to E-mail messages may be infected.

* Use the memory-resident, virus spotting portion of the anti-virus application at all times. If an infection is

suspected, turn off the system immediately. Reboot from a clean floppy (one without an AUTOEXEC.BAT or a b.     CONFIG.SYS file). Then disinfect the system using a disc-based copy of y     the anti-virus program.

User should also have some basic knowledge about viruses, their prevention and cure. Use of good anti-virus software for scanning files regularly should invariably be used by each and every user. But a single software cannot be depended upon to eliminate infection from all strains of viruses. The battle against virus infection will be long and perhaps, lasting.

 

Vocabulary

1. preventive—cautionary, hindrance. 2. innocently—in a not unlawful manner. 3. calmly—sedately, in a sedate manner. 4. demonstrated—ascertained, established. 5- potential—likely, potency, expected, 6. perpetrator—culprit, someone who perpetrates wrongdoing. 7. cybernetic—of or relating the principles of cybernetics. 8. trigger— activate, induction. initiation. 9. decompresses--—depressurizes, relaxes. 10. polymorphic— having or occurring In several distinct forms. polymorphous. 11. seemingly—apparently, ostensibly .12. innocuous—harmless, unobjectionable. 13. replicates—doubles, repeats. 14. cunningly—in an attractive manner, artfully, trickily. 15. tamper—meddle, tamp. 16. infection—contagion, transmission. 17. eliminate—terminate or take out, decimate, obviate.


Archive



You need to login to perform this action.
You will be redirected in 3 sec spinner