- •Хакасский государственный университет
- •Part II Texts for Supplementary Reading
- •Предисловие
- •The main parts of the computer
- •Using a mouse
- •Lesson 2
- •Word-building (словообразование) (1)
- •Keyboard
- •Windows program keyboard shortcuts
- •Lesson 3
- •Buses and interfaces
- •Word-building (2)
- •Lesson 4
- •Structure (phrases)
- •A) “hardware”
- •B) “data”
- •Lesson 5
- •What is a microprocessor?
- •Pentium, pentium pro, pentium II and pentium III
- •Lesson 6
- •Word-building (3)
- •Lesson 7
- •General dram concepts
- •Structure ( 2)
- •Lesson 8
- •Storage media
- •Word-building (4)
- •Incompatible, unrecoverable, unavailable, unusable, unsuitable, non-removable, non-contiguous, non-volatile.
- •Structure (3)
- •Lesson 9
- •«Ware» terms
- •Section II. Software lesson 10
- •Structure (4) Ex.2 a) Read the sentences and analyze their structure:
- •Programming language generations
- •Lesson 11
- •Word-building (5)
- •What is object-oriented software?
- •Inheritance
- •Object-oriented languages
- •Lesson 12
- •General operating system concepts
- •Wysiwyg – structure (5)
- •Imperative sentences (commands and instructions) :
- •Starting and quitting windows nt
- •2.Using the desktop
- •Ex.5 Translate into English:
- •Ex.6 Say a few words about:
- •Revision (sructure)
- •Lesson 14
- •Ex.3 Translate into English:
- •Config.Sys commands
- •Ex.6 Agree or disagree:
- •Lesson 15
- •Ex.1 Translate the following technologies into Russian:
- •Ex.2 a) Read and translate into Russian:
- •Ex.5 Read and translate into Russian: operating system overview
- •Operating systems and file systems
- •Lesson 16
- •General database concepts
- •Ex.4 Choose the right synonym to the word ‘query’: a) requirement; b) retrieval; c) request.
- •Section III. Networking lesson 17
- •What is a network?
- •How are networks categorized?
- •How does p2p work?
- •Information transmission media
- •Lesson 18
- •Computing network components
- •Ex.10 Read and translate into Russian:
- •Ex.11 Translate into English:
- •Lesson 19
- •The internet
- •Internet protocols
- •Surfing The Net. By Shirley.
- •Lesson 20
- •Basic security and licensing terms
- •How bytes and bits work
- •System case
- •How pci works
- •Motherboard and system devices
- •Graphics adapter
- •How it works
- •System cache
- •Ethernet
- •Traditional ethernet
- •Fast ethernet
- •Gigabit ethernet
- •How a computer virus works
- •General virus types
- •All maliicous codes aren’t viruses
- •Intel software license agreement (Final, Single User) (abstract)
- •Glossary
- •Defragment
- •Device Driver
- •Formatting
- •Operating system
- •Plug-n-Play
- •Program
- •Vesa Local Bus
- •Virtual Memory
- •It Crossword Puzzle
- •Answer keys
- •It Crossword Puzzle
- •List of acronyms and abbreviations
- •1. Terms used in computer field
- •2. Basic abbreviations used in scientific field
- •3.Irregular verbs
- •Bibliography Основная литература
- •Справочная литература
How a computer virus works
Virus is a self-replicating piece of computer code that can partially or fully attach itself to files or applications, and can cause your computer to do something you don't want it to do.
Computer viruses can spread swiftly across open networks such as the Internet, causing billions of dollars worth of damage in a short amount of time. Five years ago, the chance you'd receive a virus over a 12-month period was about 1 in 1000; today, your chances have dropped to about 1 in 10. The vital statistics:
Viruses enter your system via e-mail, downloads, infected floppy disks, or (occasionally) hacking.
By definition, a virus must be able to self-replicate (make copies of itself) to spread.
Thousands of viruses exist, but few are found "in the wild" (roaming, unchecked, across networks) because most known viruses are laboratory-made, never released variations of common "wild" viruses.
Virus behavior can range from annoying to destructive, but even relatively benign viruses tend to be destructive due to bugs introduced by sloppy programming.
Antivirus software can detect nearly all types of known viruses, but it must be updated regularly to maintain effectiveness.
A virus is just a computer program. Like any other program, it contains instructions that tell your computer what to do. But unlike an application, a virus usually tells your computer to do something you don't want it to do, and it can usually spread itself to other files on your computer -- and other people's computers.
General virus types
While there are thousands of variations of viruses, most fall into one of the following six general categories, each of which works its magic slightly differently:
Boot Sector Virus: replaces or implants itself in the boot sector---an area of the hard drive (or any other disk) accessed when you first turn on your computer. This kind of virus can prevent you from being able to boot your hard disk.
File Virus: infects applications. These executables then spread the virus by infecting associated documents and other applications whenever they're opened or run.
Macro Virus: Written using a simplified macro programming language, these viruses affect Microsoft Office applications, such as Word and Excel, and account for about 75 percent of viruses found in the wild. A document infected with a macro virus generally modifies a pre-existing, commonly used command (such as Save) to trigger its payload upon execution of that command.
Multipartite Virus: infects both files and the boot sector--a kind of viruses that can reinfect your system dozens of times before it's caught.
Polymorphic Virus: changes code whenever it passes to another machine; in theory these viruses should be more difficult for antivirus scanners to detect, but in practice they're usually not that well written.
Stealth Virus: hides its presence by making an infected file not appear infected, but doesn't usually stand up to antivirus software.