![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
All About Computer Viruses
Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open. You might have a virus. Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway? Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don't bother to seek your permission at all! Very invasive. In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy's consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc. In this article, though, we're not talking about the good guys, or the agents. We'll be talking about the bad guys, the viruses. A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program. When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave. This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp. Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they're not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.) These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks. As far as web browsers are concerned, Microsoft's Internet Explorer takes most of the heat for spreading viruses because it's used by more people for web surfing than any other browser. Nevertheless, "Any web browser potentially has vulnerabilities," Nachenberg said. For instance, let's say you go to a website in IE you have every reason to think is safe, Nachenberg said. But unfortunately it isn't. It has virus code hidden in its background that IE isn't protecting you from. While you're looking at the site, the virus is downloaded onto your computer, he said. That's one way of catching a nasty virus. During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they're downloading that latest Justin Timberlake song, when in reality they're downloading a virus straight into their computer. It's easy for a virus writer to put a download with a virus on one of these sites because everyone's sharing with everyone else anyway. Here's one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk. Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves. Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it's "loading"? Well, once everything is "loaded," a virus in the email might just load onto your computer. So if I were you, I'd click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.) On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files. Worms sit in your working memory, or RAM, Nachenberg said. OK, so we've talked about how the viruses get into a computer. How do they cause so much damage once they're there? Let's say you've caught a classic virus, one that replicates and attacks various files on your computer. Let's go back to the example of the virus that initially infects your Microsoft Word program. Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect. This process of infecting targets and looking for new ones could eventually use up your computer's ability to function, he said. Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer's hard drive, Nachenberg said. There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment - the reason virus writers would want to waste their time creating viruses in the first place. The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind. For these other intentions, we first need to explain the "backdoor" concept. The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings. Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said. Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren't considered viruses because they don't replicate. Now back to the real viruses. Let's say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn't want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can't be traced. Hotmail email happens to be an example of one such place, Kuo said. OK, so the virus writers now control these computers. What will they use them for? One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said. That's right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don't want that. Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they're NOT from your internet service provider or your bank. They're from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers. Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said. Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know! ©2004 by Kara Glover Feel Free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know where it appeared: kara333@earthlink.net About The Author Kara Glover is a Computer Tutor and Troubleshooter. You can find her articles and tutorials on topics such as Microsoft Word®, Excel®, and PowerPoint® on her website: http://www.karathecomputertutor.com
MORE RESOURCES: Waltz and staff used Gmail for government communications, officials say The Washington Post Blocking 7-Eleven deal on security grounds would hurt Japan's image, head of state-backed fund says Reuters Pasadena school security officer accused of duct-taping 11-year-old girl's mouth shut for 'talking too much' ABC7 Los Angeles A week in security (March 24 – March 30) Malwarebytes Fight at maximum security unit precedes tour by state’s prison work group South Dakota Searchlight White House suggests national security adviser Mike Waltz received work-related emails on his personal Gmail account New York Post EU analysis highlights space capabilities, lists scenarios for space security by 2050 Industrial Cyber Musk Again Misleads on Social Security Fraud The New York Times Alaska Capitol will get airport-style security checkpoint, legislative panel orders Anchorage Daily News Forget Signal. National Security Adviser Waltz now accused of using Gmail for work - theregister.com Another security layer: BCSC proposes adding high school school security officers, and a school resource officer The Republic News Restaurant owner hires security guards after quadruple shooting; residents wonder if it is enough WBAL-TV Fortress Government Solutions receives impact Level 6 security accreditation from US Navy Industrial Cyber Native Community Protests MPLS Security Company Who Beat, Maced, and Cuffed Indigenous Man Unicorn Riot Mobile police installing new security cameras at city parks, following shootout at Langan Park fox10tv.com Lawmatics Achieves SOC 2 & HIPAA Compliance, Reinforcing Commitment to Data Security and Privacy LawSites Your smart home may not be as secure as you think Help Net Security Mike Waltz Faces Another Embarrassing Data Security Failure The Daily Beast Leaders Describe Host of Threats to Homeland, Steps to Mitigate Them U.S. Department of Defense (.gov) MPD: Driver of security truck issued several traffic citations after hitting pedestrian along S. Parkway East Action News 5 Breaking the Cone of Silence: The Jigsaw Puzzle of Operational Security Security Clearance Jobs The urgent reality of machine identity security in 2025 csoonline.com SCOTUS examines court’s role in national security Courthouse News Service Could drones replace school security guards? FOX 7 Austin City to receive $94K in Homeland Security grant funding Oil City News Pasadena school security guard fired after allegations she forced student to duct tape mouth Pasadena Star News Women in Security: Tia Eskandari, Senior Director, Allied Universal Security Sales & Integration Security officer made Pasadena middle schooler duct-tape her own mouth shut, father says Los Angeles Times Value per Security Business Wire Two new security K-9s join Lehigh Valley Health Network NBC10 Philadelphia LightPath Technologies to Exhibit Advanced Infrared Solutions at 2025 Border Security Expo PR Newswire BitLyft Gives Back to the Information Security Community GlobeNewswire The UK’s Cyber Security and Resilience Bill will boost standards – and increase costs csoonline.com ReliaQuest Closes $500M Round to Boost Agentic AI Security BankInfoSecurity "Credible Threat" to 2025 Chincoteague Pony Swim Prompts New Security Policies Chesapeake Bay Magazine Akron-Canton Airport has new security measure: K9 Luna Cleveland 19 News Israel’s National Security Council Warns of Increased Threats to Jews Abroad Ahead of Passover Algemeiner.com Winnetka hires private security to patrol village NBC 5 Chicago AI Agent and Copilot Podcast: Microsoft Exec Dorothy Li on Role of AI Agents, Ecosystem in Security Cloud Wars Northwest Dallas security guard fatally shoots man outside motel FOX 4 News Dallas-Fort Worth Oracle Cloud security SNAFU latest: IT giant accused of pedantry as evidence scrubbed theregister.com Senate Education Focuses On School Security, Classroom Aides West Virginia Public Broadcasting Hazleton Anesthesia Services warns of security breach Hazleton Standard Speaker Gun-detecting dogs join LVHN security team Times News Online MIT Wins $12.2B Contract to Drive Innovation for National Security at Lincoln Lab Security Clearance Jobs Motel security guard kills man after altercation in Northwest Dallas FOX 4 News Dallas-Fort Worth Secure Passage and Sunflower Labs Take Security to the Skies with Autonomous Drone Integration PR Newswire |
![]() |
![]() |
![]() |
RELATED ARTICLES
Technology and Techniques Used in Industrial Espionage Industrial Espionage. These methodologies are being used on a daily basis by competitors maybe even against you. Online Shoppers, Beware of a New Scam Beware of a New Scam Aimed at Bargain-HuntersTrying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information. Blogs as Safe Haven for Cybercriminals? To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. The Never Ending Spyware Story It's been with us since 1993, it's gotten more intrusive, more complicated.It's created a whole ecosystem, so to speak. Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. Corporate Security for Your Home Business The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations. Why Corporations Need to Worry About Phishing Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster. Computer-Virus Writers: A Few Bats In The Belfry? "Male. Obsessed with computers. Spy Scanners - Don't Compromise your Privacy Spies, spyware, internet parasites are among what they are usually called. These are scouts that monitor your web activities. Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER From: "Paypal Security"Subject: New Security RequirementsDate: Tue, 26 Jul 2005 19:20:51 -0800Dear valued PayPal® member,Due to recent fraudulent transactions, we have issued the following security requirements.It has come to our (attion)**Spelling Mistake**, that 98% of all fraudulent transactions are caused by members using stolen credit cards to purchase or sell non existant items. The Attack of the Advertiser - Spy Mother Spy The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap!We have some serious problems. Anti-Spyware Protection: Behind How-To Tips There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article". 3 Things You Must Know About Spyware 1)Spyware is on your system. Like it or not, statistically speaking, you probably have spyware on your machine right now. All About Computer Viruses Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open. Whats All This I Hear About Firewalls? At this point, if you've got the whole "turning the computer on" thing down; you are ready to learn about firewalls. Whether you use your computer for business or pleasure, it is important to have a firewall. Phishing-Based Scams: A Couple of New Ones Phishing in its "classic" variant is relatively well-known. Actually, 43. Spyware Attacks! Windows Safe Mode is No Longer Safe Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware. Identity Theft - Dont Blame The Internet Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries. Mall Protection The Loss Prevention Manager should be receptive to the needs and objectives of upper management and work to prevent and reduce loss from crime, fire accidents etc.With the continuing threats brought to us by our AL Quaeda and Taliban enemies and the outbreak of new TV shows that reinforce the danger we all face on a daily basis, one must look within as to how we can protect ourselves from threats both real and imagined. Spyware Programs Are Out To Get You! The average computer is packed with hidden software that can secretly spy on online habits.The US net provider EarthLink said it uncovered an average of 28 spyware programs on each PC scanned during the first three months of the year. ![]() |
home | site map |
© 2006 |