The Smooth Guide
to Internet Fundamentals
  • THE INTERNET
    • Attachments
    • Bits, Nibbles + Bytes
    • Bookmarks +Favourites
    • Browser Cache
    • Domain Names
    • Image Loading
    • Intranets + Extranets
    • Protocols
    • URLs
    • Viruses >
      • Hackers + Attackers
  • The Internet Architecture
  • EMail
    • A Packet + OSI/RM Layers
    • Adobe Acrobat Reader
  • Netiquette
  • THE INTERNET
    • Attachments
    • Bits, Nibbles + Bytes
    • Bookmarks +Favourites
    • Browser Cache
    • Domain Names
    • Image Loading
    • Intranets + Extranets
    • Protocols
    • URLs
    • Viruses >
      • Hackers + Attackers
  • The Internet Architecture
  • EMail
    • A Packet + OSI/RM Layers
    • Adobe Acrobat Reader
  • Netiquette
VIRUSES
__________________________________________________________________________________________________________________________
Picture

New and more threatening viruses appear daily.  They spread globally because they travel in the form of an executable email message and newsgroup article attachments.  On clicking the attachment, the virus automatically infects the computer.

On a network, viruses do not affect OSI/RM Layer 1 and 2 devices.  Cables, NICs, bridges, repeaters and hubs are immune to viruses.  Viruses usually affect programs running at the Application Layer - Layer 7.

MACROS
Small programs written in macro code for word processing or spreadsheet applications, such as Word or Excel.  When the infected file is opted, the macro is executed.

EXECUTABLE
These attach themselves to executable programs and are activated when the user launches the program.

BOOT SECTOR
These copy themselves to the boot sector of the hard drive, allowing them to be loaded into the memory each time  system is started.  Once in the memory, it may replcate itself to other drives and may completely erase the drive it accesses.

STEALTH
Avoids detection by redirecting hard drive read requests from the virus scanning software or by manipulating director structure information.  This causes the virus scanning program to miss the stealth virus in its scanning process, leaving the virus on the system.

POLYMORHIC
The most difficult virus to detect.  It has programming code enabling it to execute differently each time it is run, and avoids being detected by virus scanning software.

contact
SITE MAP
ACCESSIBLE AND FONT ADJUSTMENT

​Acknowledgement
CIW Foundation Course  -  
April 2001





 
This is not a commercial site
Copyright 2013 :  
​SMOOTH GUIDE TO INTERNET FUNDAMENTA
LS         
________________________________________________________
                              Visit other Smooth Guide sites:
                                www.animalsandenglish.com
                               www.englishlanguagetips.com
                              www.smoothguide-mahjong.com
                          www.smoothguide-photography.com

                            www.smoothguide-kenyacoast.com
                                www.smoothguide-sunbury.com