Home | About | Comments | Lectures | Notice | Registration

TODAY'S LESSON ...
Destructive Computer Programs :


Time : All lectures are designed to be completed in less than 30 minutes. This time includes the time necessary for registered students to answer questions and submit suggestions



Check out our sponsors infoDAM Technologies

JUNE 2000 PUBLIC LECTURE ...


Short Worm History

On November 2, 1988, a computer "worm" was introduced into the Internet. It replicated uncontrollably for several days by taking advantage of a flaw in the e-mail program "send.mail". Eventually, it infected over 6,200 computers nationwide, and overwhelmed the processing capabilities of many infected machines until they failed completely. The author of the worm did not write the worm to destroy data which it could have done easily, but to show that UNIX the most popular operating systems for internet servers had a security hole. The total monetary costs of his infection was estimated at US $98,253,260.

In May 1998, the Autostart Worm was discovered, it takes advantage of a QuickTime feature used with CDs to initiate itself on an operating system. The Autostart 9805 worm, the first ever worm, only effects Power Macintosh systems. It was originally found in Hong Kong and Taiwan, quickly spreading to four continents. AutoStart 9805 is capable of overwriting files with random data.

Virus Update

In May 2000, the "Love Bug" struck. It was called the fastest-moving and most widespread computer virus ever seen, affecting computer systems worldwide.

The original virus appears in emails as "I LOVE YOU," enticing people to open the message, only to cripple their email systems. One of its variants uses the word "joke" in the subject line.

By fooling users to think it is a joke it is acting more like a Trojan Horse than a virus.

In December 1999, Melissa an email virus clogged up email networks. It is believed that it was named after a stripper known to David Smith, 31 its author.

Protecting your system

1. Always have an anti-virus program properly installed. This program must be updated regularly. For users connected to the Internet it is advisable to update the signature file monthly.

- For users not connected to the Internet your major concern would be the diskettes you use on your systems. If you are using a diskette or diskettes that were used at some office that provides computer services to the general public you are in a very high risk group. You are a prime candidate for a computer virus attack.

2. The widespread use of email, combined with the use of more elaborate email messages, has provided an effective new means for viruses to spread.

As a rule do not open any email when you do not know from whom it is comming especially if it has an attractive name to interest you. Unfortunately a friend may send you an attachment which has a virus without knowing. To be sure don't even preview the attachments with programs like Microsoft Outlook. Simply delete the message without opening the file.

3. Stop using the Word .doc format; instead, save documents in pure Rich Text Format because this format does not support macro language viruses but still supports .doc formatting.

4. Change your CMOS boot-up sequence so that rather than booting from the A drive if you leave a floppy disk in your machine by accident , you boot from the C drive instead. This should stop all boot-sector viruses. Boot-sector viruses are in the boot sector of a bootable disk. This sector contains the startup code that actually loads DOS. All formatted diskettes are capable of carrying boot sector viruses. They can be quite a challenge to get rid of. Many persons have had to reformat the hard disk to clean it thus loosing all programs and all data.

The Alternative

There is of course another option. One that many have not taken seriously yet, no doubt due to the Marketing efforts of Microsoft. Switch completely form Microsoft applications and the Windows operating system. Use another operating system like Linux which does not have virus problems. Some say that as Linux becomes more popular then viruses will emerge but Linux has a better approach to security. Rather that the quick fix approach of using antivirus software which must be updated regularly the security hole is stopped. This model offers far better protection against the loss of data.

Although it is possible to write Unix-based viruses we have yet to see any instance of a non-experimental virus in that environment.

Conclusion

There are thousands of computer viruses and many work in different ways. One should have a good backup policy which ensures that the anti-virus program one uses is updated regularly. Document the recommended steps to clean viruses off your system. Have a hard copy easily available along with clean system bootable disks should a virus strike. There is no perfect solution. The best approach is to be eternally vigilant and or switch to a safer operating systems environment.

For more information visit :


Symantec for details on any virus
Subscribe to a newsletter



2 of 2 Back

Lesson Summary :
  1. Computer viruses are programs that are able to replicate themselves.
  2. Not all viruses are destructive. Some are benign.
  3. A Trojan horse can and often is as destructive as a harmful virus.
  4. A worm does not require a host program to become active. They can also be very destructive.
  5. Simple email messages are harmless. Attachments pose the serious threat.
  6. Educating oneself about computer viruses is important because there is no perfect solution to the problem.
  7. Some operating systems like Linux and Unix are less prone to virus attacks.
  8. It is important to keep ones anti-virus software uptodate.
  9. Some experts recommend using more than one antivirus program.


Registered students may contact the Director of Studies at: email: tutordam@yahoo.com
This is part of a series of lectures prepared by Information Technology Centre, a division of INFODAM, a company that specialises in Information technology. No liability is assumed for the information provided. It was prepared to assist individuals interested in becomming and staying computer literate. Information provided is for personal use only and should not be reproduced in any form without the written consent of the Director of studies.