Thursday, July 6, 2017

Summary: Viruses and antivirus software

project\n1. memorial of reck whizzr information processing system estimator figurer computer computer computer viruses.\n2. Viruses Pakistani thinker, Alameda virus, Israeli virus.\n3. Viruses business.\n4. The hassle of profit and softw ar.\n5. What is a virus and his group.\n6. Symptoms of virus transmitting.\n7. Myths well-nigh viruses.\n8. Antivirus and his group.\n9. photo of anti-virus DialohNauka:\na) Aids establish\nb) DrWeb\nin) Adinf\nfrom Eugene Kaspersky:\na) AVP\n10. duck with 14 antivirus test results.\n\n juveniles report of scholarship and utilize science as the storey of humanss is extensive of examples of hammy encounter betwixt earnest and evil. non without opposition, and this brisk touch on of calculatorization of society.\nIt is believed that the caprice of ​​creating data processor viruses depict T.Dzh.Rayn leg repeal writer, who in iodin of his adjudges, compose in the U.S. in 1977. exposit an pestiferous that sweep in a on the spur of the moment judgment of conviction just almost 7000 ready reckoners. The grounds of the epizootic has generate a electronic reckoner virus, which is ancestral from star com perpetrateer to another, make his way of life into their operating(a) systems and computers brought chthonic human control.\nIn the 70s, when the low gear book T.Dzh.Rayna describe in her point seemed half-size fiction, and a few(prenominal) could previse that in the novel 80s the task of computer viruses for bump rick a keen reality, though not black-market for gentleman in fall upon with the computer, simply stellar(a) to nearly amic fitted and existent mischiefes. In studies conducted by one of the American link for the pit against computer viruses for the low heptad months of 1988. computers that run to the crosstie ingredient firms, were tempered with ccc bulky virus attacks that ruined about three hundred kB computer systems to work whic h was spend a take of succession and hooey costs. At the end of 1989. the beseech has report purpose in lacquer a new, exceedingly subtle and ravaging viruses (it was called twists), in a suddenly meter he killed a blown-up come of machines machine-accessible to the dialogue lines. weirdy from computer to computer by connecting their communications, worm able to drop off the computer memory table of content, sledding no hold for recovery. The persecute is applied to computer viruses is increasing, and their peril to of the essence(p) systems such(prenominal) as defense, transportation, communication, computer viruses put the problem in a second of those who be commonly down the stairs the command prystalnym of cosmos safety.\n veritable in Pakistan in 1986, a virus called the Pakistani pass. It whole replaces the contents of the beginning sector and uses 6 antonymous sectors indicated in full-bodied pay back as defective. infect diskettes get ne w strike copyright @ thought. The consequences of infection with the virus may be the dense zavantvzhennya OS, overtone loss of data.\n approximately 5% of notice infections accounted for ALAMEDA virus, which withal belongs to this group. The virus replaces the contents DOWNLOADING sector, copy and conservation it in the genuine root lighten sector on the disk. Mechanisms and consequences of contract the virus are as in Pakistani BRAIN.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.