Upload
tisham5ooooo
View
114
Download
6
Embed Size (px)
Citation preview
Tisha Wilson
July 14 2011
Eng 1213
Cause and Effect Essay
Malware and Viruses
Along with viruses, one of the biggest threats to computer users on the Internet
today is malware. It can hijack your browser, redirect your search attempts, serve up nasty pop-
up ads, track what web sites you visit, and generally screw things up. Malware programs are
usually poorly-programmed and can cause your computer to become unbearably slow and
unstable in addition to all the other havoc they wreak. “Malware is a term used to describe
software that is intentionally installed on a computer to gather information or cause problems for
the user” (Teacher Librarian).
Many of them will reinstall themselves even after you think you have removed
them or hide themselves deep within windows making them very difficult to clean. You can get
infected by malware in several ways. Malware often comes bundled with other programs Kazaa,
iMesh, and other file sharing programs seem to be the biggest bundlers (eWeek). Malware
programs, usually pop-up ads sending revenue from the ads to the program's authors. Others are
installed from websites, pretending to be software needed to view the website. Still others, most
notably some of the Cool Web Search variants, install themselves through holes in Internet
Explorer like a virus would requiring you to do nothing but visit the wrong web page to get
infected. The vast majority however must be installed by the user. Unfortunately, getting infected
with malware is usually much easier than getting rid of it, and once you get malware on your
computer it tends to multiply.
A computer virus is a potentially damaging computer program designed to affect
or infect your computer negatively by altering the way it works without your knowledge or
permission. More specifically, a computer virus is a segment of program code that implants itself
in a computer file and spreads systematically from one file to another. Viruses can spread to your
computer if an infected floppy disk is in the disk drive. When you boot the computer if you run
an infected program or if you open an infected data file in a program, depending on the virus
certain actions can trigger the virus. Many viruses activate as soon as a computer accesses or
runs an infected file or program.
Other viruses, called logic bombs or time bombs, activate based on specific
criteria. A logic bomb is a computer virus that activates when it detects a certain condition. An
example would be a disgruntled worker planted a logic bomb that began destroying files when
his name appeared on a list of terminated employees. A time bomb is a type of logic bomb that
activates on a particular date. A well-known time bomb is the Michelangelo virus, which
destroys data on a hard disk on March 6, Michelangelo’s birthday. Some might call it a
“Terrorist” virus (Maclean's).
Another type of malicious program is a worm. Although, often it is called a virus.
A worm unlike a virus does not attach itself to another program. Instead, a worm program copies
itself repeatedly in memory or on a disk drive until no memory or disk space remains. When no
memory or disk space remains, the computer stops working. Some worm programs even copy
themselves to other computers on a network. Once it escapes into the general culture there will
be no way back (Communications of the ACM).
Anti-virus companies are only beginning to pay attention to malware. Aside from
some of the latest versions many include the malware scanner in the Internet security most anti-
virus programs have little to no protection. Those anti-virus programs that do protect are
generally not as thorough as a dedicated malware remover. However, some especially virulent
malware that malware scanners may miss will be removed by anti-virus programs. So it is
generally a good idea to run a virus scan as well. Some of the anti-virus vendors' delay may be
caused by worries they will get sued if they start labeling programs spyware, adware, etc., which
has already happened. The signature files and data updates are what make an anti- virus
programs effective (Information Systems Security).
Although, there is no official breakdown we can divide malware into several
broad categories of malware: adware, spyware, hijackers, and toolbars. Many if not most
malware programs will fit into more than one category. It is very common for people to use the
words adware, spyware, and malware interchangeably. Most products that call themselves
spyware or adware removers will actually remove all types of malware. Adware is the class of
programs that place advertisements on your screen. These may be in the form of pop-ups, pop-
unders, advertisements embedded in programs, advertisements placed on top of ads in web sites,
or any other way the authors can think of showing an ad. The pop-ups generally will not be
stopped by pop-up stoppers and often are not dependent on your having Internet Explorer open.
They may show up when you are playing a game, writing a document, listening to music, or
anything else. Should you be surfing the advertisements will often be related to the web page you
are viewing.
Programs classified as spyware send information about you and your computer to
somebody else. Some spyware simply relays the addresses of sites you visit or terms you search
for to a server somewhere. Many instances of spyware can carry out self-update automatically
which allows new functions to be introduced and can evade spyware signatures contained in anti-
spyware tools (Communications of the ACM). Others may send back information you type into
forms in Internet Explorer or the names of files you download. Still others search your hard drive
and report back what programs you have installed, contents of your e-mail client's address book
(usually to be sold to spammers), or any other information about or on your computer things
such as your name, browser history, login names and passwords, credit card numbers, and your
phone number and address. Spyware often works in conjunction with toolbars. It may also use a
program that is always running in the background to collect data, or it may integrate itself into
Internet Explorer, allowing it to run undetected whenever Internet Explorer is open. Spyware
succeeds today because information creates value to advertisers such as virus writers.
Toolbars plug into Internet Explorer and provide additional functionality
such as search forms or pop-up blockers. The Google and Yahoo toolbars are probably the most
common legitimate examples and malware toolbars often attempt to emulate their functionality
and look. Malware toolbars almost always include characteristics of the other malware categories
which is usually what gets it classified as malware.
Hijackers take control of various parts of your web browser. Including your home
page, search pages, and search bar. They may also redirect you to certain sites should you
mistype an address or prevent you from going to a website they would rather you not, such as
sites that combat malware. Some will even redirect you to their own search engine when you
attempt a search. Hijackers almost exclusively target Internet Explorer. Badly infected systems
may require a clean reinstallation of all their software in order to return to full functionality.
There are many PC surveillance tools that allow a user to monitor all kinds of
activity on a computer ranging from keystroke logger, screen capture, snapshots, email phishing,
and chat logging. These tools are often designed for parents, businesses and similar
environments and can be easily abused if they are installed on your computer without your
knowledge.
Companies are becoming more aware and threatened by the fact that their
computers are prone to attack. Virus scanners are becoming necessities on all machines.
Installing and monitoring these virus scanners takes many man hours and a lot of money for site
licenses. Many server programs are coming equipped. Computer fraud and computer crime are
very prevalent issues facing every computer user. This ranges from system administrators to
personal computer users who do work in the office or at home. Computers without any means of
security are vulnerable to attacks from viruses, worms, and illegal computer hackers. If the
proper steps are not taken, safe computing may become a thing of the past. Many security
measures are being implemented to protect against illegalities.
Malware and viruses prevention has become a major issue in the computer world.
They come in many types and come into your computer in many ways. There are ways to protect
your computer from these nasty things. However, you must keep on protecting it and not let your
guard down.