Computer Viruses Information Technology Essay Case Study.
Computer viruses have come a long way from the early days of personal computers, when teenage hackers competed for bragging rights, creating malware designed for mischief or random mayhem.
These techniques rely on the availability of ancient viral DNA or RNA, but most viruses that have been preserved and stored in laboratories are less than 90 years old. Molecular methods have only been successful in tracing the ancestry of viruses that evolved in the 20th century.
Computer virus, a portion of a program code that has been designed to furtively copy itself into other such codes or computer files. It is usually created by a prankster or vandal to effect a nonutilitarian result or to destroy data and program code. A virus consists of a set of instructions that.
A Windows 2000 machine infected by the Code Red II worm no longer obeys the owner. That's because the worm creates a backdoor into the computer's operating system, allowing a remote user to access and control the machine. In computing terms, this is a system-level compromise, and it's bad news for the computer's owner.The person behind the virus can access information from the victim's.
A BRIEF COMPUTER HISTORY. The computer as we know it today had its beginning with a 19th century English mathematics professor name Charles Babbage. He designed the Analytical Engine and it was this design that the basic framework of the computers of today are based on. Generally speaking, computers can be classified into three generations.
Conclusion. Viruses are very destructive programs that can be devastating to companies and individuals. Upon completion of this project students should be able to have an understanding of the following: what viruses are, how they get into a computer, how viruses can be avoided, how you get rid of viruses, and the best type of software used to prevent viruses.
Creeper virus is a computer virus that is most commonly recognized as the first computer virus. In 1971, Bob Thomas at BBN created Creeper as an experimental self-duplicating program that was intended not to inflict damage on, but to illustrate a mobile application. Creeper corrupted DEC PDP-10 computers operating on the TENEX operating system.