6.0  AN OVERVIEW OF COMPUTER VIRUS

Symptoms of virus attack:


The following examples may be indications that a computer has been infected with a virus. Although these problems can be caused by a non-virus problem, they are the most reported symptoms of an infection.

1.             Programs take longer to load than normal.

2.             Computer's hard drive constantly runs out of free space.

3.             The floppy disk drive or hard drive runs when you are not using it.

4.             New files keep appearing on the system and you don't know where they came from.

5.             Strange sounds or beeping noises come from the computer or keyboard.

6.             Strange graphics are displayed on your computer monitor.

7.             Files have strange names you don't recognize.

8.             Unable to access the hard drive when booting from the floppy drive.

9.             Program sizes keep changing.

10.         In Windows 95, 32-bit errors keep occurring or Windows refuses to use 32-bit file or disk access.

11.         Conventional memory is less than it used to be and you can't explain it.

12.         Programs act erratically

Mode of Virus attack

A virus may be entered into a system by an unsuspecting user who has been duped by the virus creator (Covert entry), or it may be entered directly by the creator. (Overt entry.)

Examples of Covert entry of a virus into a computer system.

A "carrier" program such as a "pirate" copy of a commercial package that has been tampered with, is utilized by the un-suspecting user, and thus enters the virus code into the system.

Other types of carriers could be programs from Bulletin Boards that have been either tampered with or specifically designed as viruses, but disguised as useful programs. There has even been a destructive virus disguised as a "virus protection" program on a BBS.

The user unknowingly acquires an "infected" disk and uses it to boot the system.
The virus has been hidden in the system files and then hides itself in system RAM or other system files in order to reproduce, and later, attack.

Examples of Overt entry into a computer system.

An individual bent on harassing the user or sabotaging the computer system, modifies an existing program on that computer or copies a virus program onto someone's disk during their absence from their work station.

There are several ways you can get a virus... Most common of them are listed below

1)   FLOPPY DISKS: "It's 10 o'clock... do you know where your child is?" Or rather, do you know where that floppy disk has been? Even the most trusted of friends might hand you a computer virus on that disk. And don't think brand new, straight-out-of-the-package software is always virus free!

2)   THE INTERNET: Since this Internet itself is becoming wildly popular, obviously, so are attaching viruses to Internet files. Someone could very easily post a desktop theme or a screen saver on the Internet, you download and run it (install it), and you're now infected. Thankfully most reputable sites scan all their files that are uploaded for viruses. Just browsing the Internet does not put you in danger of catching a virus: you must download AND install (run) the file first (again, downloading it alone will not infect your computer).

3)   EMAIL: Here's where some misconceptions have been born: "I read an email the other day and it attached a virus to my computer". Sorry. It doesn't work that way. Only an .EXE or .COM (or some similar executable) file can contain a virus. SO although you can't catch a virus from the email itself, be careful of those attachments. And watch out for those of you that use such programs as Microsoft Word as your email reader. Many emails are sent in a MS Word format, and, guess what? Those are executable attachments! If you're set up to AUTOMATICALLY use MS Word as your reader, you might "execute" the virus by simply reading the email.

4)   NETWORKS: The last network I was on (a large telecommunications company) had some very strict rules and measures in place to protect them. But even with all that, they're not immune. The nature of networks (hundreds or thousands of computers - called workstations - hooked together by a large computer - called a server) forces systems to freely pass common information back and forth. For example, one file might be used by several groups within a network so only one copy is maintained and all the computers in those groups will have access to it. If it's infected, so then might ALL the users in that group.

How does virus spread?

A virus may reproduce itself by delaying its attack until it has made copies of itself onto other disks (Active reproduction,) or it may depend entirely on unsuspecting users to make copies of it and pass them around (Passive reproduction). It may also use a combination of these methods.

Triggering of virus attack : Attacks begin upon the occurrence of a certain event, such as: On a certain date. At a certain time of day. When a certain job is run. After "cloning" itself n times. When a certain combination of keystrokes occurs. When the computer is restarted.
One way or another, the virus code must put itself into a position to either start itself when the computer is turned on, or when a specific program is run.

Distinguishing between virus and bug : This can be a tough one. With the publicity surrounding viruses, many people are ready to believe that any strange occurrence while computing may have been caused by a virus, when it could simply be an operational error, hardware component failure, or a software "bug."

While most commercial software developers test their products exhaustively, there is always the possibility that some combination of hardware; mix of installed TSR's; user actions; or slight incompatibilities with "compatible" or "clone" machines or components; can cause a problem to surface.

We need to remember some key points here:

1. Examine the probabilities of your having contacted a virus.

2. Don't just assume that you've been attacked by a virus and abandon your normal troubleshooting techniques or those recommended by the product manufacturers.

3. When in doubt contact your supplier or the manufacturer for tech support.

4. Having an effective "Virus Protection" system installed may help you determine the cause of the problem.


 

Copyright © 2001 Selfonline-Education. All rights reserved.