Professional Documents
Culture Documents
Hackers and Viruses
Hackers and Viruses
1.- REPLICATE
Replication is the process of copying and keeping up to date, the data in various modes of
databases, whether persistent or not.
2.- HACKER
A person with strong computer skills who is dedicated to detecting security flaws in computer
systems.
3.- LOG IN
is the process that controls individual access to a computer system by identifying the user using
user-provided credentials.
4.- VIRUS
5.- HOST
is any computer connected to a network through a defined domain and IP number. Its function is
to provide resources, information and services to users.
6.- INFECT
Viruses that are hidden in the Random Access Memory (RAM) of a computer and that in turn
affect files and programs at the precise moment they begin to be executed.
8.- PIGGYBACKING
is a bidirectional data transmission technique at the data link layer. With this technique, instead of
sending ACK (ACK is a short message, in which the receiver informs the sender that it has received
the data sent) in an individual packet, it is included in the next packet to be sent.
Computer viruses affect a company in a very serious way, as it seeks to steal valuable information
from the company to sell or disseminate it, or to encrypt the information and then charge money,
so that the company can regain access to it.
The best thing to do is to disconnect the computer from the business or home network, since this
is the way in which information can be sent from our computer to the attacker, in addition to this
it is advisable to take it to an expert in computer security so that he can make a computer forensic
analysis, to identify if there was stolen information.
III.- Read the newspaper article. Then answer the question below.
Lincolnshire Bank
(Wilmington) Donald Green has been arrested by Interpol on computer hacking charges. Interpol
claims that Green, a computer hacker, planted viruses on unwitting host computers. It is thought
that Green uses a method called piggybacking to gain access to computers when their owners
logged in. This gave him access to the computers protective firewall allow him to disable it.
Interpol says that Greene has done over $50 million in damage. Most of this damage was done
when he used overwriting viruses to overwrite and destroy files on government computers
systems. But Green targeted home computers, too. For these, antivirus software was unable to
stop Greene's viruses because he included anti-antivirus-viruses with them. These viruses
essentially shut down antivirus-software. Green is also alleged to have used resident viruses. These
viruses imbed themselves in a file or disk drive. When resident extensions are included with them,
they become part of the computer's operating system. This makes them nearly impossible to get
rid of. As with all viruses, Greene's viruses are said to have replicated themselves quickly to infect
multiple computers.
V.- Read the newspaper article. Then, choose the right answers.
a.-overwriting viruses
1.E
2.G
3.B
4.D
5.A
6.C
7.F
VI.- Write a word that is similar in meaning to the underlined part.
4.- If the virus becomes a part of something else, it will be hard to delete
_i_ m _b_ _e_ _d_ s
5.- Viruses that become part of files but do nothing until activated can go unnoticed for months.
r_e_ _s_ _i_ d _e_ _n_ t _V_ _I_ r _U_ s _E_ _S_
VII.- Listen to a conversation between an employee and his manager. Mark the following
statements as T (TRUE) or F (FALSE)
EMPLOYEE: Have you seen this article in today's paper? The one about the 1. hacker?
EMPLOYEE: Well, I think the IT department needs to 2.- make some changes.
EMPLOYEE: Greene did millions of dollars' worth of damage by 3 destroying files. That could
happen to us.
EMPLOYEE: Exactly. I think these 5.- resident viruses and resident extensions are a problem, too.
EMPLOYEE: Well, these types of viruses 6.- implant themselves in files and disk drives.