You are on page 1of 4

VIRUSES ON MY COMPUTER

The increased use of networks, the INTERNET and the e-mail has accelerated the
spread of computer viruses. Currently more than 60 000 virus programs exist and
an estimated 6 new virus programs are discovered everyday.

1. What is a computer virus?

The aim of a virus program is to destroy data and to make a computer non-
functional. It is mainly introduced into executable programs. All .COM and .EXE
programs and application program files, are targets for viruses. People who have a
thorough knowledge of how systems work and also know programming deliberately
create these virus instructions. Viruses are very dangerous because a computer
virus reproduces itself, as does a normal disease virus.

Viruses can be MALICIOUS and very harmful in its actions. It destroys files with
valuable information. Viruses can also be NON-MALICIOUS and simply display
irritating messages or signs on the computer screen. No loss of data will occur.

A virus can be present in a computer for a time before it damages something. At


some or other time however it may surprise the user with a sudden and upsetting
reaction in the computer when switching on the computer. Networks and the
INTERNET are main sources for computer viruses.

2. Types of viruses

Boot-sector virus It replaces the self-load program, which the computer needs
when switching on the computer. While loading the virus is
loaded into the primary memory and from there it spreads to
any disk used in the computer. Examples of such viruses
are Stone, Michaelangelo and EXEBUG.
File virus This virus attaches itself to a program file or even replaces it.
From here the virus spread to any other programme or file,
accessing the infected file. Examples are Israeli, Sunday,
Durban.
Trojan horse The virus disguises itself in an allowable program and when
the program is activated, the virus is activated. This virus
cannot duplicate itself, but is very destructive and starts
working immediately.
Macro virus This virus uses macros in an application program (such as a
word processor or spreadsheet) to hide the code of the virus.
When the infected document is opened, the macro loads the
virus into the memory. If you ever attempt to open a
document and the macro warning appears, rather not open it.
Worm The worm doesn't attach itself to another program. A worm
worms itself into the memory or disk until there is no more
memory available. The computer starts running slower and
slower until eventually it completely freezes. Worms tend to
copy themselves from computer to computer via networks.
Time bomb The time bomb is activated on a specific day or time. The
Michaelangelo virus for example, was activated on 6 March –
Michaelangelo's birthday.
Logical bomb When the same keyboard key has been used a number of
times, or if a series of actions have been carried out, this
bomb is activated.
Cabir virus Viruses can nowadays attack even cell phones.

3. Symptoms of viruses

3.1 The computer executes instructions without the instruction of the user. The
message COPYING FILES appears on the screen while the computer user
did not give an instruction. The disk or hard drive becomes active without any
read or write action. The light of the drive burns which is an indication that
data is being written to the drive of read from the drive.

3.2 It decreases the RAM of the computer.

3.3 The system becomes slow and functionates very strange.

3.3.1 Bad clusters appear on a disk or on the fixed drive.

3.3.2 Internal etiquettes have been changed.

3.3.3 There is a sudden increase in the files on a disk.

3.3.4 Suddenly the character amount in an executive program file increases.

3.3.5 Dates on which files are created, are changed without any reason.

3.3.6 Programs suddenly take a long time to load.

3.3.7 The computer reacts slower than normally on programs or instructions.

3.3.8 Program or data files are damaged.

4. Precautions against viruses

4.1 Install an anti-virus program on the hard drive and regularly upgrade it.
Examples of anti virus software: DR. SOLOMON’S
ANTI-VIRUS TOOLKIT, NORTON ANTI-VIRUS, McAFEE ANTIVIRUS and
F-PROT.
4.2 Do not copy programs from electronic bulletin boards. It is dangerous to load
computer games and every new utility program. It is also a risk to load illegal
copied programs that you received from your friends.

4.3 Do not open strange e-mails. Especially when the message comes from
From a Friend.

4.4 Write-protect disks. Before using a disk, use an anti-virus program to test it.

4.5 Never switch on the computer while there is a disk in die A: drive. While
loading the computer searches the self-load program in the A: drive and a
virus may infiltrate the system.

4.6 Do not use disks on different computers and networks.

4.7 Before loading programs on the hard disk test it for viruses.

5. What does an anti virus program do?

An anti-virus program contains virus codes and these codes can immediately pick up
strange things in the computer memory or programs of files. As soon as a virus is
traced, the software does the following:

5.1 it erases the virus;

5.2 it placed the infected file or folder under quarantine (out of action).

6. Computer crime

Computer crime occurs when a user with special knowledge of computer technology
uses this knowledge to damage a computer or to harm other users. Customers,
suppliers of a company may get illegal access to the computer system. It is possible
that users of automatic teller machines can get hold of confidential passwords to
commit computer crime. Bookkeepers of large companies may possible transfer
money of the company to their personal accounts, etc.

6.1 Employers

Employers who have access to computers, can steal equipment, computer time and
programs of information from the owner. This occurs when the employer steals
confidential information or the employer uses the computer and the time of the
employee to gain extra income for himself. SPYWARE are programmes which are
copied and distributed illegally. COPYRIGHT PROGRAMMES ensure that
programmes cannot be copied. SHAREWARE can be shared and copied to a
certain extent, but the user must adhere to instructions on the screen when loading
the program. The user is actually morally bound to send an amount of money to the
author. This type of software can also carry viruses. TO COPY SOFTWARE IS A
CRIMINAL OFFENCE! PUBLIC DOMAIN SOFTWARE is completely free to be
used by everyone. Thus, these programmes are also prone to carry viruses.
PUBLIC DOMAIN SOFTWARE and SHAREWARE are usually downloaded from
bulletin boards. The risk of virus infections also exists.

6.2 HACKERS and CRACKERS

HACKERS are people who gain entrance to computers illegally just for fun or for the
challenge thereof. CRACKERS are the opposite of HACKERS. They also usually
gain unlawful entry, but their aim is to do damage. They write programmes to
destroy other programmes or documents. Some of these programmes can even
destroy complete computer systems.

You might also like