FOYDALANILGAN ADABIYOTLAR ROʻYXATI
1.
Pandemiya sharoitida 2020-2021 o‘quv yili uchun: KO‘RSATMALAR.
Respublika Ta`lim Markazi BMT Bolalar jamg‘armasi (UNICEF). Toshkent, 2020.
2.
Informatika va axborot texnologiyalari. Ma’ruza matn. Toshkent – 2015.
3.
E.M.Mamarajabov, S.N.Xaytullayeva. “Informatika o‘qitish metodikasi” o‘quv
qo‘llanma. Toshkent-2017.
FOYDALANILGAN INTERNET MANZILLARI:
1.
www.tami.uz
2.
www.library.ziyonet.uz
3.
www.uz.infocom.uz
4.
www.kfdvgtu.ru
95
ФИО автора:
Yuldasheva Nabiraxon Xoldarovna
Teacher, Kurgantepa Public Health College after name Abu Ali Ibn Sino, Andijan,
Uzbekistan
Название публикации:
«METHODS OF PROTECTION FROM COMPUTER
VIRUSES»
Annotation:
This article discusses computer viruses, their classification, types,
ways of spreading viruses, their negative impact on computer performance, anti-virus
programs and their effectiveness.
Keywords:
computer, virus, antivirus, damage, flash memory.
СПОСОБЫ ЗАЩИТЫ ОТ КОМПЬЮТЕРНЫХ ВИРУСОВ
Юлдашева Набирахон Холдаровна
Преподаватель, Кургантепа, Техникум общественного здравоохранения имени
Абу Али ибн Сино, Андижан, Узбекистан
Аннотация:
В статье рассматриваются компьютерные вирусы, их
классификация, типы, способы распространения вирусов, их негативное влияние
на производительность компьютера, антивирусные программы и их
эффективность.
Ключевые слова:
компьютер, вирус, антивирус, повреждение, флеш-
память.
Main part
A computer virus is a specially written program that is not large in size, it can
"write" itself to other programs, as well as perform various unpleasant actions on the
computer. When such a program starts running, it first takes control of the virus. The
virus finds and "infects" other programs, as well as performs some malicious actions
(for example, corrupts the disk or file location table on the disk, "contaminates" the
cache).
96
The program where the virus is located will continue to work as usual. It is not
known from the outside that the program is infected. Many types of viruses are
structured in such a way that when you run an infected program, the virus stays in the
computer's memory permanently and from time to time infects programs and performs
malicious actions on the computer.
Most existing viruses prefer kernel system files because on most modern
computers the file system loads the same, for example viruses often merge into a
Command.com file and spread to other disks and directories with the DIR command.
In most cases, system damage occurs when the input and output process is addressed
In fact, viruses use all sorts of ways to attach to systems, so there are no systems
that are not infected.
Damaged flash memory is the main way viruses enter computers. Viruses are
becoming more and more restless and fearless, and even the most advanced antivirus
programs are unable to fight them. There are viruses that hide in non-energy-dependent
memory, making it very difficult to clean the system. No one can guarantee that even
a compressed program that has a real brand name is virus-free. There are also cases
where viruses are located during the stamping process of CD ROMs.
Virus activity basically has 4 phases;
- sleep phase;
- reproductive phase;
- start-up phase;
- destruction phase.
The inventor of the virus can use the sleep phase in order to gradually gain the user’s
trust, as this does not allow the virus to multiply and corrupt the data.
There are now more than 50,000 computer viruses that threaten the reliable storage
of data on a computer and cause various problems during computer operation.
Therefore, it is important to be familiar with computer viruses, their types, the harm
they cause, and the measures to be taken to protect against them.
Viruses are divided into the following types:
97
Viruses that infect executable files. Multiplies by overwriting executable files in
order to break them.
Documents, documents, database viruses. Examples of these are Winword's macro
viruses. They perform malicious actions, such as breaking the formats of the data
in the documents and restricting the ability to open and process them.
Viruses that infect computer hard drives and the BOOT sectors of EMDs. This
virus infects the BOOT sectors in the program, which are the operating system boot
sectors of the HDDs, thereby losing the ability to read data on the HDDs. They often
operate in a RESIDENT position. Random access memory runs from the time it
accesses the HDD until the computer completes its work (unless the computer has been
scanned for viruses in the meantime).
Invisible viruses (Select) Such viruses do not exist in a separate file view.
Signs of a computer virus infection. There are a number of strange things that
happen when a computer is damaged:
Some programs do not work or start working poorly;
Other messages or characters start to appear on the screen;
Computer performance slows down;
Some files become corrupted or their size changes due to the addition of various
records;
RAM space is reduced; it becomes difficult to load programs from the system
flash memory, or does not load at all, and so on.
The best type of protection against computer viruses is to know how the viruses
are affected. Viruses are simple programs and do not have any strange power.
For a computer to be infected with viruses, any infected software on it needs to
run. Therefore, primary damage to the computer occurs in the following cases:
Installation of infected programs, system and device drivers (SOM, VAT or EXE
files) or module infected program on the computer;
Loading viral flash memory into the computer;
Reading or using anonymous information from the Internet.
98
It can be protected from viruses in the following ways:
When reading data from flash memory, be sure to check for viruses with the help
of antiviruses;
Restriction of illegal use of information, in particular, not to use the program and
data in cases where the owner (author) is unknown;
Restricting access to suspicious SITES via the Internet and not receiving
information from it;
Use of special anti-virus programs (antiviruses). Also, one day a week, a full and
optimal (weekly) virus scan of computers;
It is necessary to update the antivirus database of anti-virus programs on a
monthly basis.
Examples of damage caused by a virus include:
Contamination of a computer hard drive or RAM is a virus that can fill the entire
hard drive with its own dots or other signs during software replication.
It can also write these to the cache and thereby reduce its size;
File location table corruption. If it is corrupted, it will not be possible to read the
desired file and directory from the disk;
Data corruption in the boot sector. The boot sector is a special program on the disk,
the violation of which stops the disk;
Disk reformatting - all information on the disk is completely lost;
Can output any message to the disc or play any tune. In many cases, this message is
incomprehensible;
Computer self-restart;
A set of buttons stops work;
Changes in the contents of program and data files.
Antiviruses are programs that serve to detect viruses and stop them from working.
Infection from a simple virus can be easily detected using anti-virus software, (having
a complex structure) viruses are difficult to detect by this method because they change
their appearance during self-copying. Applications that work with macros can be
99
infected with macroviruses. Macroviruses are commands that are taught along with
information. Examples of such applications are WORD, EXCEL, and POSTSRIPTER
interprojectors. They are infected with a macrovirus when they open a data file.
Previously, only disks were infected with the virus. Because viruses passed from
computer to computer via disks. New VVS viruses are spreading through modems. The
advent of the internet has led to the creation of another channel that traditional methods
of fighting viruses do not benefit.
The likelihood of being infected by viruses increases in proportion to the
frequency with which new files and applications appear on your computer. The more
important the data on the computer, the higher the security measures against the virus
should be.
Indifference to these things can not only cause great material damage, but also
raise the question of the future activities of the organization or firm.
It should be noted that viruses usually occur as a result of the user performing an
action (e.g. installing applications, reading files from the network, establishing an
electronic connection, etc.). Therefore, special filters must be installed at the data entry
point. One such device is a product of Symantic Corporation. Symantic promotes the
idea of complex protection of the entire corporate network instead of a single machine.
The point of entry of the virus into the corporate network can be at any point from the
browser to the workstation.
Therefore, control is carried out at all stages. Symantic anti-virus software is
implemented in Dynamic Document Revion Corporation technology and also fights E-
mail viruses.
A special feature of antivirus software work is that the antivirus software
repository needs to be updated in a timely manner. There are also other types of viruses.
It is not enough to use general means of information protection when protecting against
viruses. This will require the use of special software. These programs can be divided
into several courses: detectors, vaccines (immunizers), doctors, auditors (programs that
monitor changes in the system areas of files and disks). Doctor-auditors and filters
(resident programs for virus protection).
100
Do'stlaringiz bilan baham: |