Qahhorov nursulton’s english tasks!!! Hemis tasks tasks 4: score -5 unit 8: security and safety lesson 21. Computer threats. It security and safety. Task 1



Download 404,03 Kb.
bet5/6
Sana02.07.2022
Hajmi404,03 Kb.
#731881
1   2   3   4   5   6
Bog'liq
5ygEAQz0aK7WtJg9aT-GnTFxNJl2O pc

What Viruses Don't Do
Computer viruses don't infect files on write-protected disks and don't infect documents, except in the case of Word macro viruses, which infect only documents and templates written in Word 6.0 or higher. They don't infect compressed files either. However, applications within a compressed file could have been infected before they were compressed. Viruses also don't infect computer hardware, such as monitors or computer chips; they only infect software.
In addition, Macintosh viruses don't infect DOS-based computer software and vice versa. For example, the infamous Michelangelo virus does not infect Macintosh applications. Again, exceptions to this rule are the Word and Excel macro viruses, which infect spreadsheets, documents and templates, which can be opened by either Windows or Macintosh computers.
Finally, viruses don't necessarily let you know that they are there - even after they do something destructive.
Types of Computer Viruses
Nowadays number of viruses is about 55000. It increases constantly. New unknown types of viruses appear. To classify them becomes more and more difficult. In common they can be divided by three basic signs: a place of situating, used operation system and work algorithms. For example according these three classifications virus Chernobyl can be classified as file infector and resident Windows virus. Further it will be explained what it means.


B DEFINE ANTIVIRUS 
Antivirus software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such. Antivirus programs function to scan, detect and remove viruses from your computer. There are many versions and types of anti-virus programs that are on the market. However, the prime objective of any antivirus program is to protect computers and remove viruses once detected.
Most antivirus programs incorporate both automated and manual filtering abilities. The instant scanning option may check files - downloaded from the Internet, discs that are embedded into the PC, and files that are made by software installers. The programmed scanning process may likewise check the entire hard drive on a day-to-day basis. The manual scanning system enables you to check single documents or even to scan the complete network at whatever point you feel it is necessary.
Since new infections are always being made by PC programmers, antivirus programs must keep an updated database of the most recent malware codes. This database incorporates a list of "malware definitions" that the antivirus software implements when filtering records. Since new infections evolve every day , it is essential to keep your product's infection database up and coming. Luckily, most antivirus programs naturally refresh the infection database all the time.
While antivirus software is basically intended to ensure complete protection for PCs against virus infections, numerous antivirus programs now secure against different sorts of malware for example, spyware, adware, and rootkits as well. Antivirus software may likewise include firewall features, which anticipate unapproved access to your PC. Utilities that incorporate both antivirus and firewall abilities are commonly called "Internet Security Suite".
While antivirus programs are accessible for Windows, Macintosh, and Unix platforms, most antivirus software is compatible with Windows operating system. This is on account of the fact that most infections are focused towards Windows PCs and subsequently virus protection is particularly imperative for Windows clients. If you are a Windows user, it is important to install a third party , feature-packed, robust antivirus program on your PC. Comodo Antivirus has been the best and compelling solution to outsmart even the zero-day and unknown threats with efficient features and technologies like default-deny protection, Host Intrusion Prevention, Auto sandboxing solutions and Containment technology.

Download 404,03 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish