Beruflich Dokumente
Kultur Dokumente
The computers programs may still continue to work normally, but also spread the virus
code to other machines on the same network, or machines that use the same storage devices.
Some viruses use polymorphic code to avoid detection by antivirus software, modifying
their decryption modules so that the virus changes each time it infects a new host.
The system protection against abuse of information
technology should include three types of protection:
SCANNERS
CRC SCANNERS
BEHAVIOUR BLOCKERS
NETWORK VIRUSES
This type of virus spreads through the global network - Internet. The way they are
spreading is varied. The most common way of spreading the virus is one of the
most commonly used Internet 19 service, e-mail. Besides e-mail, network virus
can 'earn' 'and in other ways - in the newsgroup, over IRC, ICQ or by downloading
unsolicited files. Many of these viruses take control of a computer, so that
malicious allow access to files on the disk, screen or data that the user types to
the keyboard in the infected computer. Virus, like program, via e-mail or news
groups can come as an attachment. When it downloads from a Web site or FTP
address, the program is that file that is downloaded to the virus, which are often
'packaged' as a product catalog, greeting card for holiday and the like. However,
all have one thing in common - they are all executable files, ie. programs. Under
Windows operating system, executable programs all files ending with .exe. This is
very important, because there are cases that files which carry viruses have the
name picture.jpg.exe or katalog.txt.exe. Even if it writes slika.jpg this is not a
picture, but a program. Upon execution, this program may actually show an
image, but almost certainly will infect your computer with a virus.
NETWORK PROTECTION