Ethical Hacking: Worm, Virus & Trojan Horse

Ethical Hacking: Worm, Virus & Trojan Horse Some of the skills that hackers have are programming and computer networking skills. They often use these skills to gain access to systems. The objective of targeting an organization would be to steal sensitive data, disrupt business operations or physically damage computer-controlled equipment. Some of the ways that … Read more

Process of developing a virus

The process of developing a virus is very methodical. The author is concerned with creating an effective virus that can be spread easily. The process occurs in six steps: 1. Design. The author envisions and creates the virus. The author may choose to create the virus completely from scratch or use one of the many … Read more

Pictures Can Give You Computer Viruses

Nope. Well, not yet. Pictures are just data files that are read by special programs. But, someday, someone may come up with a picture file format that accommodates the inclusion of computer instructions — for whatever purpose someone dreams up. Are you thinking “macro virus” right now? So am I. Anytime someone comes up with … Read more

Types of Viruses

To date there are three primary types of viruses that exist today: file-infector viruses, which attach themselves to program files; boot-sector viruses, which install themselves in a hard drive’s or floppy disk’s boot sector; and macro viruses, which burrow into Microsoft Word and Excel documents. Details on each of these three follow. File infector As … Read more

The People Who Write Viruses

Sometimes I think that it helps to understand a little bit more about the people who perpetrate crimes, in order to be able to avoid being a victim of those crimes. Others of you may just have a morbid curiosity about those who like to hurt other people. Either way, you’ll learn a little more … Read more

How Early Viruses Spread from Computer to Computer

In the mid-to-late 1980s, data was most often transferred from computer to computer by using floppy disks and so-called bulletin board systems (BBSs), managed online locations that were the forerunners of today’s Web sites. Stowing away on floppy disks Even without using the Internet, people in offices where PCs were used traded and circulated programs, … Read more

The Origins of Antivirus Tools

In 1991, Symantec released the first version of Norton AntiVirus. Norton was a popular brand name among computer technophiles from the well-known and successful Norton Utilities program. Programs like Norton AntiVirus are designed to find and eliminate viruses from a computer, usually with three goals in mind: Make the virus stop doing harm to the … Read more

The People Who Write Viruses

Sometimes I think that it helps to understand a little bit more about the people who perpetrate crimes, in order to be able to avoid being a victim of those crimes. Others of you may just have a morbid curiosity about those who like to hurt other people. Either way, you’ll learn a little more … Read more

How Early Viruses Spread from Computer to Computer

In the mid-to-late 1980s, data was most often transferred from computer to computer by using floppy disks and so-called bulletin board systems (BBSs), managed online locations that were the forerunners of today’s Web sites. Stowing away on floppy disks Even without using the Internet, people in offices where PCs were used traded and circulated programs, … Read more

Blocking Spyware

Spyware is a wide-reaching term that describes software used to monitor your Internet usage patterns, as well as software that can attempt to change your Internet browser configuration, or even record keystrokes (Virginia, the hackers want your bank account and other online passwords). Most spyware is not malicious in the same way that viruses are, … Read more