Sunteți pe pagina 1din 19

BEE

Electrical Engineering

COMPUTER VIRUS THE MAIN PRINCIPLE OF WORK AND HAZARDS

BY: Faisal Riaz Abbasi

THESIS SUPERVISOR

Sir Zulfiqar Ali Chachar

DEPARTMENT OF Electrical Engineering

SUKKUR IBA UNIVERSITY

2019
1
Table of Content

Contents
1. ABSTRACT:.............................................................................................................................................................. 4
2. INTRODUCTION: ................................................................................................................................................... 5
Purpose: ................................................................................................................................. 5
3. References .................................................................................................................... Error! Bookmark not defined.
Background:............................................................................................................................ 5
Problems ................................................................................................................................ 7
Problems related malware: ..................................................................................................... 7
Trojan Horses creating problems: ........................................................................................... 9
4. Decision: ................................................................................................................................................................... 11
Viruses, Worms, & Ransom ware ......................................................................................... 11
Symptoms of virus infection on computer: ............................................................................. 11
Symptoms of worms and Trojan horse viruses in e-mail messages: ..................................... 11
Symptoms of spyware ........................................................................................................... 12
Free vs. Paid Antivirus Software ........................................................................................... 12
Extra Features ...................................................................................................................... 12
Online Protection ..................................................................... Error! Bookmark not defined.
Email Protection ....................................................................... Error! Bookmark not defined.
Parental Controls ..................................................................... Error! Bookmark not defined.
Gaming Protection ................................................................... Error! Bookmark not defined.
5. Conclusion: .............................................................................................................................................................. 13
Solution:................................................................................................................................ 13
Set up automatic scans. ........................................................... Error! Bookmark not defined.
Watch the downloads. .............................................................. Error! Bookmark not defined.
Installing regular updates. ..................................................................................................... 13
Recommendation: ................................................................................................................. 15
How We Review Antivirus ..................................................................................................... 15
Glossary: .............................................................................................................................. 16
Computer virus: .................................................................................................................... 16
Malware: ............................................................................................................................... 16
Antivirus Software’s: ............................................................................................................. 16
Firewall ................................................................................................................................. 16
Trojan horse Virus:................................................................................................................ 16
Spyware: ............................................................................................................................... 16
Adware: ................................................................................................................................ 16
2
USB: ................................................................................................................................... 17
6. References ................................................................................................................... Error! Bookmark not defined.

3
ABSTRACT:
Virus = (Vital Information Resources Under Seize)

In recent years the finding of computer viruses has become common place. It appears that for the most part
these viruses have been caring or only mildly destructive. However, whether or not computer viruses have the
potential to cause major and prolonged troubles of computing environments is an open question.
Simply a computer virus is malevolent (dangerous) code that duplicates by copying itself to another program,
computer boot sector or document and changes how a computer works. The virus needs someone to knowingly
or unknowingly spread the infection without the knowledge or authorization of a user or system administrator.
In contrast, a computer worm is separate programming that does not need to copy itself to a host program or
require human interaction to spread. Viruses and worms can also be referred to as malware. The purpose to
write this report to aware the people who do not knows about the harmful impact of computer virus. Even
most of the people knows but they don’t knows how to protect the system from such harmful virus. In this
report I am going to tell you their harmful impact on our files and data. Even most of the viruses slow the
performance of the system. Some corrupt the file and data. But some hiding the data somewhere else location
in computer. In order to resolve these problem what is the possible solution for this problems. In order to
resolve this kind of problems we must install any antivirus that is suitable for our Pc and Laptops.

4
INTRODUCTION:

Purpose:

The Internet and modern communications technology have stimulated extraordinary advances in electronic
communication, trade, and information access. These technological skills also have dramatically increased
the vulnerability of computer networks to hazards, such as malicious software and dangerous programs that
are proficient of spreading rapidly and causing wide spread and huge damage to electronic data and
programs. (A Brief History of Computer Viruses & What the Future Holds, n.d.)

The most infamous of these rogue programs is the so-called computer virus, a program proficient of
attaching itself to a host program, cloning itself, and spreading the unoriginal copies to other host programs,
analogously to a biological virus. In addition to duplicating and spreading, many viruses are also capable of
harm, such as information theft and corruption of electronic data. (A Brief History of Computer Viruses &
What the Future Holds, n.d.)

Simply a computer virus is malevolent code that replicates by copying itself to another program, computer
boot sector or document and changes how a computer works. The virus requires someone to knowingly or
unknowingly spread the infection without the knowledge or authorization of a user or system administrator.
In contrast, a computer worm is separate programming that does not need to copy itself to a host program or
require human interaction to spread. Viruses and worms may also be discussed to as malware.
(Computer_virus, n.d.; A Brief History of Computer Viruses & What the Future Holds, n.d.)

Background:
The first academic work on the theory of self-replicating computer programs was done in 1949
by Hungarian mathematician and computer scientist John von Neumann. In his essay von Neumann
described how a computer program could be designed to reproduce itself. Von Neumann's design for a self-
reproducing computer program is considered the world's first computer virus, and he is considered to be the
theoretical "father" of computer virology. (Computer_virus, n.d.)

The Creeper virus was first discovered on ARPANET the indication of the Internet, in the early
1970s. Creeper was a tentative self-replicating program written by Bob Thomas at BBN Technologies in
1971.Creeper used the ARPANET to influence DEC PDP-10 computers running the TENEX operating
system. Creeper added access via the ARPANET and copied itself to the remote system where the message
shows, "I'm the creeper, catch me if you can!" was displayed on the screen. The Reaper was a program was
created to delete Creeper. (Computer_virus, n.d.)

5
In 1982, a program called an Elk Cloner was the first personal computer (pc) virus to appear "in the wild"—
that is, outdoor the single computer or computer lab where it was first time created. Written in 1981
by Richard Skrenta while he was in the ninth grade at Mount Lebanon High School near to Pittsburgh it
attached itself to the Apple DOS 3.3 operating system and spread through floppy disk. This virus, become a
practical joke when Skrenta was still in high school, was introduced in a game on a floppy disk.
(Computer_virus, n.d.)

The 1986 - Brain: it is a virus likewise called the "brain boot sector", which is well-matched with the
International Business Machine (IBM) machine. Programming was established by two known Pakistani
programmers Basit Farooq Alvi and his younger brother, Amjad Farooq Alvi. (Computer_virus, n.d.)

The 1987 - Lehigh: First time was program to infect on Yale University command.com files.
(Computer_virus, n.d.)

The Cascade: This virus is used to effect on automatically on encrypted files due to the IBM antivirus product
in city Jerusalem on Friday. (Computer_virus, n.d.)

1988 - The Morris worm: This virus made by Robert Tappan Morris in order to harm DEC VAX and Sun
machines that run BSD UNIX through the Internet. And it uses Buffer for attacking. (Computer_virus, n.).

The 1990: Symantec It is called the first antivirus program used to protect first family of Chameleon Was
made by Robert Burger and it is also called Norton Antivirus. (Computer_virus, n.d.)

The 1995 - Concept: this virus called Concept was created for the first time used to harm Microsoft products
like MS Word File.(Computer_virus, n.d.)

1996 - A macro virus known as Laroux was created to infect Microsoft Excel documents, a virus called Baza
was developed to infect Microsoft Windows 95, and a virus called Staog was created to infect Linux.
(Computer_virus, n.d.)

The 1998 - CIH Virus: publication of the first version of the CIH virus developed by Chen Ing Hau of Taiwan.
(Computer_virus, n.d.)

The 1999 - Happy99: This type of worm was developed to be attached to e-mails with a Happy New Year
message. Outlook Express and Internet Explorer on Windows 95 and 98 have been affected. (Computer_virus,
n.d.)

The 2000 - ILOVEYOU: the virus can delete files in JPEG, MP2 or MP3 formats.

The 2001 - Anna Kournikova: this virus has been disseminated via e-mail to contacts in the Microsoft
Outlook address book. Emails that should contain very attractive tennis player images mean that it is an image,
but they actually hide a malicious virus. (Computer_virus, n.d.)

6
The 2002 - LFM-926: this virus was developed to infect the Shock ware Flash files on the PC.
Beast or RAT: This is a backdoor Trojan and is able to infect all versions of the Windows operating system.
The 2004 - My Doom: this infectious worm is also called Novang. This was developed to share files and
hacker permissions to access infected computers. It's called the fastest e-mail worm. (Computer_virus, n.d.)
The 2005 –Samy XXA: This type of virus has been established to spread faster and is known to infect the
Windows family. (Computer_virus, n.d.)
The 2006 - OSX / Leap-A: the first known malware ever known against Mac OS X.
The Nyxem: this type of worm was created to spread via ordinary mail, destroying Microsoft Office files.
(Computer_virus, n.d.)
The 2007 - Storm Worm: it spread rapidly through unwanted e-mails, a threat against Microsoft systems that
compromised millions of systems. (Computer_virus, n.d.)
Zeus: This is a type of Trojan that infects login credentials to capture bank websites and commit financial
fraud. (Computer_virus, n.d.)
The 2008- Koobface: this virus was created and created for users of Facebook and Myspace. (Computer_virus,
n.d.)
The 2010 - Kenzero: it is a virus that spreads online among the sites through the browsing history.
The 2013 - cryptolocker: This is a Trojan that encrypts the files on the infected machine and requests a
ransom to unlock those files (Computer_virus, n.d.)

The 2014 – Backoff: Malware designed to cooperation Point-of-Sale (POS) systems to steal credit card
data. (Computer_virus, n.d.)

Problems
Some computer viruses are programmed to damage your computer by damaging computer programs, by
deleting files from your system or by reformatting your hard drive. Others simply replicate or overload
traffic on a network, making it impossible to perform any activity on the Internet. Even less dangerous
computer viruses can significantly alter system performance, run out of computer memory and cause
frequent computer crashes. The development of complex large-scale campus networks requires attention to
network security, so the set of things remains the same. Now that the era of one-day information, all
available information remains to expand logarithmically. Digital information has changed the way we create,
transmit, store, process and manage information. All electronic capitals and information are stored in
computer systems for recovery and distribution. In today's extremely compelling computing environment,
information security is a primary concern. Computer security works regularly with malicious programs such
as computer viruses, Trojans, worms and many others. Once computers are infested with rats, these

7
programs may have the ability to damage expensive hardware, eliminate valuable data, negotiate limited
computing resources, or negotiate the security of confidential information. People collect data from many
sources using a variety of electronic storage devices, such as USB drives, CD / DVD-ROMs, etc. And then
they store data on their computers. Several people are not fully informed on the computer and may not be
aware of the latest viral threats. Once the user moves or copies data from one computer to another, viruses
can spread through computer systems, an internal network or the Internet. Once a computer system is
infested with a virus, the stored data is not secure and the system becomes a source of dirt for other systems
during data transfer. (Khan, 2012)

Problems related malware:

The computer virus is usually used, but incorrectly, to indicate other types of malware, adware and spyware
that do not have this kind of generative capacity. of malicious software are worms, Trojans, rootkit maximum,
spyware, fake adware, unwanted criminal software programs and others, including real viruses. Viruses are
sometimes messed up with worms and Trojan horses, which are technically different. A worm can abuse
vulnerabilities to spread to other computers through networks, while a Trojan is a program that appears
harmless, but hides harmful functions. Worms and Trojans, like viruses, can damage data or the performance
of a computer system. A real virus not only spreads from one computer to another (in some form of executable
code) can be from USB when its host is taken to the destination computer; for example, because a user sent a
network or internet or took it on removable media, such as a diskette, CD, DVD, or USB drive. The virus
sample can increase when files are infected in a file system on the network or in a file system retrieved from
another computer. Computer viruses have been classified as viruses because they are similar to biological
viruses in their appearance to reproduce. Likewise, they find a host and then infect and reproduce. However,
in mutual cases there must be a cause for the start of the problem. Some viruses and other malicious programs
present obvious symptoms to the computer user, but many are secret and go unnoticed. Malware is a generic
term, such as Trojan horses, spyware, adware and many others.
All computer viruses cause economic damage or damage. Viruses are often classified according to the degree
of destruction they cause in the following groups:
1) Viruses that spread but do not cause other damages on purpose.
2) Viruses programmed to cause damage in a certain amount, for example. Destroy something
Most viruses distribute only. Cause the damage is not involved in its characteristics. But they can still fill the
memory space since disk space, deferring computer functions can cause problems of cohabitation and generate
significant costs for cleaning and c. Cleaning up the administration of a large computer system so that it is not
infected by a virus can take weeks or months. (Internal security virus-malware-what is a computer, 2018)

How to protect against computer viruses

8
If maintained with information and resources, it is wiser on computer security threats and less on threat
patterns.
Follow the steps below to protect your PC with the best protection against computer viruses:
Use an antivirus and a firewall for protection.
• Use antispyware software.
• Keep your antivirus and antispyware software up-to-date.
• If possible, update the operating system regularly.
• Increase the security settings of your browser
• Avoiding uncertain websites
• Download only the software from the sites created.
• Carefully evaluate free software and file sharing applications before downloading them.
• Do not even open messages from unknown senders.
• Immediately delete messages that you suspect are spam.
An insecure computer is like an open door for computer viruses. Firewalls continually monitor and monitor
Internet traffic entering and leaving your computer and hide your PC from online scammers for easy targets.
Products such as Web root Internet Security Complete and Web root Antivirus offers complete protection
against the two most dangerous threats on the Internet: spyware and computer viruses. Prevent threats before
they can enter your computer, watch the guard on every possible entry of your computer and avoid any
computer virus that tries to open up within the system, even the most damaging and deviant tensions.
While free antivirus downloads are available online, they simply can not offer you the computer virus help
you need to keep up with the ongoing offensive of new varieties. Previous unseen forms of polymorphic
malware can often cause the most damage, so it is essential to have definitive and definitive antivirus
protection.
Direct economic damages occur when the virus initiates the virus (a) destroys or b) alters a file or data or
information in the file. In these situations the meanings can be unexpected and economically considerable.
Data deletion always causes economic destruction, although deleted data can be replaced by backup copies.
The object of the crime must pass considerable labor costs to clarify which data is destroyed and which are
not. (virus-threats-security-computer-virus, n.d.)

Trojan Horses creating problems:

9
“Trojans or "Trojan horses" are malicious code, since they do not replicate when they pollute other files, nor
do they automatically play themselves as worms. The Trojan horse program has a useful and desired
function. While it may help your business after launch, this information does not seem to be the user's first.
Stealthily, the program performs other unwanted functions. Trojan horses can cause data to be scrapped or
compromise a system by providing a means for another computer to increase access, thus preventing normal
access controls. Trojan horse epidemics are one of the most serious threats to cyber security, as they can
spread in the demonstration of anything, which makes it almost essentially difficult to notice them, even
when someone observes them accurately. (Internet security: malware-what-is-a-Trojan, 2018)

10
Decision:
A computer security risk is actually anything on your computer that could damage or steal your data or allow
another person to access your computer, without your information or consent. There are many different things
that can generate an IT risk, including malware, a general term that is used to illustrate many types of faulty
software. We usually think of computer viruses, but there are many types of faulty software that can generate
a risk of computer security, including viruses, worms, rescue items, spyware and Trojans. Even the lack of
configuration of IT products and the uncertain computer habits simulate the risks. Let's see it in more detail. .

Viruses, Worms, & Ransom ware

Viruses are malware that are linked to other files on your system and can be used to destroy your data. Viruses
have many abilities, but, unlike worms, they usually require human interaction to spread from one system to
another, even if the user is unconscious, spreading it. (Internet security-malware-ransomware, 2018)

Worms are like viruses, but they have the ability to spread from one computer to another, all by themselves.
They know how to connect to portable storage devices, such as USB drives or removable hard drives, or move
across the network by automatically moving to connected machines. (Internal security virus-malware-what is
a computer, 2018)
Save the objects
Ransomware is a relatively new term for malware that, once installed on your system, makes all your files
incomprehensible, keeping your data hostage until you pay the hacker's ransom. Rescue items can be delivered
by a virus or worm and there is no guarantee that even if you pay the ransom, you will recover your data.
(Internet security-malware-ransomware, 2018)
Spyware and Trojan horses
Spyware is a malicious program that cuts your data and can be used to spy on you using your webcam or
microphone without your information. Once the spyware is installed on your system, it can steal your
credentials by recording the login information you use or looking for confidential files on your computer, and
then sending this data to an attacker. In recent months, hackers have been able to access the webcam and
microphone of computers and use their private images, videos or sound recordings to blackmail their victims.
(Network security-how-to-detect-spyware-before-it-snags-you, 2018)
Trojan horses are a special type of virus. Like the well-known wooden horse used by the Greeks to enter the
walled city of Troy, Trojan viruses are used to send other types of malware, hiding them in programs or files
that seem appropriate. (Internet security: malware-what-is-a-Trojan, 2018)

Symptoms of worms and Trojan horse viruses in e-mail messages:

11
Once a virus infects e-mails or other files that are available on a computer, you may notice the following signs:
The septic file can be duplicated. This behavior can use all the free space on the system's hard disk. A copy of
the infested file can be sent to all reports in a list of email addresses. The computer virus can become deformed
in the hard disk. This behavior deletes files and programs. The computer virus can install invisible programs,
such as plagiarized software that can then be dispersed and sold by the computer. Computer viruses can reduce
security and invaders can access the computer or network in a light way. (How viruses and worms spread in
e-mail?, n.d.)

Symptoms of spyware

When spyware produces computers, the following may happen: ((network-how-catch-spyware-pre-it-snags-


you, 2018)
• Reduced internet connection.
• Change the homepage of the web browser.
• Damage to the Internet connection.
• Some apps cannot be opened, as well as software security.
• You cannot visit a real site, which can be directed to other locations.
• The e-mail message received for an unusual attachment. Once an encrypted file is opened, the view windows
are displayed or there is a rapid deterioration of system performance.
• People accuse of recently creating an email from someone who has managed an attachment, which has not
been shown. Attachments to e-mail messages can be delayed as .exe, .bat, .scr and .vbs.

Free vs. Paid Antivirus Software

If you're deciding on new antivirus software and you may want to upgrade to a free version, please note that
there are advantages and disadvantages for both paid and free versions. The use of free antivirus software can
cost more in the long run and many experts suggest that it is better to use a paid version. The free versions can
be great for testing new software or a set of features and quality, but they will never provide the same level of
protection and your service will definitely not include Internet security software. (Quain, 2016)
Paid versions of antivirus software will cover online and offline activities, permanently remove confidential
digital files, and provide additional encryption to protect most private malware files such as Trojans, worms,
and help items. (Quain, 2016)
Paid antivirus software is particularly useful if you have a PC or device that has already been infected. Many
paid versions offer virus removal and cleaning tools, in addition to the highest levels of quality prevention and
detection. (Quain, 2016)
12
Additional features
There are some key structures that you should keep in mind when looking for antivirus software, and it will
vary according to your needs. (Komen, 2017)
Online protection _
If you're online, you probably want an Internet security software with an integrated firewall. (Komen, 2017)
E-mail protection -
If you are a big email user, you will want to be aware of spam, spyware and phishing threats (Komen, 2017)
Parental control -
Parents should look for software with controls and limits for parents that are easy to use. (Komen, 2017)
Game Protection -
Players can expect a "game mode", which makes Internet security software use a smaller amount of resources.
(Komen, 2017)

Conclusion:

Solution:

Compatibility -
You will have to check the compatibility of the chosen software with your operating system, whether it is
Windows protection, Mac OS antivirus and everything else. Anticipation is the best drug to avoid viral toxicity
and threats. A virus can negotiate personal tests and even complete a computer completely. It becomes an
important risk and a security risk for the huge databases that are stored and used by libraries on their servers.
Here are many low-cost measures that can help protect and stay one step beyond hackers. (Eckel, 2009)
Maintaining a systematic backup of data is highly optional to avoid losing it.
Escape using unknown USB drives. Once data is copied from a computer infected by a virus and transferred
to another computer, it can also cause virus contamination on a particular computer. Therefore, it is always
recommended to check for viruses in USB drives before repeating the data in a computer system. (Eckel, 2009)
Install a reliable antivirus program. If your computer is not connected to the Internet, an infallible antivirus
program is not expensive and makes sense. Around the antivirus programs are free and they work almost like
industry titans like Norton and McAfee. (Eckel, 2009)
Install anti-spyware and anti-malware programs. Many of the best anti-spyware programs are completely
free. Spybot Search and Destroy and Cleaner are just two free programs that can help prevent computer viruses.
As useful as these programs are, you need to update and run them regularly so that they work well. (Eckel,
2009)

Avoiding suspicious websites: A good antivirus protection program alerts you when you visit a website that
attempts to install or run a program on your computer. (Eckel, 2009)

13
Never open e-mail attachments without first analyzing them.
The most common way in which viruses spread through the Internet is through e-mail. Some attachments, like
images, are now displayed in emails and do not require manual opening, but other documents do so. You need
to make sure that you use an email client that analyzes all attachments in the email in advance. (Eckel, 2009)
Configure automatic scans. Many of the major anti-virus programs and best anti-spyware programs have
settings that allow them to log in automatically during periods of inactivity or in the middle of the night. Of
course, you need to enable your computer to do this, but doing daily scans when you do not know what else is
happening is an excessive way to prevent the latest computer viruses from staying too long. (Eckel, 2009)
Save the downloads. Downloading music, movies and other stuff is so great that it can be easy to use. These
files must be downloaded from trusted websites or at least scanned before opening them. (Eckel, 2009)
Installing regular updates.

Around is a cause why Windows has a feature called critical updates. There is a total branch of Microsoft
dedicated to staying one step ahead of hackers, so that when they accomplish to resolve a possible security
gap, it is necessary to download the patch immediately. Help Microsoft help you avoid having computer
viruses cause too many problems. (Eckel, 2009)

Knowing what to look for Random computer users should have an idea of how the computer works, what
the normal pop-ups are and what the most common viruses are. (Eckel, 2009)
Stay left of the broken software. It is absolutely necessary to download illegal and illegal versions of some
online programs. As tempting as they are, these files are almost always alive with advanced malware that is
hard to detect. Therefore, you need to play safely and get software from a reliable source. (Blogger, 2016)
Install a firewall on the PC. A firewall is a program that controls Internet access and network traffic.
Organized with the antivirus program, it can help prevent illegal access to the computer. (Blogger, 2016)
Be ready to block:
If you acquire a virus distributed as a forest fire on the Internet, prepare the best you can do to be cautious. Do
not open suspicious e-mails or accept downloads for one or two weeks until the antivirus protection program
is updated. (Blogger, 2016)

14
Recommendation:

How We Review Antivirus

Choosing the best antivirus software should be much simpler with our expert reviews. Our experts have
analyzed some of the best options on the market and each review covers a wide range of topics, including:
(Antivirus Software Reviews, 2018)

• Prices

• Structures

• Easily use

• Worldwide value for money

• Buyer care

• Autonomous tests

• User experience

• Install any suitable antivirus for PC and laptop to protect it from security problems.

15
Glossary:

Computer virus:

It is a malevolent program that harm to computer. Available in many form. (KENDALL, 2018)

Malware:

It is a group of programs in which many type of viruses, these virus mostly for pc and laptop for vulnerary of
the data. (KENDALL, 2018)

Antivirus Software’s:

It is a secure computer program planned in order to protect the system from malicious program this software
alert us when virus detected. And resolution the issue. (KENDALL, 2018)

Firewall

This is also a computer program that protections received internet and network traffic that is harmful for the
system Along with the virus program, it can help prevent illegal access to the computer it is just detect the
virus on runtime. (KENDALL, 2018)

Trojan horse Virus:

A worm can also misuse security weaknesses to spread itself to other computers through networks, while a
Trojan is a program that appears harmless, but to hides and achieve the malicious functions. (KENDALL,
2018)

Spyware:

It is malware that excerpts your data and may be used to spy on you by using your webcam or microphone
without your knowledge.(KENDALL, 2018)

Adware:

It is also a kind of malware it shows in the form of advertising mostly found on shopping website or in form
of email notification.(KENDALL, 2018)

Worms

Worms are like viruses, but, they have the capability to spread themselves from one computer to another
computer through USB, CD many more portable devices.(KENDALL, 2018)

16
Ransom ware

Ransom ware is a comparatively new term for used malware that, when you installed on your system, and
your data become missing, in order to restore you may pay Random to Hecker (One who are controlling the
virus), but no any assurance that you get restore data after paying ransom.(KENDALL, 2018)

USB:

Universal serial bus just for data storage.

17
References
A Brief History of Computer Viruses & What the Future Holds. (n.d.). Retrieved from
https://www.kaspersky.com/resource-center/threats/a-brief-history-of-computer-viruses-and-what-
the-future-holds
Antivirus Software Reviews. (2018). Retrieved from https://www.pcmag.com/reviews/antivirus
Blogger, G. (2016). Why You Should Avoid Pirated or Cracked Software. Retrieved from
https://www.esoftload.info/why-you-should-avoid-pirated-or-cracked-software
Computer_virus. (n.d.). Retrieved from https://en.wikipedia.org/wiki/Computer_virus
computer-security-threats-computer-viruses. (n.d.). Retrieved from
https://www.webroot.com/us/en/resources/tips-articles/computer-security-threats-computer-viruses
Eckel, E. (2009). 10 ways to avoid viruses and spyware. Retrieved from
https://www.techrepublic.com/blog/10-things/10-ways-to-avoid-viruses-and-spyware/
employee, S. (2018). Retrieved from https://us.norton.com/internetsecurity-malware-what-is-a-computer-
virus.html
How do viruses and worms spread in e-mail? (n.d.). Retrieved from
https://computer.howstuffworks.com/question339.htm
internetsecurity-how-to-catch-spyware-before-it-snags-you. (2018). Retrieved from
https://us.norton.com/internetsecurity-how-to-catch-spyware-before-it-snags-you.html
internetsecurity-malware-ransomware. (2018). Retrieved from https://us.norton.com/internetsecurity-
malware-ransomware-5-dos-and-donts.html
internetsecurity-malware-what-is-a-computer-virus. (2018). Retrieved from
https://us.norton.com/internetsecurity-malware-what-is-a-computer-virus.html
internetsecurity-malware-what-is-a-trojan. (2018). Retrieved from https://us.norton.com/internetsecurity-
malware-what-is-a-trojan.html
KENDALL, C. (2018). Top 10 worst computer viruses . Top 10 worst computer viruses .
Khan, I. (2012). Retrieved from https://www.emeraldinsight.com/doi/abs/10.1108/07419051211280036
Komen, S. (2017). Important Features to look for in an Antivirus. Retrieved from
https://antivirus.bunifu.co.ke/important-features-to-look-for-in-an-antivirus/
Quain, J. R. (2016). Do You Really Need to Pay for Antivirus Software? Retrieved from
https://www.tomsguide.com/us/antivirus-software-pay-or-free,news-18570.html
Wright, L. (2016). Retrieved from https://www.saga.co.uk/magazine/technology/computing/security/10-
signs-your-computer-has-a-virus

18

S-ar putea să vă placă și