Sei sulla pagina 1di 16

CHAPTER 1 - BASIC INFORMATION AND The "computer" is an ensemble of different

COMPUTER TECHNOLOGY machines that you will be using to get your job
done. A computer is primarily made of the
Central Processing Unit (usually referred to as
CHAPTER 1 - INTRODUCTION the computer), the monitor, the keyboard, and
the mouse. Other pieces of hardware are
Computer as a revolution left no area of life commonly referred to as peripherals.
untouched in the present world. It is of
tremendous help in all field of life. Hence, the In everyday life activities, we process data
knowledge of computer is a necessity for or encounter cases of data processing. A
existence of everybody in this global village. The typical example of data processing is the
invention of computer has transformed our generation of statement of student result
simple manual works to sophisticated life of from the marks score in an examination and
automated works to meet the global demand continuous assessment. It is essential to
for the higher productivity and increased know that information is as good as the
efficiency with high precision. data from which it is derived, and the
transformation process which they are
subjected to. Meaningless data or
Computer is increasingly becoming compulsory inappropriate processing produces wrong
in nearly all fields of studies, not because of information. Thus computer gives you
anything but its accuracy and versatility in results corresponding to what data you
processing data. Many tasks at home or office supply and how you process it (i.e.
are being automated rapidly with computer. ëgabbage- in, gabbage-outí).
Thus it is becoming apparent that in whatever Summarily, the intelligent performance of a
discipline or working sector, the computer is computer depends on correctness of input data
now a very vital tool for efficiency improvement and the intelligence performance of the human
and precision of job or task execution. being that drives it.
This is designed to meet the prerequisite 1.1 USES OF COMPUTERS
need of everybody that are interested and
wish to know about computers science and People use computers in many ways; business,
computing in general. computers are used to track inventories with
bar codes and scanners, check the credit status
A computer is an electronic device, of customers, and transfer funds electronically,
operating under the control of instructions homes, tiny computers embedded in the
stored in its own memory. These electronic circuitry of most appliances control
instructions tell the machine what to do. the indoor temperature, operate home security
The computer is capable of accepting data systems, tell the time, and turn video cassette
(input), processing data arithmetically and recorders (VCRs) on and off, automobiles
logically, producing output from the regulate the flow of fuel, thereby increasing gas
processing, and storing the results for mileage, they also entertain, creating digitized
future use. Most computers that sit on a sound on stereo systems or computer-animated
desktop are called Personal Computers features from a digitally encoded laser disc.
(PCs).
Computer programs, or applications, exist to aid
every level of education, from programs that
teach simple addition or sentence construction 3. Slide Rule (1600AD) by William Oughtred
to programs that teach advanced calculus. (1575 - 660): He invented it in 1622 but
Educators use computers to track grades and announced it in 1632 this consist of rules on
communicate with students; with computer- which markings represent logarithms of
controlled projection units, they can add numbers and also permits calculation involving
graphics, sound, and animation to their exponents, trigonometric functions, etc.
communications.
4. Pascal mechanical calculator (1600) or
Computers are used extensively in scientific Numerical wheel calculator:-Blaise Pascal (1623
research to solve mathematical problems, -1664) in 1642 invented the first adding
investigate complicated data, or model systems machine called Pascaline. The brass rectangular
that are too costly or impractical to build, such box used eight moveable dials to add and sum
as testing the air flow around the next up of eight figures long using base 10. It can
generation of aircraft. The military employs perform all the four arithmetic operation with
computers in sophisticated communications to previous unheard speed.
encode and unscramble messages, and to keep
5. Leibnitz mechanical multiplier (1600): In 1694
track of personnel and supplies.
Gottfried Wilhem Von Leibnitz (1646 -1716)
improved upon the pascaline by creating a
machine that can also multiply using a system of
1.2 HISTORY OF COMPUTING
dials and gear
Since the creation of man, a significant amount
6 Colmarís Calculator (1820) by Charles Xavier
of human activities has been ascribed to
Thomas de Colmar: This presented a more
organizing and processing information so that it
practical approach to computing.
could be more easily presented for easy
comprehension. Many devices have been used 7. Punched-Card machine (Jacquardís loom)
in the past before the advert of computer. It is (1801): Joseph Marie Jacquard.
then necessary to vividly look into their
8. Mechanical computer: Charles Gabbage
evolution. Early computing machines:
(1792-1871) Father of the computer. Difference
1. Abacus (-2500BC): This is a hand- held device engine powered by steam and large as
made of beads stung on rods in a frame. The locomotive the machine has a stored program
rods correspond to positions of the digits while and could perform calculations and print the
the beads correspond to the digits. result automatically. We also have Analytical
engine credited to him.
2. Napierís Bone (2500BC): This was invented by
John Napierís (1550 - 1617). This consists of 9. Hermann Hollerith (1860-1929)
small rods with appropriate markings on them.
 Hollerithís system punch-card reader
It is a mechanical aid to computation that
machine:-for counting census result in
consists of nine such rods (called bones) with
1890 in US.
one for each digit 1 through 9. He also invented
logarithms which made possible to do division  formed tabulating machine company in
and multiplication by performing addition and 1896(TMC)
subtraction.
 Automatic Tabulating Machine (ATM)-
1900
 TMC was renamed to International They were very expensive to operate and in
Business Machines Corporation (IBM) in addition to using a great deal of electricity,
1924 after series of mergers. generated a lot of heat, which was often the
cause of malfunctions
In summary, the history of computing began
with an analog machine. In 1623 German First generation computers relied on machine
scientist Wilhelm Schikard invented a machine language to perform operations, and they could
that could add, and with the aid of logarithm only solve one problem at a time. Input was
tables, multiply and divide. Since then the based on punched cards and paper tape, and
development has pass through a lot of stages output was displayed on printouts. The UNIVAC
such as the invention of punched cards to and ENIAC computers are examples of first-
program patterns to create woven fabrics by generation computing devices. The UNIVAC was
Joseph-Marie Jacquard a French inventor in 19 the first commercial computer delivered to a
th century. business client. It was used in the 1951U.S.
Bureau Census.
Another early mechanical computer was the
Difference Engine, designed in the early 1820s 2. Second Generation - 1956-1963: Transistors
by British mathematician and scientist Charles
Transistors replaced vacuum tubes and ushered
Babbage. In the 1930s American mathematician
in the second generation of computers. The
Howard Aiken developed the Mark I calculating
transistor was invented in 1947 but did not see
machine, which was built by IBM. This
widespread use in computers until the late 50s.
electronic calculating machine used relays and
The transistor was a vast improvement over the
electromagnetic components to replace
vacuum tube, allowing computers to become
mechanical components.
smaller, faster, cheaper, more energy- efficient
To be sincere, the world has left the era of and more reliable than their first-generation
hearing stories about computer. We are now in predecessors.
the world of what you can use it for to serve its
Second-generation computers still relied on
desired purposes.
punched cards for input and printouts for
1.3 GENERATIONS OF COMPUTERS output. Second-generation computers moved
from cryptic binary machine language to
The history of computer development is often
symbolic, or assembly, languages, which
referred to in reference to the different
allowed programmers to specify instructions in
generations of computing devices. Each
words. High-level programming languages were
generation of computer is characterized by a
also being developed at this time, such as early
major technological development that
versions of COBOL and FORTRAN.
fundamentally changed the way computers
operate, resulting in increasingly smaller, These were also the first computers that stored
cheaper, more powerful, efficient and reliable their instructions in their memory, which moved
devices. from a magnetic drum to magnetic core
technology. The first computers of this
1 First Generation - 1940-1956: Vacuum Tubes
generation were developed for the atomic
The first computers used vacuum tubes for energy industry.
circuitry and magnetic drums for memory, and
were often enormous, taking up entire rooms.
3. Third Generation - 1964-1971: Integrated Fifth Generation - Present and Beyond: Artificial
Circuits Intelligence

The development of the integrated circuit was Fifth generation computing devices, based on
the hallmark of the third generation of artificial intelligence, are still in development,
computers. Transistors were miniaturized and though there are some applications, such as
placed on silicon chips, called semiconductors, voice recognition, that are being used today.
which drastically increased the speed and
efficiency of computers.
The use of parallel processing and
Instead of punched cards and printouts, users
superconductors is helping to make artificial
interacted with third generation computers
intelligence a reality. Quantum computation
through keyboards and monitors and interfaced
and molecular and nanotechnology will radically
with an operating system, which allowed the
change the face of computers in years to come.
device to run many different applications at one
time with a central program that monitored the The goal of fifth-generation computing is to
memory. develop devices that respond to natural
language input and are capable of learning and
Computers for the first time became accessible
self- organization.
to a mass audience because they were smaller
and cheaper than their predecessors.

4. Fourth Generation - 1971-Present:


Microprocessors

The microprocessor brought the fourth


generation of computers, as thousands of
integrated circuits were built onto a single
silicon chip. What in the first generation filled
an entire room could now fit in the palm of the
hand.

In 1981 IBM introduced its first computer for


the home user, and in 1984 Apple introduced
the Macintosh. Microprocessors also moved out
of the realm of desktop computers and into
many areas of life as more and more everyday
products began to use microprocessors.

As these small computers became more


powerful, they could be linked together to form
networks, which eventually led to the
development of the Internet. Fourth generation
computers also saw the development of GUIs,
the mouse and handheld devices.
keyboard, CPU, RAM, Processor, etc. Each piece
plays a role in the operation of a computer.
CHAPTER 2 - SOFTWARE AND HARDWARE

INTRODUCTION
CHAPTER 3 - DIFFERENT PARTS OF A COMPUTER
Hardware is the term given to the physical
AND THEIR USES
components of a computer: e.g. keyboard,
monitor, system box or floppy disk drive.
Software, on the other hand, is electronic
INTRODUCTION
information: files, operating system, graphics,
computer programs are all example of software. The standard computer consists of a monitor, a
The difference between hardware and software keyboard, a mouse and the system unit. One
reflects the duality between the physical and can attach accessories such as printers and
mental worlds: for example, your brain is scanners by means of ports. Increasingly in the
hardware, whereas your mind is software. workplace, computers are connected to printers
and other computers by means of a network.

2.1 SOFTWARE
3.1 THE COMPUTER SYSTEM HARDWARE
Software is the stuff that makes your computer
do things for you. The computer without
software would be like a home entertainment
system with no tapes, CDís, or movies - you
have the machine, but thereís nothing to play
on it. Software is continually developed. Each
time the software maker (Microsoft, Adobe,
Corel, etc) develops a new version of their
software they assign it a version number.

Before Microsoft Word 7, there was Microsoft


Word 6.0.1, and before that Word 6.0. The
larger the developments made to the software,
the larger the version number changes. Usually
a large change will result in a whole number
upgrade; a small change may result in a tenth of 3.2 PARTS OF THE COMPUTER SYS. HARDWARE
a decimal place.
The monitor

This is the Visual Display Unit (VDU). There are


2.2 HARDWARE various technologies for the display unit,
cathode ray tube (CRT) or Liquid Crystal Display
Hardware are those components or physical (LCD) or electro luminescent screens or the
pieces (things you can touch) that make up the projector. The monitor or screen displays your
computer. The different pieces of the work. Facing it down reduces reflected glare
computerís hardware are monitor, speakers, from room lights.
mouse, CDROM, floppy drive, hard drive,
This reflection may affect your sight. Monitors 3.2 PARTS OF THE COMPUTER SYS. HARDWARE
come in different sizes. The (most important)
Symbols
size of the monitor is measured diagonally on
the screen (in inches). Based on this, the Accent ‘ Dash - Equal =
monitors range in sizes of 12", 14", 15", 17",
19", 21", 29", etc. Monitors are also Backlash \ Semi – colon ; Single – ‘
characterized by the flatness of their screen. quote
The flatter and the wider screens are usually the Less < Coma , Period .
better. than
Tilde Exclamation mark ! At @

Dollar $ Percent % Caret ^


The system box or computer console
Asterisk * Opening ( Closing )
The system box is where all the computations parenthesis parenthesis
that the computer performs take place. Inside
are the CPU processor, the motherboard, the Opening { Closing curly } Colon :
hard disk, any network or sound cards, memory Curly braket
chips (RAM), printer ports (at the back) and the Bracket
drive bays for floppy disks, Zip disks or CDs.
Outside the casings are the power buttons
(ON/OFF and Restart) with some additional Open [ Close ]
Square Square
facilities like the casing USB ports, Webcams,
Bracket Bracket
etc.
Pipe I Grater >
The keyboard (Pressing) than
Forward / Question ?
This is the basic input device. It is one of the slash mark
ways you can tell the computer what to do. It Pound # Plus +
consists of the standard typewriter keys as well
as a numeric keypad and function keys. You can Underscore -
use it to give the computer commands, name
folders and files, and type text in word
3.2 PARTS OF THE COMPUTER SYS. HARDWARE
processing documents. The keyboard is made of
three main categories of keys with each used  Action Keys:
for a different purpose
These are not used to type anything, instead
 Character Keys: they cause an action. Escape, Tab, Caps Lock,
Shift, Control, Alt, Backspace, Enter, Windows,
These comprise of letters, numbers and the
Win Menu, Print Screen, Scroll Lock, Pause
symbols. They are used to insert/display
Break, Number Lock, Insert, Home, Page Up,
readable characters on the screen which is
Delete, End, Page Down, Power, Sleep, Wake
equivalent to the keystroke pressed.
up, Up Arrow, Left Arrow, Right Arrow, Down
Letters a, b, c, d, e, f, g, h, i, j, k, l, m, n, o, p, q, r, Arrow, and Space Bar.
s, t, v, w, x, y, z

Numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
 Application-Dependant Keys: The Mouse (Clicking and Dragging)

These are called function keys. They are F1, F2, This is another input device used to move a
F3, F4, F5, F6, F7, F8, F9, F10, F11, and F12. small white arrow pointer-the Cursor (but the
Although the F1 key is usually used to get help shape will change depending on the context in
while working in Microsoft Windows, the use of which the mouse is being used) on the screen.
the other keys varies from one application to By pointing and clicking you can carry out
another. Eventually, the application you use will commands.
give you instructions on what to do and how to
The computer may ask you to verify that you
use the function keys.
are sure to rename a file, by clicking on the ëOkí
Key Combinations button. A mouse is primarily made of three
parts: the buttons, the handling area, and the
Some keys can be combined to produce
sensor (rolling object or light). There are either
uppercase letters or to access the upper
one, two or three mouse buttons. By default, a
symbols of some keys (i.e. the Shift and Control
mouse has two buttons: left and right. Most
keys). Keys are also combined for many other
mice nowadays are also equipped with a wheel
reasons. In some situations, you have to press
on top of the middle button called the Scroll
keys simultaneously, which means that you may
Button.
be expected to press two or more keys at the
same time, or almost at the same time. In some To use the mouse, the first decision you make is
other situations, you may have to press and to know which of your two hands you will be
release one key, followed by another. using to handle the mouse. By default, the
mouse is configured to work for the right hand.
Shortcuts
If you are left-handed, the settings can be
A shortcut is a quick action you ask a program changed to suit your needs: Start then Control
to perform when you press one particular key Panel then Double-click Mouse then on the
or a combination of keys. Some shortcuts are Buttons Tab, Check the Switch Primary and
universal or almost, that is, the computer Secondary Buttons check box.
responds regardless of what application is
You can also change the cursor from the default
running. Some other shortcuts depend on what
Up-Left Pointing to another but you should
you have on your screen. Some shortcuts are
know that this is best determined by the
already known to the computer (as part of the
computer as this varies from program to
operating system).
program. To change, click the Pointerís Tab.
Most other shortcuts are set by the Also click the other tabs to review the different
programmer of the particular application you properties.
are using. Yet some applications allow you to
Note: The expression "by default" means "if
create your own shortcuts. Some shortcuts are
everything is not (yet) changed from the original
readily obvious and can be seen from the main
or normal settings".
menu of the application. Some other shortcuts
are either part of Microsoft Windows (and can
be applied in your program) or are not easily
3.2 PARTS OF THE COMPUTER SYS. HARDWARE
displayed, you might have to search the Help
documentation of the program you are using The tip of the mouse pointer must be
positioned on the item you want to use
(Pointing). To select an item, point to the item Disk Size Conversion Chart (Bits, Bytes,
and click once (Selection ñ Left Clicking). Kilobytes, Megabytes and Gigabytes)
Double-clicking (left button) on an icon invokes
Bit - Binary digit:-a single elements in the
a command or launches an application
computer memory that can store either 1 or 0

Word - 1Byte, 2Byte or 4Byte depending on the


Dragging an item (icon or other object) from machine. Generally computer word length is
one location to another, position the mouse giving in bits; hence we have 8bit, 18bit or 32bit
pointer on the item, click and hold the mouse microprocessor computer.
buttons (left, right) down, and move the item to
3.2 PARTS OF THE COMPUTER SYS. HARDWARE
the new location. Right Clicking (right button)
invokes a shortcut (contextual) menu that
contains all the actions that are related to the
item. Some applications, namely programs used
to manipulate text (they are called word
processors), allow you to triple-click.

On Windows machines, there is a left and right


mouse button. Most time you use the left
mouse button (if you are right-handed). On

some newer Macs, the same feature can be


used with their single mouse button by holding
down the Control key as you click an item on
the screen.

The Peripherals

All the parts we have reviewed so far are usually


required for the computer to function. Some
other parts, not required, can also be connected
to the computer to complement it. A peripheral
is an object attached to the computer to help it
perform some necessary assignments none of
the other parts can handle.

In most scenarios, no peripheral is required but


nowadays, it is unusual for a computer not to
have any peripheral at all. The most used
peripherals are the printer, a digital camera, a
scanner, a projector, an external drive (such as
an external CD burner for an old computer), etc.
Chapter 4 - TYPES OF COMPUTERS 4.2 CLASSIFICATIONS OF COMPUTER

Analog computer 1. The Desktop

These systems were the first type to be A computer is referred to as "desktop" when it
produced. It is an electronic machine capable of is relatively small enough to be positioned on
performing arithmetic functions on numbers top of a table where a person is working. Such a
which are represented by some physical computer can also be placed on the floor or
quantities such as temperature, pressure, somewhere under, or aside of, the table, in
voltage, etc. Analog refers to circuits or which case the monitor would be placed on top
numerical values that have a continuous range. of the table. This is the most common type of
Popular analog computer used in the 20 th computers used in the office or at home. A
century was the slide rule. desktop computer is made of different parts
that are connected with cables.
Digital Computers
2. The Laptop
Virtually all modern computers are digital.
Digital refers to the processes in computers that A computer is called laptop when it combines
manipulate binary numbers (0s or 1s), which the CPU, the monitor, the keyboard, and the
represent switches that are turned on or off by mouse in one unit to be so small that you can
electrical current. A bit can have the value 0 or carry it on your laps when traveling or
the value 1, but nothing in between 0 and 1. A commuting. A laptop is also called a notebook.
desk lamp can serve as an example of the Other parts, such as an external mouse, an
difference between analog and digital. external keyboard, or peripherals such as a
printer or a projector, can be connected to the
If the lamp has a simple on/off switch, then the
laptop. A laptop is only physically smaller than a
lamp system is digital, because the lamp either
desktop but, everything considered, it can do
produces light at a given moment or it does not.
anything that a desktop can do.
If a dimmer replaces the on/off switch, then the
lamp is digital, because the amount of light can 3. The Server
vary continuously from on to off and all
A server is a computer that holds information
intensities in between. Digital computers are
that other computers, called workstations, can
more common in use and it will be our focus of
retrieve. Such workstations are connected to
discussion.
the server using various means. This means that
they could be connected using cable, wireless
connection, etc. Only computers that maintain a
Hybrid Computer
type of connection with the server can get the
This is when a computer make is of both analog information that is stored in the server.
and digital components and techniques. Such Normally, although not particularly
computer require analog to digital and digital to recommended, any computer, including a
analog converter which will make analog and desktop or even a laptop can be used as a
digital data palatable to server, as long as it can do the job required. A
server is more defined by the program (called
an operating system) that is installed in it, not
how the machine looks. Any type of computer,
including a desktop, a laptop, a CD or DVD
machine, etc can be connected to a server. The  It is quite easy and simple for the
person who sets up a server also defines the viruses to sneak into a computer by
types of connections it is made for. dodging the defense systems.

4. The Mainframe  A successful breach can cause serious


issues for the user such as infecting
A mainframe is a computer, usually physically
other resources or system software,
big, that does almost all the jobs for other types
modifying or deleting key functions or
of computers that are connected to it. This is a
applications and copy/delete or encrypt
broad definition but other aspects are involved.
data
Like a server, the program (operating system)
that runs in the mainframe defines its role. How does a computer virus operate?

 A computer virus operates in two ways.

 The first kind, as soon as it lands on a


new computer, begins to replicate.
Computer viruses
 The second type plays dead until the
 A computer virus is a malicious program
trigger kick starts the malicious code. In
that self-replicates by copying itself to
other words, the infected program
another program.
needs to run to be executed.
 In other words, the computer virus
 Therefore, it is highly significant to stay
spreads by itself into other executable
shielded by installing a robust antivirus
code or documents.
program.
 The purpose of creating a computer
 Of late, the sophisticated computer
virus is to infect vulnerable systems,
virus comes with evasion capabilities
gain admin control and steal user
that help in bypassing antivirus
sensitive data.
software and other advanced levels of
 Hackers design computer viruses with defenses.
malicious intent and prey on online
 The primary purpose can involve
users by tricking them.
stealing passwords or data, logging
 One of the ideal methods by which keystrokes, corrupting files, and even
viruses spread is through emails – taking control of the machine.
opening the attachment in the email,
 Subsequently, the polymorphic
visiting an infected website, clicking on
malware development in recent times
an executable file, or viewing an
enables the viruses to change its code
infected advertisement can cause the
as it spreads dynamically.
virus to spread to your system.
 This has made the virus detection and
 Besides that, infections also spread
identification very challenging.
while connecting with already infected
removable storage devices, such as USB
drives.
The History of Computer Virus  The computer gets infected through the
replication of malicious code. Computer
 Robert Thomas, an engineer at BBN
viruses come in different forms to infect
Technologies developed the first known
the system in different ways.
computer virus in the year 1971.

 The first virus was christened as the


“Creeper” virus, and the experimental Some of the most common viruses are:
program carried out by Thomas
 Boot Sector Virus
infected mainframes on ARPANET.
 Direct Action Virus
 The teletype message displayed on the
screens read, “I’m the creeper: Catch  Resident Virus
me if you can.”
 Multipartite Virus
 But the original wild computer virus,
probably the first one to be tracked  Polymorphic Virus
down in the history of computer viruses  Overwrite Virus
was “Elk Cloner.”
 Spacefiller Virus
 The Elk Cloner infected Apple II
operating systems through floppy disks.

 The message displayed on infected Boot Sector Virus –


Apple Computers was a humorous one.  This type of virus infects the master
 The virus was developed by Richard boot record and it is challenging and a
Skrenta, a teenager in the year 1982. complex task to remove this virus and
often requires the system to be
 Even though the computer viruses were formatted. Mostly it spreads through
designed as a prank, it also enlightened removable media.
how a malicious program could be
installed in a computer’s memory and Direct Action Virus
stop users from removing the program.  This is also called non-resident virus, it
 It was Fred Cohen, who coined the term gets installed or stays hidden in the
“computer virus” and it was after a year computer memory. It stays attached to
in 1983. the specific type of files that it infect. It
does not affect the user experience and
 The term came into being when he system’s performance.
attempted to write an academic paper
titled “Computer Viruses – Theory and Resident Virus –
Experiments” detailing about the  Unlike direct action viruses, resident
malicious programs in his work. viruses get installed on the computer. It
 A computer virus is one type of is difficult to identify the virus and it is
malware that inserts its virus code to even difficult to remove a resident
multiply itself by altering the programs virus.
and applications
 Multipartite Virus –  Consequently, when the particular
program is loaded, the virus is also
This type of virus spreads through
loaded.
multiple ways. It infects both the boot
sector and executable files at the same  Besides these, the other file infector
time. viruses come as a completely included
program or script sent in email
 Polymorphic Virus –
attachments.
These type of viruses are difficult to
identify with a traditional anti-virus
program. This is because the #Macro viruses:
polymorphic viruses alters its signature
 As the name suggests, the macro
pattern whenever it replicates.
viruses particularly target macro
language commands in applications like
Microsoft Word. The same is implied on
 Overwrite Virus –
other programs too.
This type of virus deletes all the files
 In MS Word, the macros are keystrokes
that it infects. The only possible
that are embedded in the documents or
mechanism to remove is to delete the
saved sequences for commands. The
infected files and the end-user has to
macro viruses are designed to add their
lose all the contents in it. Identifying the
malicious code to the genuine macro
overwrite virus is difficult as it spreads
sequences in a Word file. However, as
through emails.
the years went by, Microsoft Word
witnessed disabling of macros by
default in more recent versions. Thus,
 Spacefiller Virus – the cybercriminals started to use social
This is also called “Cavity Viruses”. This engineering schemes to target users. In
is called so as they fill up the empty the process, they trick the user and
spaces between the code and hence enable macros to launch the virus.
does not cause any damage to the file.  Since macro viruses are making a come
back in the recent years, Microsoft
quickly retaliated by adding a new
#File infectors: feature in Office 2016. The feature
 Few file infector viruses come attached enables security managers to selectively
with program files, such as .com or .exe enable macro use. As a matter of fact, it
files. can be enabled for trusted workflows
and blocked if required across the
 Some file infector viruses infect any organization.
program for which execution is
requested, including .sys, .ovl, .prg, and
.mnu files.
Overwrite Viruses: #Resident Viruses:

 The virus design purpose tends to vary  The Resident virus implants itself in the
and Overwrite Viruses are memory of a computer. Basically, the
predominantly designed to destroy a original virus program is not required to
file or application’s data. As the name infect new files or applications. Even
says it all, the virus after attacking the when the original virus is deleted, the
computer starts overwriting files with version stored in memory can be
its own code. Not to be taken lightly, activated. This happens when the
these viruses are more capable of computer OS loads certain applications
targeting specific files or applications or or functions. The resident viruses are
systematically overwrite all files on an troublesome due to the reason they can
infected device. run unnoticed by antivirus and
antimalware software by hiding in the
 On the flipside, the overwrite virus is
system’s RAM.
capable of installing a new code in the
files or applications which programs #Rootkit Viruses:
them to spread the virus to additional
 The rootkit virus is a malware type
files, applications, and systems.
which secretly installs an illegal rootkit
#Polymorphic Viruses: on an infected system. This opens the
door for attackers and gives them full
 More and more cybercriminals are
control of the system. The attacker will
depending on the polymorphic virus. It
be able to fundamentally modify or
is a malware type which has the ability
disable functions and programs. Like
to change or mutate its underlying code
other sophisticated viruses, the rootkit
without changing its basic functions or
virus is also created to bypass antivirus
features. This helps the virus on a
software. The latest versions of major
computer or network to evade
antivirus and antimalware programs
detection from many antimalware and
include rootkit scanning.
threat detection products.
#System or Boot-record Infectors:
 Since virus removal programs depend
on identifying signatures of malware,  The Boot-record Infectors infect
these viruses are carefully designed to executable code found in specific
escape detection and identification. system areas on a disk. As the name
When a security software detects a implies, they attach to the USB thumb
polymorphic virus, the virus modifies drives and DOS boot sector on diskettes
itself thereby, it is no longer detectable or the Master Boot Record on hard
using the previous signature. disks. Boot viruses are no more
common these days as the latest
devices rely less on physical storage
media.
How To Avoid Email Viruses And Worms and from, contact the service in question and file a
How To Be Safe From Email Viruses And formal complaint.
Worms

Do’s
Don’ts
1. Use a professional, email service such as
1. Do not open an email attachment unless you
Runbox. Subscription services provide higher
were expecting it and know whom it’s from.
levels of security and support.
2. Do not open any unsolicited executable files,
2. Make sure that your Runbox virus filter is
documents, spreadsheets, etc.
activated.
3. Avoid downloading executable or documents
3. Use the Webmail interface at
from the internet, as these are often used to
www.runbox.com to read your email, or don’t
spread viruses.
download all your email to an email client
4. Never open files with a double file extension,
unseen. Screen your email first, and delete
e.g. filename.txt.vbs. This is a typical sign of a
suspicious-looking and unwanted messages
virus program.
before downloading the legitimate email to
5. Do not send or forward any files that you
your local email client.
haven’t virus-checked first.
4. Make sure your computer has updated anti-
6. Viruses and spam
virus software running locally. Automatic
updates are essential for effective virus 7. Virus-makers and spammers often cooperate
protection. Combined with server-side in devious schemes to send as much spam as
scanning, you now have two layers of security. possible as efficiently as possible. They create
5. Disable message preview in your email client, viruses that infect vulnerable computers around
especially on Windows platforms. Otherwise, the world and turn them into spam-generating
malicious programs attached to incoming “robots”. The infected computers then send
messages may execute automatically and infect massive amounts of spam, unbeknownst to the
your computer. computer owner.
6. Ignore or delete messages with attachments
appearing to be sent from official Runbox email
addresses. Runbox rarely sends email to our How To Get Rid Of Computer Virus
users, aside from replies to inquiries and Never the neglect to take action on a computer
payment reminders. We practically never send virus residing in your system. There are chances
an email with attachments to users. that you might end up losing important files,
7. Take caution when opening graphics and programs, and folders. In some cases, the virus
media attachments, as viruses can be disguised damages the system hardware too. Thereby, it
as such files. becomes mandatory to have an effective anti-
8. Maintain several independent email virus software installed on your computer to
accounts. If a virus infects your only business steer clear of all such threats.
email address, you’ll be in trouble. Also, keep
backups of your most important email and files
separately.
9. If any valid message headers of a virus-email
indicate what server the message was sent
Signs of Virus Infection The Disk Cleanup tool helps in deleting
your temporary files on the computer.
 It is vital for any computer user to be
aware of these warning signs –  Here is how you got to go about
accomplishing it – Start menu then
• Slower system performance
select All Programs, now you click on
• Pop-ups bombarding the screen
Accessories, System Tools, and then
• Programs running on their own
click Disk Cleanup.
• Files multiplying/duplicating on their own
• New files or programs in the computer
• Files, folders or programs getting deleted or
Download Virus/Malware Scanner
corrupted
• The sound of a hard drive  If you are under the impression that a
virus scanner cleanups the bad stuff
If you come across any of these above-
from your computer then sadly, that’s
mentioned signs then there are chances that
not true! It helps in eliminating
your computer is infected by a virus or
standard infections and not sufficient to
malware. Not to delay, immediately stop all the
remove the latest harmful infections.
commands and download an antivirus software.
The virus/malware scanner helps to
If you are unsure what to do, get the assistance
narrow down on the issue, so,
of an authorized computer personnel. If you are
download it now. In order to better
confident enough, start investigating on your
protect go for a real-time anti-virus
own by following the below mentioned step-by-
program, since it automatically keeps
step procedures.
checking in the background for viruses.

 P.S: Don’t install more than one real-


#Safe Mode time anti-virus program. If you do so,
your system will start to behave
Boot the system and press F8 for Advanced
weirdly.
Boot Options menu. Select Safe Mode with
Networking and press Enter. You might need to #Run a Virus/Malware Scan
keep repeatedly pressing to get on to the
 Download the virus/malware scanner
screen.
using the internet. Once you have
Working on the Safe Mode helps handle finished downloading the virus scanner,
nefarious files as they’re not actually running or disconnect it for security and safety
active. Last but not the least the internet reasons. After successful download
spreads the infection, so remove the complete the installation procedures of
connection. the Virus/Malware scanner, then start
running your on-demand scanner first
and thereafter run your real-time
#Delete Temporary Files scanner.

 In order to free the disk space, delete  The reason for running both is that one
temporary files before starting to run of them will effectively eliminate your
the virus scan. This approach helps computer virus or malware.
speed up the virus scanning process.
#Reinstall the Software or Damaged Files

 Once the virus removal from your


computer is complete, go ahead and
reinstall the files and programs that
were damaged by the virus or malware.
Make use of the backups for re-
installation.

 In simple, do the backups regularly and


stay protected.

Potrebbero piacerti anche