A work station in one corner

flickr.com/ccox888

Who can forget the way the world was frozen with the damage of the “Millennium Bug”?  While people around the world should have been counting down to a phenomenal celebration, we were too busy preparing for certain doom and gloom beset by a computer virus.  But then, the clock struck twelve on January 1, 2000 and a new millennium quietly began, bug-free.

Those unfortunate enough to have had to deal with a computer virus knows all too well the threat that can be done.  From taking on annoying quirks, to completely obliterating computers or entire systems, to erasing files,  the powerful effect of a computer virus is nothing to sneeze at.  Computer viruses pose real damage that can be minimal, or can cause worldwide destruction.

In computer security technology circles, the definition of a computer virus is a “self-replicating program that extends by inserting copies of itself into other executable code or documents”.  A computer virus behaves in a manner like a biological virus, which spreads by inserting itself into living cells.

Expanding the analogy, the insertion of a computer virus into a program is termed as an “infection” and the infected file (or executable code that is not part of a file) is called a “host”. Viruses are one of the many types of malicious software, also known as “malware”.  The term “virus” is often extended to refer to Trojan horses, worms, and other sorts of malware.  These are less common than they used to be, however, the inclusion of these kinds of malware can be confusing to computer users.  This confusion can have serious implications, as it can lead to a focus on preventing one genre of malware over another, potentially leaving computers vulnerable to future threats.  The basic rule becomes that computer viruses can only damage software, not hardware.

Viruses have targeted in the following types of hosts:

* Boot sectors of floppy disks; hard disk partitions.

* Master boot record of a hard disk.

* Binary executable files (.COM-files and .EXE-files in MS-DOS; portable executable files in Microsoft Windows; ELF files in Linux).

* General-purpose script files (batch files in MS-DOS and Microsoft Windows; shell script files on Unix-like platforms).

* Application-specific script files (Telix scripts).

* Documents containing macros (Microsoft Word documents).

By nature, a computer virus  is destructive, but others are created solely for the annoyance factor.  Some viruses annoy computer users with a delayed payload, also known as a “bomb”.  For example, a bomb virus might display a note on a specific day, or wait until it has infected a certain number of hosts. A time bomb occurs on a particular date or time, and a logic bomb occurs when the computer user takes an action that initiates the bomb.  However, the predominant ill effect of viruses continues to be their uncontrolled self-reproduction, which wastes or overwhelms computer resources.

To prevent the continuous spread of computer viruses, programmers have created anti-virus software.  However, a fast infector can infect every potential host file that it’s able to penetrate.  This presents a special concern to anti-virus software.  A virus scanner will perform a system-wide scan, accessing all potential host file on the computer.

If the virus scanner fails to take note that a virus exists in the computer’s memory, the virus can “piggy-back” on the virus scanner, and infect all file that is scanned.  Fast infectors rely on their incredible spreading speed.  To prevent the problem, certain anti-virus software programs, like the well-known Spyware, are expanding to cover worms and other threats.

Like the possible devastation of the Millennium Bug in 2000, computer viruses continue to present a real threat to single users and corporate networks alike.

Tagged with:

Filed under: Virus Problems