IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 12    
Website: http://www.ijser.org
scirp IJSER >> Volume 2, Issue 12, December 2011
Computer Viruses
Full Text(PDF, 3000)  PP.  
Author(s)
Sachin Dnyandeo Ubarhande
KEYWORDS
Introduction,The Basics of the Computer Viruses,Types of Computer Viruses,Functional elements of Virus,Computer Viruss writers,To which extend Computer Viruses writes, make consideration to ethics?,Pro-Active approaches to controlling Viruses
ABSTRACT
While technology advances have brought many benefits to society there have also been technological abuses .In today's generation, with the help of the Internet and the rapid growth of the personal computer in the average household, we are able to talk to and share information with people from all sides of the globe .Unfortunately this transformation of data has opened the doors for a new era of high tech crime - the computer virus. The Internet is now a complex gateway for transgression and immoral activities where often the perpetrators of the crime are far removed from the scene of the criminal activity and hidden behind maze of double speak. Today a properly engineered virus can have a devastating effect on the Worldwide Internet showing just how sophisticated and interconnected human beings have become. For example, the Melissa Virus, which became a global phenomenon in March 1999, was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained. Viruses have also provided a weapon for those members of society who wish to harm others for a variety of reasons. As technology is proceeding, programmers are recurrently creating virus shielding software with live updates and enhanced fortification for the most recent viruses. However, the virus protection software's can not always offer 100 percent protection from all the dangerous and insecure material on the Internet. In conclusion, we can only be assiduous in our use of the World Wide Web and hope to turn clear from these perilous prevailing vulnerabilities.
References
[1] Mark A. Ludwig- Black Book of Computer Viruses.

[2] http://www.quickheal.co.in

[3] http://www.symantec.com

[4] http://www.howstuffworks.com/virus.htm

[5] http://en.wikipedia.org/wiki/Computer_virus

Untitled Page