Методическое пособие по совершенствованию навыков чтения и говорения на английском языке для студентов фксиС и фитиУ



бет49/55
Дата14.09.2023
өлшемі0,77 Mb.
#181014
түріМетодическое пособие
1   ...   45   46   47   48   49   50   51   52   ...   55
Байланысты:
английский для ИТ 1

Date

Threats

Trends

1981

Cloner

The first known virus begins to spread. Cloner infects files on disks formatted for Apple II computers. The prevalence of disk-borne viruses continues well into the1990s with Jerusalem (1987), Michelangelo (1992), and others.



1988

Internet Worm

The first major worm attack over the Internet sets the stage for today's prolific crop of mass-mailing worms.



1998

Back Orifice

First Trojan horse designed to allow a remote hacker to gain unauthorized access to a computer.



1999

Melissa

Macro viruses, such as Melissa and l.aroux, are prevalent for several years and cause trouble by infecting Microsoft Word and Excel files.



2000

Love Letter

One of the fastest spreading mass-mailing worms. Followed by Sobig, Blaster, and MyDoom (2004).



2001

Code Red

Worms designed for Denial of Service attacks gather steam. Code Red, which targeted the White House, is followed by Blaster (2001) and Slammer (2003).



2002

Klez

Klez is a mass-mailing worm that is particularly difficult to eradicate. Because the “From” address is spoofed, it is almost impossible to locate infected computers.



20Most notebook computers are equipped with several USB ports. 03

Mimail

Social engineering takes center stage and users are confused by fake e-mails from seemingly legitimate companies, such as PayPal, Microsoft, and Wells Fargo.



2004

Sasser
Netsky
Xombe
MyDoom, Zafi
Bagle

Worms, such as Sasser, begin to emerge that infect computers without user interaction, such as opening an infected e-mail attachment. Mass-mailing worms are still most prevalent. Worms that spread over instant messaging and handheld devices begin to emerge.



2005

Mytob
Zotob
Rbot

Bots become one of the biggest security problems. Arriving as e-mail attachments, links embedded in e-mail messages, or from infected banner ads, bots install themselves on unprotected computers, which can then be controlled by unauthorized hackers and commandeered into botnets that launch spam and Denial of Service attacks.



These are the top three steps you can take to prevent your computer from becoming infected:


- Use antivirus software on every computing device you own.
- Keep software patches and operating system service packs up to date.
- Do not open suspicious e-mail attachments.
Antivirus software is a type of utility software that can look for and eradicate viruses, Trojan horses, bots, and worms. This essential software is available for handheld computers, personal computers, and servers. Popular antivirus software for personal computers includes McAfee VirusScan, Norton AntiVirus, and F-Secure Anti-Virus.
Antivirus software uses several techniques to find viruses. As you know, some viruses attach themselves to an existing program. The presence of such a virus often increases the length of the original program. The earliest antivirus software simply examined the programs on a computer and recorded their length. A change in the length of a program from one computing session to the next indicated the possible presence of a virus.
To counter early antivirus software, hackers became more cunning. They created viruses that insert themselves into unused portions of a program file without changing its length. Antivirus software developers fought back. They designed software that examines the bytes in an uninfected application program and calculates a checksum. A checksum is a number calculated by combining the binary values of all bytes in a file. Each time you run an application program, antivirus software calculates the checksum and compares it with the previous checksum. If any byte in the application program has changed, the checksum will be different, and the antivirus software assumes that a virus is present.
Today’s viruses, Trojan horses, bots, and worms are not limited to infecting program files, so modern antivirus software attempts to locate them by searching your computer’s files and memory for virus signatures. A virus signature is a section of program code, such as a unique series of instructions, that can be used to identify a known malicious program, much as a fingerprint is used to identify an individual.




Достарыңызбен бөлісу:
1   ...   45   46   47   48   49   50   51   52   ...   55




©engime.org 2024
әкімшілігінің қараңыз

    Басты бет