SlideShare uma empresa Scribd logo
1 de 2
Yadav 1


Pahdi Yadav

Professor Milton

English 101

5 May 2008

                                            Antivirus Programs

        Today, people rely on computers to create, store, and manage critical information, many times

via a home computer network. Information transmitted over networks has a higher degree of security

risk than information kept in a user’s home or company premises. Thus, it is crucial that they take

measures to protect their computers and data from loss, damage, and misuse resulting from computer

security risks. Antivirus programs are an effective way to protect a computer against viruses.


        An antivirus program protects a computer against viruses by identifying and removing any

computer viruses found in memory, on storage media, or on incoming files. 1 When you purchase a new

computer, it often includes antivirus software. Antivirus programs work by scanning for programs that

attempt to modify the boot program, the operating system, and other programs that normally are read

from but not modified. In addition, many antivirus programs automatically scan files download from

the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer

(Karanos 201-205).


        One technique that antivirus programs use to identify a virus is to look for virus signatures, or

virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman

(Antivirus Programs), many vendors of antivirus programs allow registered users to update virus

signature files automatically from the Web at no cost for a specified time. Updating the antivirus




        1
         Bulowski points out that most antivirus programs also protect against worms and Trojan
horses (55-61).
Yadav 2


program’s signature files regularly is important, because it will download any new virus definitions that

have been added since the last update.


            Methods that guarantee a computer or network is safe from computer viruses simply do not

exist. Installing, updating, and using an antivirus program, though, is an effective technique to safeguard

your computer from loss.




        1
         Bulowski points out that most antivirus programs also protect against worms and Trojan
horses (55-61).

Mais conteúdo relacionado

Mais procurados (20)

Hamilton lara 2011
Hamilton lara 2011Hamilton lara 2011
Hamilton lara 2011
 
Chap 2 lab 2
Chap 2 lab 2Chap 2 lab 2
Chap 2 lab 2
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Antivirus program ----neri
Antivirus program  ----neriAntivirus program  ----neri
Antivirus program ----neri
 
Zamayla chap 2 lab 2
Zamayla chap 2 lab 2Zamayla chap 2 lab 2
Zamayla chap 2 lab 2
 
Dungogan chap 2 lab 2
Dungogan chap 2 lab 2Dungogan chap 2 lab 2
Dungogan chap 2 lab 2
 
Yadav 1(2)
Yadav 1(2)Yadav 1(2)
Yadav 1(2)
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
R esearch report with footnote
R esearch report with footnoteR esearch report with footnote
R esearch report with footnote
 
antivirus
antivirusantivirus
antivirus
 
llagas j.
llagas j.llagas j.
llagas j.
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 

Destaque (10)

Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
 
Chap 2 lab 3 (Ej Guevarra)
Chap 2 lab 3 (Ej Guevarra)Chap 2 lab 3 (Ej Guevarra)
Chap 2 lab 3 (Ej Guevarra)
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalities
 
Buckhorn Strategic Lesson Plan
Buckhorn Strategic Lesson PlanBuckhorn Strategic Lesson Plan
Buckhorn Strategic Lesson Plan
 
We bouwen een theater - deel 9
We bouwen een theater - deel 9We bouwen een theater - deel 9
We bouwen een theater - deel 9
 
Fechas pau 11 12
Fechas pau 11 12Fechas pau 11 12
Fechas pau 11 12
 
Good Nutrition & Weight 5
Good Nutrition & Weight 5Good Nutrition & Weight 5
Good Nutrition & Weight 5
 
Grupo assista amplía sus instalaciones
Grupo assista amplía sus instalacionesGrupo assista amplía sus instalaciones
Grupo assista amplía sus instalaciones
 
U.d.1. intervalos
U.d.1. intervalosU.d.1. intervalos
U.d.1. intervalos
 
Intervalos musicales
Intervalos musicalesIntervalos musicales
Intervalos musicales
 

Semelhante a Chap 2 lab2 (Ej

Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
kent neri
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
UltraUploader
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
phanleson
 

Semelhante a Chap 2 lab2 (Ej (17)

Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Mjtanasas
MjtanasasMjtanasas
Mjtanasas
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
Policy report barrat & associates ltd
Policy report  barrat & associates ltdPolicy report  barrat & associates ltd
Policy report barrat & associates ltd
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
M
MM
M
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 

Mais de Enriquee Guevarra

Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)
Enriquee Guevarra
 
Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)
Enriquee Guevarra
 
Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)
Enriquee Guevarra
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
Enriquee Guevarra
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalities
Enriquee Guevarra
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
Enriquee Guevarra
 
Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)
Enriquee Guevarra
 
Music for life (Ej Guevarra)
Music for life (Ej Guevarra)Music for life (Ej Guevarra)
Music for life (Ej Guevarra)
Enriquee Guevarra
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )
Enriquee Guevarra
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )
Enriquee Guevarra
 
Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )
Enriquee Guevarra
 
Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )
Enriquee Guevarra
 
Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )
Enriquee Guevarra
 

Mais de Enriquee Guevarra (17)

Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)
 
Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
 
Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalities
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
 
Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)
 
Music for life (Ej Guevarra)
Music for life (Ej Guevarra)Music for life (Ej Guevarra)
Music for life (Ej Guevarra)
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )
 
Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )
 
Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )
 
Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )
 
Craft barn ( Ej Guevarra )
Craft barn ( Ej Guevarra )Craft barn ( Ej Guevarra )
Craft barn ( Ej Guevarra )
 
Craft barn
Craft barnCraft barn
Craft barn
 
Autumn festival
Autumn festivalAutumn festival
Autumn festival
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Chap 2 lab2 (Ej

  • 1. Yadav 1 Pahdi Yadav Professor Milton English 101 5 May 2008 Antivirus Programs Today, people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses. An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. 1 When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files download from the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201-205). One technique that antivirus programs use to identify a virus is to look for virus signatures, or virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman (Antivirus Programs), many vendors of antivirus programs allow registered users to update virus signature files automatically from the Web at no cost for a specified time. Updating the antivirus 1 Bulowski points out that most antivirus programs also protect against worms and Trojan horses (55-61).
  • 2. Yadav 2 program’s signature files regularly is important, because it will download any new virus definitions that have been added since the last update. Methods that guarantee a computer or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus program, though, is an effective technique to safeguard your computer from loss. 1 Bulowski points out that most antivirus programs also protect against worms and Trojan horses (55-61).