SlideShare uma empresa Scribd logo
1 de 2
Pahdi Yadav<br />Professor Milton<br />English 101<br />5 May 2008<br />Antivirus programs<br />    Today, people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses.<br />     An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on stage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, E-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201- 205).<br />     One technique that antivirus programs use to identify a virus is to look for virus signatures, or virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman(antivirus programs), many vendors of antivirus programs allow registered users to update virus signature files automatically from the Web at no cost for a specified time. Updating the antivirus<br /> ________________<br />      Bulowski points out that most antivirus programs also protect against worms and Trojan horses (55-61) program’s signature files regularly is important, because it will download any new virus definitions that have been added since the last update.<br />     Methods that guarantee a computer or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus program, though, is an effective technique to safeguard your computer from loss. <br />
Zamayla chap 2 lab 2

Mais conteúdo relacionado

Mais procurados

Mais procurados (19)

Yadav 1(2)
Yadav 1(2)Yadav 1(2)
Yadav 1(2)
 
R esearch report with footnote
R esearch report with footnoteR esearch report with footnote
R esearch report with footnote
 
Antivirus program ----neri
Antivirus program  ----neriAntivirus program  ----neri
Antivirus program ----neri
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
Chap 2 lab2 (Ej
Chap 2 lab2 (EjChap 2 lab2 (Ej
Chap 2 lab2 (Ej
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)
 
(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 

Destaque

Χριστουγεννιάτικη γιορτή 2
Χριστουγεννιάτικη γιορτή 2Χριστουγεννιάτικη γιορτή 2
Χριστουγεννιάτικη γιορτή 2m11_pk
 
[2010] Aspectos emocionais e técnicos da tecnologia educacional
[2010] Aspectos emocionais e técnicos da tecnologia educacional[2010] Aspectos emocionais e técnicos da tecnologia educacional
[2010] Aspectos emocionais e técnicos da tecnologia educacionalUFPE
 
8 hanty mansiysk
8 hanty mansiysk8 hanty mansiysk
8 hanty mansiyskunilib
 
Zona 3 1
Zona 3   1Zona 3   1
Zona 3 1Danger
 
Вісник осбб №8
Вісник осбб №8Вісник осбб №8
Вісник осбб №8Sergii Illiukhin
 
6 . le. 16.05.11.
6 . le. 16.05.11.6 . le. 16.05.11.
6 . le. 16.05.11.warum
 
02 sistema tegumentario
02 sistema tegumentario02 sistema tegumentario
02 sistema tegumentarioVik Beat
 
Zp loe be
Zp loe beZp loe be
Zp loe beneuwerk
 
èXit i fracàs d'empreses
èXit i fracàs d'empresesèXit i fracàs d'empreses
èXit i fracàs d'empresesUNIVEMPRESA
 
Yuan2
Yuan2Yuan2
Yuan2yuanw
 
LAZZARA 840, 2007, 3.000.000 € For Sale Yacht Brochure. Presented By longitud...
LAZZARA 840, 2007, 3.000.000 € For Sale Yacht Brochure. Presented By longitud...LAZZARA 840, 2007, 3.000.000 € For Sale Yacht Brochure. Presented By longitud...
LAZZARA 840, 2007, 3.000.000 € For Sale Yacht Brochure. Presented By longitud...Longitude 64 Switzerland
 
2011.02 Jarosław Bielecki – Aplikacje Facebook, czyli „apps” and downs 2010 r.
2011.02 Jarosław Bielecki – Aplikacje Facebook, czyli „apps” and downs 2010 r.2011.02 Jarosław Bielecki – Aplikacje Facebook, czyli „apps” and downs 2010 r.
2011.02 Jarosław Bielecki – Aplikacje Facebook, czyli „apps” and downs 2010 r.ARBOinteractive Polska
 
3. diploma
3. diploma3. diploma
3. diplomalaycar
 
世界室内设计盛会
世界室内设计盛会世界室内设计盛会
世界室内设计盛会WIE2013
 
Y age slide show
Y age slide showY age slide show
Y age slide showMorgan
 
7 самых мощных инструментов продаж
7 самых мощных инструментов продаж7 самых мощных инструментов продаж
7 самых мощных инструментов продажkutolinadasha
 

Destaque (20)

Χριστουγεννιάτικη γιορτή 2
Χριστουγεννιάτικη γιορτή 2Χριστουγεννιάτικη γιορτή 2
Χριστουγεννιάτικη γιορτή 2
 
[2010] Aspectos emocionais e técnicos da tecnologia educacional
[2010] Aspectos emocionais e técnicos da tecnologia educacional[2010] Aspectos emocionais e técnicos da tecnologia educacional
[2010] Aspectos emocionais e técnicos da tecnologia educacional
 
8 hanty mansiysk
8 hanty mansiysk8 hanty mansiysk
8 hanty mansiysk
 
Zona 3 1
Zona 3   1Zona 3   1
Zona 3 1
 
Riflessioni sui permessi
Riflessioni sui permessiRiflessioni sui permessi
Riflessioni sui permessi
 
Current System
Current SystemCurrent System
Current System
 
Вісник осбб №8
Вісник осбб №8Вісник осбб №8
Вісник осбб №8
 
6 . le. 16.05.11.
6 . le. 16.05.11.6 . le. 16.05.11.
6 . le. 16.05.11.
 
02 sistema tegumentario
02 sistema tegumentario02 sistema tegumentario
02 sistema tegumentario
 
Orientaciones generales profesor
Orientaciones generales profesorOrientaciones generales profesor
Orientaciones generales profesor
 
Zp loe be
Zp loe beZp loe be
Zp loe be
 
èXit i fracàs d'empreses
èXit i fracàs d'empresesèXit i fracàs d'empreses
èXit i fracàs d'empreses
 
Yuan2
Yuan2Yuan2
Yuan2
 
LAZZARA 840, 2007, 3.000.000 € For Sale Yacht Brochure. Presented By longitud...
LAZZARA 840, 2007, 3.000.000 € For Sale Yacht Brochure. Presented By longitud...LAZZARA 840, 2007, 3.000.000 € For Sale Yacht Brochure. Presented By longitud...
LAZZARA 840, 2007, 3.000.000 € For Sale Yacht Brochure. Presented By longitud...
 
2011.02 Jarosław Bielecki – Aplikacje Facebook, czyli „apps” and downs 2010 r.
2011.02 Jarosław Bielecki – Aplikacje Facebook, czyli „apps” and downs 2010 r.2011.02 Jarosław Bielecki – Aplikacje Facebook, czyli „apps” and downs 2010 r.
2011.02 Jarosław Bielecki – Aplikacje Facebook, czyli „apps” and downs 2010 r.
 
3. diploma
3. diploma3. diploma
3. diploma
 
世界室内设计盛会
世界室内设计盛会世界室内设计盛会
世界室内设计盛会
 
Y age slide show
Y age slide showY age slide show
Y age slide show
 
Yosis
YosisYosis
Yosis
 
7 самых мощных инструментов продаж
7 самых мощных инструментов продаж7 самых мощных инструментов продаж
7 самых мощных инструментов продаж
 

Semelhante a Zamayla chap 2 lab 2

Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...UltraUploader
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools ollyabraham
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfBlogger
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basicsjeeva9948
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Stay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus SoftwareStay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus SoftwareSoftwareDeals
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 

Semelhante a Zamayla chap 2 lab 2 (18)

Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
Mjtanasas
MjtanasasMjtanasas
Mjtanasas
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Policy report barrat &amp; associates ltd
Policy report  barrat &amp; associates ltdPolicy report  barrat &amp; associates ltd
Policy report barrat &amp; associates ltd
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Stay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus SoftwareStay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus Software
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Software Antivirus.pdf
Software Antivirus.pdfSoftware Antivirus.pdf
Software Antivirus.pdf
 

Mais de zamayla143

Zamayla chap3 lab 1
Zamayla chap3 lab 1Zamayla chap3 lab 1
Zamayla chap3 lab 1zamayla143
 
Zamayla chap 2 lab3
Zamayla chap 2 lab3Zamayla chap 2 lab3
Zamayla chap 2 lab3zamayla143
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1zamayla143
 
Zamayla chap1 lab3
Zamayla chap1 lab3Zamayla chap1 lab3
Zamayla chap1 lab3zamayla143
 
Zamayla chapter1 lab 2
Zamayla chapter1 lab 2Zamayla chapter1 lab 2
Zamayla chapter1 lab 2zamayla143
 
zamayla chap 1 lab 1
zamayla chap 1 lab 1zamayla chap 1 lab 1
zamayla chap 1 lab 1zamayla143
 

Mais de zamayla143 (7)

Zamayla chap3 lab 1
Zamayla chap3 lab 1Zamayla chap3 lab 1
Zamayla chap3 lab 1
 
Zamayla chap 2 lab3
Zamayla chap 2 lab3Zamayla chap 2 lab3
Zamayla chap 2 lab3
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Zamayla chap1 lab3
Zamayla chap1 lab3Zamayla chap1 lab3
Zamayla chap1 lab3
 
Zamayla chapter1 lab 2
Zamayla chapter1 lab 2Zamayla chapter1 lab 2
Zamayla chapter1 lab 2
 
zamayla chap 1 lab 1
zamayla chap 1 lab 1zamayla chap 1 lab 1
zamayla chap 1 lab 1
 
Roshelle sino
Roshelle sinoRoshelle sino
Roshelle sino
 

Zamayla chap 2 lab 2

  • 1. Pahdi Yadav<br />Professor Milton<br />English 101<br />5 May 2008<br />Antivirus programs<br /> Today, people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses.<br /> An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on stage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, E-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201- 205).<br /> One technique that antivirus programs use to identify a virus is to look for virus signatures, or virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman(antivirus programs), many vendors of antivirus programs allow registered users to update virus signature files automatically from the Web at no cost for a specified time. Updating the antivirus<br /> ________________<br /> Bulowski points out that most antivirus programs also protect against worms and Trojan horses (55-61) program’s signature files regularly is important, because it will download any new virus definitions that have been added since the last update.<br /> Methods that guarantee a computer or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus program, though, is an effective technique to safeguard your computer from loss. <br />