SlideShare uma empresa Scribd logo
1 de 3
Yadav 1


Pahdi Yadav

Professor Milton

English 101

5 May 2008



                                                 Antivirus Programs

          Today, People rely on computers to create, store, and manage critical information, many

times via a home computer network. Information transmitted over networks has a higher degree of

security risk than information kept in a user’s home or company premises. Thus, it is crucial that they

take measures to protect their computers and data from loss, damage, and misuse resulting from

computer security risks. Antivirus programs are an effective way to project a computer against viruses.


          An antivirus program protects a computer against viruses by identifying and removing any

computer viruses found memory, on storage media, or on incoming files. When you purchase a new

computer, it often includes antivirus software. Antivirus programs work by scanning for programs that

attempt to modify the boot program, the operating system, and other programs that normally are read

from but not modified. In addition, many antivirus programs automatically scan files downloaded from

the Web, e-mail attachments, open files, and al types of removable media inserted in the computer

(2008, pp. 201-205).


          One technique that antivirus programs use to identify a virus is to look for virus signature, or

virus definition, which know specific patterns of virus code. According to Shelly and cash man (Antivirus

Programs), many vendors of antivirus programs allow registered users to update virus


__________________


1Bulowski our that most antivirus programs also protect against worms and Trojan horses _55-61).
Yadav 2


Program’s signature files regularly are important, because it will download any new virus definition that

has been added since the last update.


         Methods that guarantee a computer or network is safe from computer viruses simply do not

exist. Installing, updating, and using an antivirus program, though, is an effected technique to safeguard

your computer from loss.
Yadav 3

Mais conteúdo relacionado

Mais procurados

Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
Jennifer Cataluña
 
(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2
maranan_alexa
 
Zamayla chap 2 lab 2
Zamayla chap 2 lab 2Zamayla chap 2 lab 2
Zamayla chap 2 lab 2
zamayla143
 
Dungogan chap 2 lab 2
Dungogan chap 2 lab 2Dungogan chap 2 lab 2
Dungogan chap 2 lab 2
ricky098
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
maranan_zyra
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
kent neri
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
kent neri
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
VishwarajYadav
 
Security Measure
Security MeasureSecurity Measure
Security Measure
syafiqa
 

Mais procurados (18)

Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
 
Cataluña antivirus program
Cataluña antivirus programCataluña antivirus program
Cataluña antivirus program
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
antivirus
antivirusantivirus
antivirus
 
llagas j.
llagas j.llagas j.
llagas j.
 
(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2
 
R esearch report with footnote
R esearch report with footnoteR esearch report with footnote
R esearch report with footnote
 
Zamayla chap 2 lab 2
Zamayla chap 2 lab 2Zamayla chap 2 lab 2
Zamayla chap 2 lab 2
 
Dungogan chap 2 lab 2
Dungogan chap 2 lab 2Dungogan chap 2 lab 2
Dungogan chap 2 lab 2
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
Security Measure
Security MeasureSecurity Measure
Security Measure
 

Semelhante a chap 2 lab 2 {(bryan123)}

Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
Webroot
 

Semelhante a chap 2 lab 2 {(bryan123)} (16)

Mjtanasas
MjtanasasMjtanasas
Mjtanasas
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
Policy report barrat & associates ltd
Policy report  barrat & associates ltdPolicy report  barrat & associates ltd
Policy report barrat & associates ltd
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaper
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 

Mais de richbryansalvo (20)

Home networks
Home networksHome networks
Home networks
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)
 
Hankins by {bryan23}
Hankins by {bryan23}Hankins by {bryan23}
Hankins by {bryan23}
 
Leadership is stewardship bryan salvo23
Leadership is stewardship bryan salvo23Leadership is stewardship bryan salvo23
Leadership is stewardship bryan salvo23
 
Leadership is stewardship bryan23
Leadership is stewardship bryan23Leadership is stewardship bryan23
Leadership is stewardship bryan23
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalities
 
My work together
My work togetherMy work together
My work together
 
My our talent
My our talentMy our talent
My our talent
 
Personal activity
Personal activityPersonal activity
Personal activity
 
Shop for sale bryan kcl
Shop for sale bryan kclShop for sale bryan kcl
Shop for sale bryan kcl
 
Our gingoog city
Our gingoog cityOur gingoog city
Our gingoog city
 
Shop for sale
Shop for saleShop for sale
Shop for sale
 
Craft barn
Craft barnCraft barn
Craft barn
 
Lake for lot bryan salvo i peace
Lake for lot bryan salvo i peaceLake for lot bryan salvo i peace
Lake for lot bryan salvo i peace
 
Lake for lot
Lake for lotLake for lot
Lake for lot
 
Lake for lot
Lake for lotLake for lot
Lake for lot
 
Rent a cabin
Rent a cabinRent a cabin
Rent a cabin
 
Blooming deals
Blooming dealsBlooming deals
Blooming deals
 
Airplanerides
AirplaneridesAirplanerides
Airplanerides
 
Autumn festival
Autumn festivalAutumn festival
Autumn festival
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

chap 2 lab 2 {(bryan123)}

  • 1. Yadav 1 Pahdi Yadav Professor Milton English 101 5 May 2008 Antivirus Programs Today, People rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to project a computer against viruses. An antivirus program protects a computer against viruses by identifying and removing any computer viruses found memory, on storage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, e-mail attachments, open files, and al types of removable media inserted in the computer (2008, pp. 201-205). One technique that antivirus programs use to identify a virus is to look for virus signature, or virus definition, which know specific patterns of virus code. According to Shelly and cash man (Antivirus Programs), many vendors of antivirus programs allow registered users to update virus __________________ 1Bulowski our that most antivirus programs also protect against worms and Trojan horses _55-61).
  • 2. Yadav 2 Program’s signature files regularly are important, because it will download any new virus definition that has been added since the last update. Methods that guarantee a computer or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus program, though, is an effected technique to safeguard your computer from loss.