25.11.2014 Views

MRM pg 1-5.pdf - Mabati Rolling Mills

MRM pg 1-5.pdf - Mabati Rolling Mills

MRM pg 1-5.pdf - Mabati Rolling Mills

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

MABATINEWS<br />

Computer virus<br />

By Sam Kamau<br />

Systems Administrator<br />

Dear Reader, the word<br />

COMPUTER VIRUS has<br />

become a generic term that<br />

refers to all the malicious ways that<br />

your computer can be attacked.<br />

The most common blunder people<br />

make when the topic of a computer<br />

virus arise is to refer to a worm or<br />

trojan horse as a virus. While the<br />

words trojan horse, worm and virus<br />

are often used interchangeably, they<br />

are not the same. Viruses, Worms<br />

and Trojan Horses are all malicious<br />

programs that can cause damage<br />

to your computer, but there are<br />

differences among the three, and<br />

knowing those differences can help<br />

you to better protect your computer<br />

from their often damaging effects.<br />

A virus is a small program (piece of<br />

code) that piggybacks on other programs<br />

or files. A virus can be attached to a word or<br />

excel file by placing its code in the path of<br />

execution so that each time the file is run,<br />

the virus runs too hence replicating itself in<br />

the process.<br />

Since a virus is programmed to alter<br />

the way a computer operates, without the<br />

permission or knowledge of the user it can<br />

damage your programs, hardware and even<br />

delete your files. Others are not designed<br />

to do any damage, but simply to replicate<br />

themselves and make their presence<br />

known by presenting text, video, and audio<br />

messages. Even these “simple” viruses can<br />

create problems for the computer user.<br />

They typically take up computer memory<br />

used by legitimate programs. As a result,<br />

they often cause erratic behavior and can<br />

result in system crashes.<br />

A worm is similar to a virus by its design,<br />

and is considered to be a sub-class of a virus.<br />

Worms spread from computer to computer,<br />

but unlike a virus, it has the capability to<br />

travel without any help from a person.<br />

Worms replicate themselves from<br />

system to system without the use of a host<br />

file. This is in contrast with viruses, which<br />

require the spreading of an infected host<br />

file.<br />

A worm takes advantage of information<br />

transport features on your system, which<br />

allows it to travel unaided. The biggest<br />

danger with a worm is its capability to<br />

replicate itself on your system, so rather<br />

than your computer sending out a single<br />

worm, it could send out hundreds or<br />

thousands of copies of itself, creating a<br />

huge devastating effect.<br />

Due to the copying nature of a worm<br />

and its capability to travel across networks<br />

the end result in most cases is that the<br />

worm consumes too much system memory<br />

(or network bandwidth), causing network<br />

servers and individual computers to stop<br />

responding. More recent attacks such as<br />

the much-talked-about blaster worm, have<br />

been designed to tunnel into your system<br />

and allow malicious users to control your<br />

computer remotely. Others are designed<br />

using SMPT (Simple Mail Transfer Protocol)<br />

engines and will send hundreds of email<br />

from your system without your knowledge<br />

– spamming.<br />

A Trojan horse is a computer program<br />

masquerading as a benign application,<br />

game or a “cute” program.<br />

The Trojan horse, at first glance, will<br />

appear to be useful software but will<br />

actually do damage once installed or run<br />

on your computer. Those on the receiving<br />

end of a Trojan horse are usually tricked<br />

into opening them because they appear<br />

to be receiving legitimate software or<br />

files from a legitimate source. When a<br />

Trojan is activated on your computer,<br />

the results can vary. Trojans are<br />

designed to be more annoying than<br />

malicious (like changing your desktop,<br />

adding silly active desktop icons,<br />

blocking your screen with a graphic<br />

that will not go away). Trojans are also<br />

known to create a backdoor on your<br />

computer that gives malicious users<br />

access to your system, possibly allowing<br />

confidential or personal information to<br />

be compromised. Unlike viruses and<br />

worms, Trojans do not reproduce by<br />

infecting other files nor do they self-<br />

replicate.<br />

Having familiarized ourselves with<br />

the above terms we now need to be<br />

alert of messages that are normally sent<br />

by email to propagate unnecessary alarm<br />

about viruses.<br />

Virus hoaxes are messages, almost<br />

always sent by email, that amount to little<br />

more than chain letters. Following are some<br />

of the common phrases that are used in<br />

these hoaxes:<br />

If you receive an email titled [virus hoax<br />

name here], do not open it!<br />

Delete it immediately!<br />

It contains the virus [hoax name].<br />

It will delete everything on your hard<br />

drive [extreme and improbable danger<br />

specified here].<br />

This virus was announced today by<br />

[reputable organization name here e.g.<br />

CNN].<br />

Forward this warning to [everyone in<br />

your address book!]<br />

Most virus hoax warnings do not deviate<br />

far from this pattern. If you are unsure if a<br />

virus warning is legitimate or a hoax, kindly<br />

seek clarification from your system admin<br />

or from the Internet through a website like<br />

www.symantec.com .<br />

I trust and hope that this article has<br />

enlightened you on the various threats<br />

posed to our systems and you can clearly<br />

distinguish them.<br />

Thank you for taking your time to read this<br />

article.<br />

8<br />

M A B A T I N E W S

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!