You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
MABATINEWS<br />
Computer virus<br />
By Sam Kamau<br />
Systems Administrator<br />
Dear Reader, the word<br />
COMPUTER VIRUS has<br />
become a generic term that<br />
refers to all the malicious ways that<br />
your computer can be attacked.<br />
The most common blunder people<br />
make when the topic of a computer<br />
virus arise is to refer to a worm or<br />
trojan horse as a virus. While the<br />
words trojan horse, worm and virus<br />
are often used interchangeably, they<br />
are not the same. Viruses, Worms<br />
and Trojan Horses are all malicious<br />
programs that can cause damage<br />
to your computer, but there are<br />
differences among the three, and<br />
knowing those differences can help<br />
you to better protect your computer<br />
from their often damaging effects.<br />
A virus is a small program (piece of<br />
code) that piggybacks on other programs<br />
or files. A virus can be attached to a word or<br />
excel file by placing its code in the path of<br />
execution so that each time the file is run,<br />
the virus runs too hence replicating itself in<br />
the process.<br />
Since a virus is programmed to alter<br />
the way a computer operates, without the<br />
permission or knowledge of the user it can<br />
damage your programs, hardware and even<br />
delete your files. Others are not designed<br />
to do any damage, but simply to replicate<br />
themselves and make their presence<br />
known by presenting text, video, and audio<br />
messages. Even these “simple” viruses can<br />
create problems for the computer user.<br />
They typically take up computer memory<br />
used by legitimate programs. As a result,<br />
they often cause erratic behavior and can<br />
result in system crashes.<br />
A worm is similar to a virus by its design,<br />
and is considered to be a sub-class of a virus.<br />
Worms spread from computer to computer,<br />
but unlike a virus, it has the capability to<br />
travel without any help from a person.<br />
Worms replicate themselves from<br />
system to system without the use of a host<br />
file. This is in contrast with viruses, which<br />
require the spreading of an infected host<br />
file.<br />
A worm takes advantage of information<br />
transport features on your system, which<br />
allows it to travel unaided. The biggest<br />
danger with a worm is its capability to<br />
replicate itself on your system, so rather<br />
than your computer sending out a single<br />
worm, it could send out hundreds or<br />
thousands of copies of itself, creating a<br />
huge devastating effect.<br />
Due to the copying nature of a worm<br />
and its capability to travel across networks<br />
the end result in most cases is that the<br />
worm consumes too much system memory<br />
(or network bandwidth), causing network<br />
servers and individual computers to stop<br />
responding. More recent attacks such as<br />
the much-talked-about blaster worm, have<br />
been designed to tunnel into your system<br />
and allow malicious users to control your<br />
computer remotely. Others are designed<br />
using SMPT (Simple Mail Transfer Protocol)<br />
engines and will send hundreds of email<br />
from your system without your knowledge<br />
– spamming.<br />
A Trojan horse is a computer program<br />
masquerading as a benign application,<br />
game or a “cute” program.<br />
The Trojan horse, at first glance, will<br />
appear to be useful software but will<br />
actually do damage once installed or run<br />
on your computer. Those on the receiving<br />
end of a Trojan horse are usually tricked<br />
into opening them because they appear<br />
to be receiving legitimate software or<br />
files from a legitimate source. When a<br />
Trojan is activated on your computer,<br />
the results can vary. Trojans are<br />
designed to be more annoying than<br />
malicious (like changing your desktop,<br />
adding silly active desktop icons,<br />
blocking your screen with a graphic<br />
that will not go away). Trojans are also<br />
known to create a backdoor on your<br />
computer that gives malicious users<br />
access to your system, possibly allowing<br />
confidential or personal information to<br />
be compromised. Unlike viruses and<br />
worms, Trojans do not reproduce by<br />
infecting other files nor do they self-<br />
replicate.<br />
Having familiarized ourselves with<br />
the above terms we now need to be<br />
alert of messages that are normally sent<br />
by email to propagate unnecessary alarm<br />
about viruses.<br />
Virus hoaxes are messages, almost<br />
always sent by email, that amount to little<br />
more than chain letters. Following are some<br />
of the common phrases that are used in<br />
these hoaxes:<br />
If you receive an email titled [virus hoax<br />
name here], do not open it!<br />
Delete it immediately!<br />
It contains the virus [hoax name].<br />
It will delete everything on your hard<br />
drive [extreme and improbable danger<br />
specified here].<br />
This virus was announced today by<br />
[reputable organization name here e.g.<br />
CNN].<br />
Forward this warning to [everyone in<br />
your address book!]<br />
Most virus hoax warnings do not deviate<br />
far from this pattern. If you are unsure if a<br />
virus warning is legitimate or a hoax, kindly<br />
seek clarification from your system admin<br />
or from the Internet through a website like<br />
www.symantec.com .<br />
I trust and hope that this article has<br />
enlightened you on the various threats<br />
posed to our systems and you can clearly<br />
distinguish them.<br />
Thank you for taking your time to read this<br />
article.<br />
8<br />
M A B A T I N E W S