Categories: Computer Fundamentals

Learn About Computer Virus in ICT Gadgets in Just 4 Points

 The world of computers and Information Technology is going through an era of electronic terrorism, in the form of viruses. It is a problem that is potentially so dangerous that it threatens the proper functioning of the computer system in today’s information age.

In this article, we will discuss the evolution of viruses, the menace caused by them, the process of infection, the classification of viruses, the types of viruses, and the prevention and cure against them.

The Evolution of Computer Viruses

The concept of Computer Viruses dates back to 1949 when John Von Neumann submitted a paper putting forward the concept of a “Self Replicating” program; the idea seemed impossible and was dropped. Subsequently, the first virus-like program appeared in the form of a recreational game called “CODE-WARS” at the Bell Labs of the American Telephone and Telegraph Company.

In “Code-wars” two players were to code a set of programs that would destroy the other players’ programs. Realizing the potential danger of such programs, the authors did not reveal the presence of such programs. Concurrently, at the Massachusetts Institute of Technology, students were carrying out experiments with computers, which nobody had ever tried. Their relatively harmless hobby of messing up with programs gave rise to the idea and concept of computer viruses.

The first commercial application of viruses was in 1985, when two Pakistani brothers, in order to keep track of software piracy used Brain Virus (also known as Pakistani virus) on their low-cost software sold from their outlet in Lahore. Hidden in nearly every disk they sold, was an extra program not supplied by the original manufacturer, a snippet of computer code, self-replicating in nature that would infect an unauthorized user’s computer by disrupting his operations. These self-replicating programs multiplied so fast that, today, they are a threat to the smooth operation of a computer.

Ensuring data security on PCs and LANs is a major problem. Unless organizations create security awareness in their workforce, any measures for data security are not likely to prove successful. In this article, the major approaches to cryptography have been illustrated. These range from Caesar Cipher to RSA-129.

The Menace

The virus, whether biological or electronic is an information disorder. Biological viruses are tiny genetic codes DNA or RNA that take over the machinery of a living cell and are capable of making thousands of replicas of the original virus. Like its biological counterpart, a virus carries in it an instructional code that makes copies of itself.

Lodged in a host computer, the typical virus takes temporary control of the computer disk operating system. When the infected system comes in contact with an uninfected computer, the virus passes onto the uninfected machine and, thus spreads like a forest fire, infecting machine after machine with which it comes in contact.

Computer viruses are computer programs, which are a collection of coded instructions. The basic difference between a normal program and a virus is that viruses are self-replicating, they have the capability of executing themselves without being asked for. Computer virus is a very broad term in itself and includes not only viruses, but also Worms and Trojans.

Trojans are similar to viruses. They move around as valid programs, sometimes getting executed with flashy opening screens describing them as a “Word Process” or a “Database Package”. Trojans are programs that claim to do something but do something completely different and in the process damage information stored on a computer system. Trojans do not infect other software.

Worms travel longer distances by storing themselves in crittas of the disc from where they get loaded and have with them sufficient code to transfer themselves outward from the system they infect.

Worms have been known to damage and infect entire LANs.

Apart from self-replication, another devastation caused by viruses is data loss. A virus can also take steps to avoid its detection. That makes viruses even more dangerous, because you may come to know about the infection when it has struck. Even though all viruses are developed with specific characteristics, most of them result in data loss. Most viruses are designed to perform simple feats but in order to do so, they:

•    Corrupt the most sensitive area of the disk; the File Allocation Table (FAT) or the directory area.

•    Modify the interrupt organization of the system, meaning when a read or write-to-screen operation takes place, it is routed through the virus code in the memory resulting in unresolvable interrupt clashes where a program opens up a file simultaneously for read-write access and the virus interrupts every operation.

•            Even though the viruses may have no instructions built into them to destroy data, they can nevertheless render a disk full of files absolutely useless.

The Process of Infection

Infection Process by Computer Viruses

To understand how a virus infects a system, we go back to the elementary workings of a computer. On booting, the system carries out the ROM instructions, the first being the Power On Self Test (POST), which is followed by the bootstrap process of reading the boot record and loading the disk operating system. In MS-DOS, it involves the loading of IBMDOS.COM, IBMBIO>COM and COMMAND.COM along with some optional files like CONFIG.SYS and AUTOEXEC.BAT. The booting process culminates in the system prompt displayed on the VDU.

The infection may begin as soon as a computer system boots from a contaminated disk or executes an infected program. Whatever viruses are present get activated, which immediately begin to spread throughout the system.

Another important aspect that needs to be mentioned here is the interrupt mechanism. All input/output activities on a PC are carried out by interrupts. The interrupt mechanism in itself is very complex. We will try to understand it with an example. Let us say, a user wishes to save his program and presses the required keys on the keyboard. This is treated as an interrupt. The main memory has specific routines to handle these user requests. One such set of routines exists in the ROM-BIOS and the other is in the DOS program in the memory, loaded from IBMBIO.COM. The routine that services the interrupt requests is termed as Interrupt Service

Routines (ISRs) are located in the memory with their addresses. Then interrupt request activates a number and not the routine address, thus, there exists a table with the interrupt numbers and the corresponding routine address in DOS. When an interrupt request is made, the CPU looks up the table, performs the required routines and transfers the control back to the program.

The contents of the ISR address table in the RAM are vulnerable to modification by user programs and that is what a virus does-modify the ISR’s address

Classification of Viruses

Viruses are classified on the basis of their mode of existence and there are three categories of viruses:

1.                  BOOT Infectors

2.                  SYSTEM Infectors

3 .        GENERAL EXECUTABLE       PROGRAM Infectors.

BOOT Infectors

As the name suggests, they are characterized by the fact that they physically reside in the boot sector (0 zero) sector of the disk. A system infected by such a virus will have the virus residing in a particular area of the disk rather than in a program file. These viruses get loaded soon after the Power On Self Test and control the system and remain in control at all times. They sometimes have the capability to trap soft booting (i.e. CTRL ALT DEL) and remain in control even if the system is booted from a non-infected floppy, thereby contaminating the clean floppy.

Boot infectors displace information originally residing on the location, which they occupy. While writing onto the boot sector, the virus ensures that the boot record is not deleted. Once the virus is loaded, it automatically transfers control to the area where the boot record is available. The reason behind doing this is that the boot record contains instructions to read IBMBIO.COM and IBMDOS.COM and if these files are not readable, access to the disk is not possible, and so the virus becomes ineffective.

Boot infectors typically create “Bad sectors”. Boot infectors are the types that, once loaded would stay in the memory until the system is shut off, and until the disk reformats.

SYSTEM Infectors

This second category of viruses deals with the components of the system itself. All machines without exception require an operating system in order to create an environment in which the operator works. In MS-DOS, COMMAND.COM contains all the internal commands. If no such command file exists, commands such as COPY, DIR etc. are not loaded onto the memory when the machine is booted. The System Infectors attach themselves to a file such as COMMAND.COM or other memory resident files and manipulate these files.

System infectors differ from Boot infectors in the sense that system infectors gain control after the computer is booted: and infect the hard disk or bootable floppies, which contain the appropriate system files only. They have another peculiarity that they may activate after a given period of time or may instantly begin subtle modifications of system error messages or information messages.

GENERAL.COM or EXE Infectors

From the infection point of view, these viruses are the most dangerous and devastating of the three classes of viruses. They attach themselves to program files and can spread to almost any executable program in any system. These viruses change the original program instructions into a “jump” to its own code and follow that code with a return to the original program. As a result, whenever the program is executed, the virus gets loaded and executed first and then allows the original program to proceed. It remains a memory resident and infects each and every program that is loaded for execution.

By attaching themselves to EXE or COM files, they alter the file size and sometimes multiple infections render program files too large to be accommodated in the memory.

 

CENTREFORELITES

Recent Posts

Prophecy of Baba Vanga for 2025: An Analytical Perspective

Baba Vanga, a name that has gained prominence in mysticism and prophetic insight, was a…

3 days ago

The Prophecy of Nyirabiyoro: A Glimpse into the Mystical Past of Rwanda

The Prophecy of Nyirabiyoro is a fascinating piece of Rwandan history that has intrigued scholars…

2 weeks ago

Exploring the Meaning of “Asleep Among Endives”: A Deeper Dive into the Song’s Themes

In this blog post, we’ll explore the meaning behind "Asleep Among Endives," delving into the…

2 weeks ago

The 6 Fundamental Pillars of Building Blocks Marketing

The concept of "Building Blocks Marketing" refers to a systematic approach to developing a marketing…

2 weeks ago

4 Types of Interviews in Research: A Comprehensive Overview

This blog post aims to provide a comprehensive exploration of the various types of interviews…

2 weeks ago

Crafting an Effective Annual Marketing Plan: A Comprehensive Guide

An annual marketing plan serves as the blueprint for business growth, allowing companies to strategically…

2 weeks ago