What Is a Computer Virus?
A computer virus is malicious software designed to spread to other computers by inserting herself into authentic programs called “guests.” It can more or less seriously damage the roles of the infected computer. It can spread by any medium of exchange of digital data such as computer networks and CD-ROMs, USB keys, etc.
Its name comes from an analogy with biological viruses because it has similarities in the way it is spread using the reproductive capability of the great number cell. It assigns the term “computer virus” in computer and molecular biologist Leonard Adleman (Fred Cohen, Experiments with Computer Viruses, 1984). Computer viruses are not to be confused with computer worms, which are programs that can spread and replicate on their own without contaminating the great number program. In a general sense, is often used and misused the information virus to designate any form of malware.
The total number of malicious programs known to be about 95 000 according to Sophos (all types of malware combined). However, the actual number of viruses in circulation would not go beyond a few thousand depending on the WildList Organization, every antivirus vendor with an interest in “inflating” the number of viruses it detects. The great majority affects the Windows platform. Although they are extremely few, there are also virus-like systems Unix / Linux, but no outbreaks similar to that of the Windows virus has been detected in 2010. The rest is mainly aimed at operating systems that are distributed over the past few years, as the 27 viruses – none being dangerous – imposed Mac OS 9 and its predecessors (recorded by John Norstad, author of the antivirus Disinfectant ). Systems are least affected FreeBSD that focuses its development on security, in addition as Netware and OS / 2 too few to provide a developer known viruses. Viruses are often unprotected to false alarms that the rumor spread, bulky freight.
Some of them, playing on the ignorance of computer users, they sometimes destroy parts of the operating system completely healthy. The first independent software had no purpose they have today. The very first software of this kind were insignificant entertainment, a game between three data of Bell, chief War, produced in 1970 in the laboratories of the company. For this game, each player writes a program, then loaded into RAM. The operating system, which has just been multitasking, in turn executes an instruction for each software. The goal of the game is to destroy the opposing programs while ensuring its own proliferation. The players do not clearly opposing the location of the program. The software is capable of copying itself, repair itself, to move themselves into different areas of memory and “attacking” the software by writing random opponent in other memory areas. The game ends after a set time or when a player sees all its programs idle or destroyed. The winner is the one that has the largest number of active copies. This is exactly the principles of programming viruses.
In 1984, the magazine Scientific American presented a computer game design consisting of small programs that come into s’autoreproduisant fight and trying to inflict damage on opponents, consequently setting the stage for future viruses. In 1986, the ARPANET was infected by Brain, virus renaming all boot disks system (C) Brain. The creators of this virus gave them their name, address and phone number because it was an advertisement for them.
The virus is a typical piece of program, often written in assembler, which fits into a normal program, most often at the end but also at the beginning or the middle. Each time the user runs the program “infected”, it activates the virus the opportunity to get integrated into other executable programs. additionally, when it contains a payload, it may, after a certain time (which can be very long) or a special event, perform a predetermined action. This action can range from a simple message harmless to the decline of some roles of the operating system or damage to files or already complete destruction of all data on the computer. One speaks in this case “logic bomb”.A boot virus installs a boot sector of a boot device: hard excursion (the main boot sector, the “master boot record, or that of a partition), floppy or in any case. It replaces a boot loader (or boot program or “bootloader”) entered (by copying the original in other places) or produced (on a disc or there was none) but does not modify a program like a normal virus, when it replaces an existing startup program, it acts like a virus “prepend” (which is inserted at the beginning), but the fact of infecting a virgin device of any software startup differs from classical virus, which never attacks to “nothing.”
Macro viruses that attack software macros in Microsoft Office (information, Excel, etc..) by VBA Microsoft. For example, adhering to the normal.dot template in information, a virus can be activated every time the user runs the program. Viruses, worms, appeared around 2003, having experienced a rapid development in the years that followed, are typical viruses because they have a great number program. But similar to the worms (in English “worm”) because:
Their mode of propagation is connected to the network, like worms, usually via the exploitation of security vulnerabilities.
Like worms, their action is discreet and non-destructive to users of the infected machine.
Like worms, they continue to set general goals, such as distributed denial of resources attack or DoS (Denial of Service) to a server with thousands of infected machines connecting simultaneously. [ref. necessary] The batch-kind virus, which emerged in the days when MS-DOS operating system was in vogue, viruses are “early.” Although able to copy and infect other batch files, they are slow and have very low infectivity. Some programmers have been up to create encrypted and polymorphic viruses Batch. This is a real technical feat Batch as the language is simple and early.
Other threats exist in IT, it often distinguished by the absence of reproductive system that characterizes the viruses and worms, the term “malicious software (” malware “in English) is more appropriate in this case. The term computer virus was produced by analogy with the virus in biology: a computer virus uses its great number (the computer it infects) to copy and spread to other computers. Like biological viruses, where the genetic varied slows growth chances of a virus, computer systems and what are the most popular software that are most affected by viruses: Microsoft Windows, Microsoft Office, Microsoft Outlook, Microsoft Internet Explorer, Microsoft Internet Information Server… specialized versions of Windows (NT/2000/XP Pro) to manage rights in a specialized manner are not immunized against these stealthy invaders.
The commoditization of Internet access was a major factor in the rapid extensive spread of the latest viruses. This is mainly due to the ability of viruses to appropriate email addresses found on the infected machine (in the address book but also in the messages or archives visited web pages or messages to newsgroups ). Similarly, the interconnection of computers in local networks has amplified the ability to spread viruses that find this way more possible targets. However, systems with limited dispensing are not affected proportionately. The majority of these systems, as variants of the architecture UNIX (BSD, Mac OS X or Linux), using standard management rights of each user allowing them to avoid the simplest attacks, the damage is so typically confined to areas easy to reach only to users, saving the base operating system. Legal viruses.
When discovered, the virus is stated a name. This theory is consistent with the agreement signed in 1991 by members of Computer Best Antivirus Research Organization. This name is determined as follows:
– Prefix, mode of infection (macro viruses, trojan horses, worms…) or the operating system concerned;
– A information expressing its special or flaw that exploits (Swen is an anagram of News, an anagram of Admin Nimda, Sasser exploits a vulnerability LSASS );
– In a version number suffix (the viruses are often taken the form of variants with similarities to the original version). Unfortunately, the analytical laboratories of various antiviral publishers sometimes affect their own name to the virus they are working on, which makes it difficult to find information. consequently, for example, the Netsky virus in different Q is called W32.Netsky.Q @ mm Symantec, Trend Micro WORM_NETSKY.Q, W32/Netsky.Q.worm at Panda and I-Worm.NetSky. r at Kaspersky. It is possible to search for a generic name given by specialized search engines, such as Virus Bulletin or Kevin Spicer. Virus on Linux. The Linux operating system, in addition as the Unix operating systems and related, is usually fairly well protected against computer viruses. However, some viruses can potentially damage Linux systems are not obtain.
Like other Unix systems, Linux implements a multi-user ecosystem, in which users have rights corresponding to their specific needs. There is consequently a system of access control to prevent a user to read or edit a file. consequently, viruses typically have less capacity to affect and infect a system running Linux or DOS on Windows files always having FAT32 (NTFS files have the same protection as files UNIX, Windows NT database also isolate the accounts between them). consequently, no viruses written for Linux, including those listed below, could spread successfully. In addition, security vulnerabilities that are exploited by viruses are corrected in a few days for updates of the Linux kernel. Virus scanners are obtainable for Linux systems to monitor the activity of active viruses on Windows. They are mainly used on proxy servers or mail servers that have Microsoft Windows client systems The antivirus software designed to clarify, neutralize and eliminate malware (including viruses are just one example) that are based on the exploitation of security vulnerabilities. Antivirus checks the files and emails. Different methods are possible:
– The major antivirus market are focusing on identifying characteristics files and then compare the identifying characteristics of the virus to viral code to check.
-The heuristic method is the most powerful, seeking to discover malicious code by its behavior. She tries to detect it by analyzing the code of an unknown program. Sometimes false alarms may be caused.
– The shape examination is based on filtering rules between regexp or other, put in a junk file. The latter method can be very effective for mail servers supporting postfix regexp kind since it does not rely on a identifying characteristics file. Antivirus programs can examine the contents of a hard excursion, but also the computer memory. For the more modern they act upstream of the machine by scanning the file exchanges with the outside world, both in amount that flows downhill. consequently, emails are reviewed, but the files copied to or from removable media such as CDs, floppy disks, network connections, USB keys… Virus creators have before identified and recorded information about the virus, like a dictionary, the antivirus can detect and locate the presence of a virus. When this occurs, the virus has three options, it may:
1. try to repair the corrupted files by removing viruses;
2. put the files in quarantine so they can be easy to reach to other files or spread and they can ultimately be repaired later;
3. delete infected files. To maximize the provide of virus, it is basic to make frequent updates by downloading newer versions. Internet and conscientious with good computer skills can clarify themselves from viruses and send their information to software developers so that their antivirus database is updated. Typically, antivirus review each file when it is produced, opened, closed, or read. In this way, viruses can be identified closest. It is possible to program the system of administration which conducts a regular review of all files on the storage space (hard disk, etc.). Although antivirus software are very reliable and regularly updated, virus writers are just as often be inventive. In particular, the virus “oligomorphiques”, “polymorphic” and more recently “metamorphic” are harder to detect. Whitelist. The “white list” is a technique increasingly used to fight against malware.
Instead of seeking software known as malware, it prevents execution of any program except those that are considered reliable by the system administrator. By adopting this method of blocking by default, it avoids the problems inherent in the updating of virus identifying characteristics file. In addition, it helps prevent the execution of unwanted programs. Given that modern enterprises have many applications are considered reliable, the efficiency of this technique depends on the ability of the administrator to establish and update the whitelist. This task can be facilitated by the use of tools for course of action automation and inventory maintenance. Another approach to localize the virus is to detect suspicious behavior programs. For example, if a program tries to write data to a program run, the antivirus will detect this suspicious behavior and notify the user that will indicate the steps to follow.
Unlike the past approach, the method used to clarify suspicious behavior very recent viruses that are not however known in the dictionary of the virus. However, the fact that users are regularly warned of false alarms can make them insensitive to the real threats. If users answer “Agree” to all of these alerts, antivirus offered them no protection. This problem has worsened since 1997, since many programs have changed some harmless executable files without observing these false alarms. consequently, most modern antivirus software use less this method. The heuristic examination is used by some viruses. For example, the antivirus can examine the beginning of each code of all new applications before transferring control to the user. If the program seems to be a virus, then the user is notified. However, this method can also rule to false alarms. The heuristic method can detect virus variants, and automatically communicating the results of the examination to the editor, it can verify the accuracy and updating its database of virus definitions.
The method of the sandbox (sandbox in English) is to emulate the operating system and run the file during the simulation. Once the program is terminated, software analyzes the results of the sandbox to detect changes that may contain viruses. Because of performance problems, such detection usually takes place during the scanning on need. This method may fail as viruses can be nondeterministic and consequence in different actions or perhaps already no action when executed. It is impossible to detect from a single execution. Many companies claim the title of creator of the first antivirus software. The first public announcement of a neutralization of a virus for PC was made by European Bernt Fix (or Bernd) in early 1987, the Vienna virus. Following this virus, several other viruses have surfaced such as ping pong, Lehigh and Survive-3, also known as Jerusalem.
Since 1988, several companies with the objective of further research in the field of antivirus software came together. The first breakthroughs in anti-virus occurred in March 1988 with the release of Den Zuk, produced by Indonesian Denny Yanuar Ramdhani. Den Zuk virus could neutralize the Brain. In April 1988, the Virus-L forum has been produced on Usenet, and mid-1988 saw the design of a search engine can detect viruses and Trojans that were known to the public. In autumn 1988 appeared antivirus software Dr. Solomon’s Anti-Virus Toolkit designed by Briton Alan Solomon. At the end of December 1990, the market has come to the point of offering the consumer products related to 19 different anti-virus, among them, Norton Antivirus and McAfee VirusScan. Peter Tippett was extensively involved in the emerging field of detection of computer viruses. It was an emergency occupation and also had his software company. He read an article about the Lehigh virus, which was the first to be developed, but it’s truly on Lehigh himself that Tippett was the most knowledgeable.
He asked if there were similar characteristics between these viruses and those that attack humans. From a standpoint epidemic, he was able to determine how these viruses affect the same processor computer (the boot sector was affected by the Brain virus, the. Com with the Lehigh virus, while the Jerusalem virus attacked both files. com and. exe). Tippett’s company, Certus International Corp.. was consequently involved in the creation of antivirus software. He sold the company to Symantec Corp. in 1992. Tippett and joined them by implementing the software developed on behalf of Symantec, Norton AntiVirus.