59520611.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

59520611.Pdf SOFTWARE • The software provides the commands that tell the hardware what tasks to perform, what to read and write, how to send the end result (the output) to a monitor and/or printer. • Software is the programs and data that a computer uses. • Software is kept on some hardware device such as a hard disk or floppy disk, but it itself is intangible. • Software consists of both programs and data. Programs are lists of instructions for the processor. Data can be any information that a program needs: character data, numerical data, image data, audio data, and countless other types. KINDS OF SOFTWARE • Application software (usually called just "applications") are programs that people use to get their work done. It may include data entry; update query and report programs, productivity software for spreadsheets, word processing, databases and custom accounting programs for payroll, billing and inventory. It is designed to help people with specific task such as making a spreadsheet of creating a graphic image. Example of Application Software: Word Processor Microsoft Word Lotus Word Pro Word Perfect Spreadsheet Software Microsoft Excel Lotus 123 Quicken Presentation Software Microsoft PowerPoint Lotus Freelance Graphics Database Software Microsoft Access Lotus Approach Web Browser Internet Explorer Netscape Navigator PIM (Personal Information Manager) - software designed to organize names, addresses, and random notes for easy and efficient retrieval. It is just like an electronic equivalent of a conven- tional book-type personal organizer. PIM usually features an automatic dialing telephone list, a programmable calendar and an automatic reminder scheduler. It is ideal for people with hectic schedules who spend a lot of time working with their computers. Example: Lotus Organizer • Operating Systems are software which controls the computer and runs applications, it keep all the hardware and software running together smoothly. What the Operating System does is communicate information from the application software to a computer's program. Example of Operating Systems: CP/M (Control Program for Microcomputer) – an Early Operating System MS-DOS PC-DOS Microsoft Windows Mac OS OS 2 Linux UNIX OPERATING SYSTEM'S COMPONENTS The User Interface The operating system's user interface is what users see onscreen and interact with when giving a computer instructions and commands. A user communicates to the computer either by typing commands at a command prompt or by issuing commands through a graphical user interface (GUI). The Kernel The operating system's core is its kernel. The kernel's job is to regulate disk files, memory management, program objectives and tasks, and program execution and processes. The kernel is considered the operating system's core because it controls a computer's hardware, and is responsible for either directly activating computer hardware or for interfacing with software that drives the hardware. The File Management System The file management system is the operating system's organizer, arranging files in hierarchical tree-like structure the root directory. Files are data collections with single, logical names. Filename extensions declare a files type: .txt identifies text data .jpg, .bmp, and .gif extensions identify graphic files. • Programming Languages are used to create all other software whether it is Operating system or Application software. Machine-Language –first generation languages Assembly-Language second-generation languages An assembly language, however, can be used only with one type of CPU chip or microprocessor. High-Level Languages - third generation, languages High-level languages often use words that are more like the English Language (List, Print, and Open) as commands that might stand for a sequence of tens or hundreds of machine-language instructions. The commands are entered from the keyboard, from a program in memory, or from a storage device, and are translated by a program that interprets them into machine- language instructions, Example of High Level-Languages FORTRAN (Formula Translation) – was the first comprehensive high level programming language ALGOL (ALGOrithmic Language) COBOL (Common Business Oriented Language) – a commercial and business programming language, concentrated on data organization and file handling and was widely used at one time in business. BASIC (Beginner’s All-purpose Symbolic Instruction Code Pascal (named for Blaise Pascal) LOGO was developed to introduced children to computer C Languages (C and C++) LISP PROLOG (PROgramming for LOGic) – used in research on Artificial Intelligence (AI) ADA – descendant of Pascal, was designed for military applications such as Strategic Defense Initiatives (Star Wars) missile program Forth and Fifth Generation languages – are even closer to natural languages or rely on graphical user interfaces (GUI) featuring symbolic icons and drag-and-drop technique and English-like statements. Example of Forth and Fifth Generation languages Delphi Visual Basic Visual C++ Visual Fox Pro INTEGRATED SOFTWARE PACKAGES - is a single software program that includes multiple applications. It generally includes a word processing program, an electronic spreadsheet program, database software, a personal management grogram and limited graphics capabilities. The applications have a common interface -they "look alike"- and users can cut and-paste data from one application to another. One of its advantages is their economy; they are cheaper compared to the combined cost of separate standalone software. It also requires less storage space on the computer hard drive. Examples of Integrated Software Packages 1. Microsoft Works 2. LotusWorks APPLICATION SUITES - is a bundle of application that were created, packaged and designed to work together. Like the integrated package, it includes a word processing program, an electronic spreadsheet program, database software, a personal management grogram and graphics applications. It is both powerful and versatile and offer more options for users to manipulate and organize data. A drawback however, is they require more computer memory than integrated packages. Examples of Application Suites 1. Microsoft Office 2. Lotus Smart Suite WHAT IS A COMPUTER VIRUS? A (computer) virus is a program (a block of executable code) which attaches itself to, overwrites or otherwise replaces another program in order to reproduce itself without the knowledge of the PC user. WHY DO PEOPLE CREATE COMPUTER VIRUS? People create viruses for several reasons. • Some people think it's funny to create mischief, by creating viruses. • Some people are angry (at dictatorships, at the military, at big impersonal corporations, at clients who don't pay bills, at lovers who rejected them, and at homosexuals). • Some people are intellectuals who want the challenge of trying to create a program that replicates itself. Too often, the program replicates itself too well and too fast and accidentally does more harm that the programmer intended. • Some people want to become famous (or infamous or influential) by inventing viruses. • People who create viruses tend to be immature. Virus can be transmitted by: • Booting a PC from infected medium • Executing an infected program • Opening an infected file Common routed for virus infiltration include • Floppy disks or other media that user can exchange • Email attachments • Pirated software • Shareware What are some virus symptoms? • Slower Operation • Decreased memory • A disk drive LED lighting up for no apparent reason 7 KINDS OF VIRUSES 1. File virus A file virus (also called a parasitic virus) secretly attaches itself to an innocent program so the innocent program becomes infected. Whenever you run the infected innocent program, you're running the virus too! Examples: Yankee Doodle (From Bulgaria in September 1989) Die Hard 2 (From South Africa in July 1994) Chernobyl (From Taiwan in June 1998) 2. BOOT-SECTOR VIRUSES On a floppy disk or hard disk, the first sector is called the disk's boot sector or, master boot record (MBR). A virus that-hide in the boot sector is called a boot-sector virus. Whenever the computer tries to boot from a drive containing an infected disk, the virus copies itself into RAM memory chips. Before hiding in the boot sector, the typical boot-sector virus makes room for itself by moving data from the boot sector to a "second place" on the disk. Unfortunately, what- ever data had been in the "second place" gets overwritten and cannot be recovered. The typical boot-sector virus makes the computer eventually hang (stop reacting to your keystrokes and mouse strokes). Examples: Stoned (From New Zealand in December 1987) Michelangelo (From Sweden in April 1991) Monkey (From the USA in October 1992) 3. MULTIPARTITE VIRUSES A multipartite virus hides .in two places: the boot sector and also the file system. If you remove the virus from just the boot sector (or from just files), you still haven't completely removed the virus, which can regenerate itself from the place you missed. If a virus is very smart, it's called a stealth polymorphic armored multipartite virus (SPAM virus): A stealth virus makes special efforts to hide itself from anti-virus software. For example, it tricks anti-virus software into inspecting a clean copy of a file instead of letting it read the actual (infected) file. A polymorphic virus changes its own appearance each time it infects a file, so no two copies of the virus look alike to anti-virus programs. An armored virus protects itself against anti-virus disassembly. Example: One Half (From Austria in October 1994) 4. Macro virus A macro virus hides in macros, which are little programs embedded in Microsoft Word documents and Excel spreadsheets. The virus spreads to another computer when you give somebody an infected document. During the past few years, e-mail has become prevalent, and so have macro viruses: they're more prevalent than all other viruses combined. Examples: Melissa (From the USA in March 1999) Class (From the USA in October 1998) Thus (From the USA in August 1999) 5. E-mail worm An e-mail worm is a malicious program that comes as an e-mail attachment and pretends to be innocent fun.
Recommended publications
  • Virus Bulletin, August 1994
    ISSN 0956-9979 AUGUST 1994 THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford CONTENTS Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding, EDITORIAL Network Security Management, UK Bigger, By Being Better? 2 VIRUS PREVALENCE TABLE 3 NEWS Central Point Merger Completed 3 Pathogen Author Arrested 3 IBM PC VIRUSES (UPDATE) 4 IN THIS ISSUE: INSIGHT CARO explained. Many people have no idea what Schwartau on Security 6 CARO is, what it does, or how to join it. Everything you ever wanted to know about the organisation but were FEATURE afraid to ask is on pp.8-9. CARO: A Personal View 8 The professionals professional. For the first time VIRUS ANALYSES ever, VB reviews AVP, one of Russias leading virus 1. AntiCMOS - Brain Damage 9 scanners: have researchers behind the former Iron 2. A Pile of Junk? 11 Curtain made as many advances in their work as those in 3. Pure Thoughts 13 the West? FEATURE The Lotus position. Lotus has adopted a novel ap- Epidemic Virus Control 15 proach to the prevention of large-scale virus outbreaks within the company. How effective is its technique, and PRODUCT REVIEWS is it a practical alternative in other companies? See p.15. 1. AVP - A Professional Choice 18 2. NetShield 1.5 21 END NOTES & NEWS 24 VIRUS BULLETIN ©1994 Virus Bulletin Ltd, 21 The Quadrant, Abingdon, Oxfordshire, OX14 3YS, England. Tel. +44 (0)235 555139. /94/$0.00+2.50 No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form without the prior written permission of the publishers.
    [Show full text]
  • La Sécurité Informatique Edition Livres Pour Tous (
    La sécurité informatique Edition Livres pour tous (www.livrespourtous.com) PDF générés en utilisant l’atelier en source ouvert « mwlib ». Voir http://code.pediapress.com/ pour plus d’informations. PDF generated at: Sat, 13 Jul 2013 18:26:11 UTC Contenus Articles 1-Principes généraux 1 Sécurité de l'information 1 Sécurité des systèmes d'information 2 Insécurité du système d'information 12 Politique de sécurité du système d'information 17 Vulnérabilité (informatique) 21 Identité numérique (Internet) 24 2-Attaque, fraude, analyse et cryptanalyse 31 2.1-Application 32 Exploit (informatique) 32 Dépassement de tampon 34 Rétroingénierie 40 Shellcode 44 2.2-Réseau 47 Attaque de l'homme du milieu 47 Attaque de Mitnick 50 Attaque par rebond 54 Balayage de port 55 Attaque par déni de service 57 Empoisonnement du cache DNS 66 Pharming 69 Prise d'empreinte de la pile TCP/IP 70 Usurpation d'adresse IP 71 Wardriving 73 2.3-Système 74 Écran bleu de la mort 74 Fork bomb 82 2.4-Mot de passe 85 Attaque par dictionnaire 85 Attaque par force brute 87 2.5-Site web 90 Cross-site scripting 90 Défacement 93 2.6-Spam/Fishing 95 Bombardement Google 95 Fraude 4-1-9 99 Hameçonnage 102 2.7-Cloud Computing 106 Sécurité du cloud 106 3-Logiciel malveillant 114 Logiciel malveillant 114 Virus informatique 120 Ver informatique 125 Cheval de Troie (informatique) 129 Hacktool 131 Logiciel espion 132 Rootkit 134 Porte dérobée 145 Composeur (logiciel) 149 Charge utile 150 Fichier de test Eicar 151 Virus de boot 152 4-Concepts et mécanismes de sécurité 153 Authentification forte
    [Show full text]
  • Computer Virus 16 Views  0  0 RELATED TITLES Virus
    16 views 0 0 RELATED TITLES Virus Uploaded by Abu Naser Mohammad Saif Full description Save Embed Share Print Steve Jobs Cryptonomicon The Woman Who Smashed Codes: A True Computer Virus 16 views 0 0 RELATED TITLES Virus Uploaded by Abu Naser Mohammad Saif Full description Save Embed Share Print Steve Jobs Cryptonomicon The Woman Who Smashed Codes: A True Presentation Outline 1. Introduction: 2. VIRUS Definition and Naming: 3. Types of computer virus: 4. Example of Virus 5. To phases of virus 6. Symptom of computer attacked by virus 7. Special focus on: Trojan, & phishing site 8. Combating Viruses 9. Anti viruses & Firewall 16 views 0 0 RELATED TITLES Virus Uploaded by Abu Naser Mohammad Saif Full description Save Embed Share Print Steve Jobs Cryptonomicon The Woman Who Smashed Codes: A True Presentation Outline Symptom of computer attacked by virus Special focus on: Trojan, & phishing site Combating VirusesAnti viruses & Firewall 16 views 0 0 RELATED TITLES Virus Uploaded by Abu Naser Mohammad Saif Full description Save Embed Share Print Steve Jobs Cryptonomicon The Woman Who Smashed Codes: A True Presentation Outline 1. Introduction: 2. VIRUS Definition and Naming: 3. History of Computer Virus: 4. Types of computer virus: 5. Example of Virus 6. To phases of virus: 16 views 0 0 RELATED TITLES Virus Uploaded by Abu Naser Mohammad Saif Full description Save Embed Share Print Steve Jobs Cryptonomicon The Woman Who Smashed Codes: A True Introduction: Computer VIRUS Almost every uses has faced virus attack And loses some sort of computer resources Computer VIRUS is not a biological element rather computer program (s).
    [Show full text]
  • Microsoft Anti-Virus – Extortion, Expedience Or the Extinction of the Av Industry? Abrams
    MICROSOFT ANTI-VIRUS – EXTORTION, EXPEDIENCE OR THE EXTINCTION OF THE AV INDUSTRY? ABRAMS MICROSOFT ANTI-VIRUS – any statistical information, anecdotally I have been told that there was a short-term impact on the sales of anti-virus software. EXTORTION, EXPEDIENCE OR Today, Microsoft is back in the anti-virus space. Any person THE EXTINCTION OF THE AV who believes that the new offering from Microsoft will be of the same quality as MSAV from DOS 6 is advised to leave the INDUSTRY? room now in order to acquire an aluminum (or aluminium) foil Randy Abrams hat. The foil hat may not help, but such people are bound to ESET LLC, USA believe it does! There is one interesting parallel between the old MSAV and the Email [email protected] new product offering; both are ‘bundled’ as utilities. MSAV was not available as a product separate from DOS 6, and as of this writing, the new Microsoft anti-virus is available only as a The views and opinions presented are strictly those of the suite – called Windows Live OneCare – which includes author and do not reflect the views and opinions of his anti-virus, anti-spyware, a firewall, backup, hard disk employer or Virus Bulletin. defragmentation, and also offers removal of ‘unnecessary files that can clog your PC’. ABSTRACT In 1993 Microsoft released MSDOS 6.0, which included EXTORTION Microsoft Anti-Virus, a re-branded and ill-conceived entry into Before continuing with my opinions of the product and the anti-virus industry. In 2003 Microsoft announced the predictions for the future, I would like to present the reason for acquisition of RAV anti-virus, and in late 2004 the acquisition the question ‘Is MSAV extortion?’, and the answer.
    [Show full text]
  • CYBERSECURITY When Will You Be Hacked?
    SUFFOLK ACADEMY OF LAW The Educational Arm of the Suffolk County Bar Association 560 Wheeler Road, Hauppauge, NY 11788 (631) 234-5588 CYBERSECURITY When Will You Be Hacked? FACULTY Victor John Yannacone, Jr., Esq. April 26, 2017 Suffolk County Bar Center, NY Cybersecurity Part I 12 May 2017 COURSE MATERIALS 1. A cybersecurity primer 3 – 1.1. Cybersecurity practices for law firms 5 – 1.2. Cybersecurity and the future of law firms 11 – 2. Information Security 14 – 2.1. An information security policy 33 – 2.2. Data Privacy & Cloud Computing 39 – 2.3. Encryption 47 – 3. Computer security 51 – 3.1. NIST Cybersecurity Framework 77 – 4. Cybersecurity chain of trust; third party vendors 113 – 5. Ransomware 117 – 5.1. Exploit kits 132 – 6. Botnets 137 – 7. BIOS 139 – 7.1. Universal Extensible Firmware Interface (UEFI) 154– 8. Operating Systems 172 – 8.1. Microsoft Windows 197 – 8.2. macOS 236– 8.3. Open source operating system comparison 263 – 9. Firmware 273 – 10. Endpoint Security Buyers Guide 278 – 11. Glossaries & Acronym Dictionaries 11.1. Common Computer Abbreviations 282 – 11.2. BABEL 285 – 11.3. Information Technology Acronymns 291 – 11.4. Glossary of Operating System Terms 372 – 2 Cyber Security Primer Network outages, hacking, computer viruses, and similar incidents affect our lives in ways that range from inconvenient to life-threatening. As the number of mobile users, digital applications, and data networks increase, so do the opportunities for exploitation. Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction.
    [Show full text]
  • The Commercial Malware Industry (An Introductory Note)
    The Commercial Malware Industry Peter Gutmann University of Auckland (An Introductory Note) For those reading the slides rather than going to the talk: The information was gathered over time and prices and offerings of malware authors change rapidly; all figures and information is/are representative only… Since this is an ongoing work, information is taken from different eras to illustrate changes in the industry and technology; this isn’t how everything works at the current time Malware as a Service Standard commercial vendors are embracing software-as-a- service, SaaS • Malware vendors have MaaS MaaS is advertised and distributed just like standard commercial software Iframe, pop under, накрутка счетчиков, постинг, спам Также я советую если у вас нет сплоита и трафа, вы можете взять в аренду у здесь Iframe exploits, pop-unders, click fraud, posting, spam If you don’t have it, you can rent it here • Online video tutorials of the malware in action Malware as a Service Try-before-you-buy offers for malware Трафик на сплоиты. Для пробы всем Бесплатно 100 посетителей!!! Цена 4 $ за 1000 посетителей - При заказе от 1000 до 5.000 3.8 $ за 1000 посетителей - При заказе от 5.000 до 10.000 3.5 $ за 1000 посетителей - При заказе от 10.000 Traffic for sploits Free trial, 100 visitors!!! Price $4 per 1000 if buying 1000 – 5000 $3.80 per 1000 if buying 5000 – 10,000 $3.50 per 1000 if buying over 10,000 Malware asaService(ctd) Companies producing malware are standard commercial IT commercial arestandard producing malware Companies Malware asaService(ctd)
    [Show full text]
  • Virus Bulletin, May 1993
    May 1993 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding, Network Security Management, UK Advisory Board: Jim Bates, Bates Associates, UK, Andrew Busey, Datawatch Corporation, USA, David M. Chess, IBM Research, USA, Phil Crewe, Ziff-Davis, UK, David Ferbrache, Defence Research Agency, UK, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Igor Grebert, McAfee Associates, USA,Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, Defence Research Agency, UK, Dr. Tony Pitt, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Certus Corporation, USA, Steve R. White, IBM Research, USA, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS VIRUS ANALYSES 1. The Volga Virus Family 9 EDITORIAL 2. Pitch - A new Virus High Note 10 Better DOS than DOS? 2 3. Loren - Viral Nitroglycerine? 12 IN MEMORIAM FEATURE David Lindsay 3 The Other Virus War 14 VIRUS PREVALENCE TABLE 3 PRODUCT REVIEWS NEWS Popping Up 3 1. MS-DOS 6: Worth the Wait? 17 McAfee Makes a Deal? 4 2. VET - The Wizard of Oz 20 Dirty Macs 4 INDUSTRY WATCH IBM PC VIRUSES (UPDATE) 5 ICVC ’93 - Virus Hunting in Bulgaria 23 INSIGHT Bates: Blues and Roots 7 END NOTES & NEWS 24 VIRUS BULLETIN ©1993 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England.
    [Show full text]
  • VB, August 2003
    AUGUST 2003 The International Publication on Computer Virus Prevention, Recognition and Removal CONTENTS IN THIS ISSUE 2 COMMENT SPOT THE The subtle return of MSAV? DIFFERENCE Hapless users 3 NEWS double-clicking No more Mr Nice Guy: UK gets tough on what they on hi-tech criminals believe to be a screensaver of adult movie star Maya Gold, will be confounded when they find a desktop 3 VIRUS PREVALENCE TABLE full of zero-length files instead. Gabor Szappanos describes this highly localised Hungarian virus and VIRUS ANALYSES concludes that virus writers skipping their English lessons is something for which we can be thankful. 4 Not all that glitters is gold page 4 7 Russian doll RETURN OF THE MACRO VIRUS 10 Time to relax? The days when macro viruses dominated the virus prevalence charts may be long gone, but June 2003 13 FEATURE saw the appearance of W97M/Lexar.A, a macro Flooding from the underground – virus that uses a simple method to bypass Word’s a global threat macro virus protection. Richard Marko provides the details. 17 COMPARATIVE REVIEW page 10 NetWare 6.0 COMPARATIVE REVIEW: NETWARE Matt Ham finds that issues 24 END NOTES AND NEWS which made life difficult during last year’s NetWare comparative review have simply evaporated, to be replaced by features which are actually useful. He tests the abilities of 11 products for NetWare. page 17 ISSN 0956-9979 COMMENT ‘Microsoft would attacked by VXers. By deploying RAV into the most virus-prone market of them all – home user and SoHo – be extremely Microsoft could end up suffering bags of bad PR.
    [Show full text]
  • Virus Bulletin, October 1999
    ISSN 0956-9979 OCTOBER 1999 THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Francesca Thorneloe CONTENTS Technical Consultant: Fraser Howard Technical Editor: Jakub Kaminski COMMENT The Changing Face of Security Software 2 Consulting Editors: VIRUS PREVALENCE TABLE 3 Nick FitzGerald, Independent consultant, NZ Ian Whalley, IBM Research, USA NEWS Richard Ford, Independent consultant, USA 1. Sad Spawn 3 Edward Wilding, Maxima Group Plc, UK 2. 2000 Reasons to Panic 3 LETTERS 4 IN THIS ISSUE: VIRUS ANALYSIS AntiSocialite 6 • Anyone got a tin opener? Our Letters page is a real can of worms this month. Readers’ opinions open a packed OPINION issue, starting on p.4. 1. The Little Fixed Variable Constant 8 • Business as usual: This issue has plenty for the corporate 2. Minding the Millennium 9 professional with a feature on the hidden costs of virus INSIGHT management and a follow-up tutorial on Office 2000 macro security. Corporate news starts on p.12. Me and Microsoft 10 CORPORATE FEATURE • Happy New Year? Breaking with tradition, VB tackles the virus implications of the year 2000 date-change. The Nine Tenths of the Iceberg 12 explosion of Y2K hype features on the News page and CORPORATE TUTORIAL continues on p.9. Office 2000 and Macro Security 14 • Design fault or glitch? GeCAD’s Costin Raiu discovered a few surprises recently during tests on Windows 2000. He FEATURE SERIES shares his findings on p.8. Macro Viruses – Part 2 17 PRODUCT REVIEW RAV v7.0 for Windows 98 20 END NOTES AND NEWS 24 VIRUS BULLETIN ©1999 Virus Bulletin Ltd, The Pentagon, Abingdon, Oxfordshire, OX14 3YP, England.
    [Show full text]
  • Viruses Revealed
    Y L F M A E T Team-Fly® Blind Folio i Viruses Revealed David Harley, Robert Slade, Urs Gattiker Osborne/McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2001 by The McGraw-Hill Companies, Inc. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a data- base or retrieval system, without the prior written permission of the publisher. 0-07-222818-0 The material in this eBook also appears in the print version of this title: 0-07-213090-3. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales pro- motions, or for use in corporate training programs. For more information, please contact George Hoare, Special Sales, at [email protected] or (212) 904-4069. TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and to the work. Use of this work is subject to these terms.
    [Show full text]
  • UNIT of COMPETENCY Install Computer System and Networks
    UNIT OF COMPETENCY Install Computer System and Networks Diagnose and Troubleshoot Computer System Configure Computer System and Networks Maintain Computer System and Networks Can I Yes or No o Plan and Prepare work to ensure occupational health and safety (OHS) policies and procedures are followed. Yes o Obtain materials, tools, equipment and testing devices needed to conform the job requirements. Yes o Interpret work instructions according to the job requirements. Yes o Obtain computer components/devices/systems and determines its location prior to installation. Yes o Install equipment/devices/systems in accordance with the job requirements. Yes o Check/test devices/systems and/ or installations to determine the conformity to the job requirements. Yes o Check computer systems and networks for configuration in accordance with the specification and requirements. Yes o Diagnose fault or problem in the computer systems and networks in line with the standard operating procedure. Yes o Configure the identified systems and networks based on the specifications and job requirements. Yes o Inspect and test configured computer systems and networks in conformity with manufacturer's instructions/manual. Yes o Correct/adjust components or parts of computer system and networks in accordance with job requirements. Yes o Test computer systems and networks to ensure safe operation. Yes o Performs scheduled/periodic maintenance in accordance with manufacturer's requirements. Yes o Make needed repairs/replacements in accordance with established procedures when necessary. Yes o Document tasks undertaken in the accordance with standard operation procedure (SOP). Yes o Clean and clear worksite of all surplus/excess materials in accordance with company standard operation procedure (SOP).
    [Show full text]
  • The Art of Computer Virus Research and Defense.Pdf
    Ripped by AaLl86 THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE By Peter Szor Publisher: Addison Wesley Professional Pub Date: February 03, 2005 ISBN: 0-321-30454-3 Pages: 744 Table of • Contents • Index Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever publishedaddressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic,
    [Show full text]