Скачать 0.54 Mb.
|
Elk ClonerElk Cloner was the first computer virus known to have (1) … in the wild. In 1982, Richard Skrenta, then fifteen years old, wrote the virus for the Apple II operating system, which was (2) … on floppy diskettes. When a computer (3) … from a floppy disk (4) … with Elk Cloner, the virus would start, and would subsequently copy itself to any (5) … floppy disk that was (6) …. Because computers of that time had dual floppy disk drives, and because diskettes were often (7) … around among friends, the virus was frequently (8) …. After contagion, every 50th time that a computer booted up, it would display the following text: Elk Cloner: The program with a personality It will get on all your disks It will infiltrate your chips Yes it's Cloner! It will stick to you like glue It will modify ram too Send in the Cloner! Elk Cloner was not (9) … to cause damage, but was (10) … as a practical joke. According to WorldHistory.com, the adolescent Skrenta had a penchant for modifying programs so that they stopped working after some code-specified time period had (11) …, at that point displaying some joke text that Skrenta had written. Not surprisingly, the young programmer's friends grew leery of allowing him access to their diskettes. Elk Cloner's capacity to copy itself (the major criterion of a virus) made it possible for Skrenta to continue to annoy his friends without requiring physical access. The virus is (12) … to have spread widely among his fellow students (and also to his math teacher), thus ensuring Elk Cloner's place in history. 3. Find and correct ten grammar mistakes Virus hoax A virus hoax is a false warning about a computer virus. Typically, the warning arrive in a e-mail note or distributed through a note in a company's internal network. This notes are usually forwarded using distribution lists and they will typical suggest that the recipient forwards the note to other distribution lists. If you got a message about a new virus, you can check them out by go to one of the leading Web sites that keep up with viruses and virus hoaxes. If someone sends you note about a virus that you learn is a virus hoax, reply to the sender that the virus warning is a hoax. Ex. 4. Summarizing.Compile a table which will illustrate the differences between virus types. In order to do it think of a number of columns that your table will have and choose relevant column headings.Ex. 5. Reading and reporting.Describe any existing virus, its code, the way it infects a program, its reproduction, trigger and payload routines. As an example take the Chernobyl virus Chernobyl virusThe Chernobyl virus is a computer virus with a potentially devastating payload that destroys all computer data when an infected file is executed. Since many files are executed during computer use, the virus is able to spread quickly and infect those files. The Chernobyl virus is the first virus known to have the power to damage computer hardware. The activated viral strain attempts to erase the hard drive and overwrite the system's BIOS as well. The virus was detected as early as 1998, but its payload was first triggered April 16, 1999 - which was the 13th anniversary of the disaster at the Chernobyl nuclear reactor. Although U.S. and European computer users were affected, especially students and some businesses, most of Chernobyl's damage was wrought in Asia and the Middle East. Chernobyl actually is a variant of a virus known as CIH, the initials for the alleged author of the virus, Chen Ing-hau, a Taiwanese computer engineering student). Some CIH variants activate on the 26th day of each month, while others do their damage on April 26 or June 26. CIH is sometimes referred to as a "space filler virus," referring to its ability to clandestinely take up file space on computers and prevent anti-virus software from running. Users of Windows 95 and Windows 98 are more susceptible to the risk of contracting the CIH virus. It is under these programs that the virus replicates and becomes active. Users of DOS, Windows 3.x, Windows NT, Windows 2000 or Macintosh are not considered at risk. Ex.6. DiscussionDiscuss weak and strong features of anti-virus software. Ex.7. Listening VIRUS PROTECTOIN 1) Listen to the recording and write down the main virus protection measures. Pay special attention the ones that have not been discussed in this unit yet. RECUPERATION FROM A VIRUS ATTACK 2) Listen to a computer security expert talking about the measures that should be taken in enterprises in case of a virus attack. Make a list of steps mentioned in the recording. Take down as many details as you can. Additional texts The 25th Anniversary of the Virus (blog entry) Don Reisinger notes that depending on what you count as a virus, it may actually be the 30th anniversary of the virus. I think it’s fair to say that it’s the 25th anniversary of viruses on PCs and leave it at that. For some virus history, be sure to check out VirusList’s history of malicious programs. Click through to the years (like the early 80s) to see the details. Also, Wikipedia has a timeline of notable viruses and worms. The first PC virus was written by a 9th grader named Rich Skrenta. Interestingly, Rich recently stepped down as CEO of Topix.net. In an interview with Security Focus, Rich gave the details of why he invented a virus: “I had always been mechanically curious, taking apart tube radios and telephones and wiring up O gauge Lionel train sets when I was young. When I got an Apple II in the 7th grade, I was in heaven. I had been playing jokes on schoolmates by altering copies of pirated games to self-destruct after a number of plays. I’d give out a new game, they’d get hooked, but then the game would stop working with a snickering comment from me on the screen (9th grade humor at work here)”. Soon, classmates were getting wary of letting Skrenta near their disks. He needed a way to alter their floppies to contain his “booby traps” without physically being able to get his hands on them. “I hit on the idea to leave a residue in the operating system of the school’s Apple II. The next user who came by, if they didn’t do a clean reboot with their own disk, could then be touched by the code I left behind. I realized that a self-propagating program could be written, but rather than blowing up quickly, to the extent that it laid low it could spread beyond the first person to others as well. I coded up Elk Cloner and gave it a good start in life by infecting everyone’s disks I could get my hands on.” Of course, if Rick hadn’t done it, someone else would have. Since the early 80’s viruses have become more sophisticated–and more sinister. Viruses are how botnets are created and secrets are stolen. Millions of dollars are spent every year combating them. And fighting viruses isn’t easy. I sometimes get asked a question something like: “When will someone write a program that detects viruses perfectly?” The answer is “never,” unfortunately. Ford and Spafford talk about this in the Science paper: “Building a computer program that can tell with absolute certainty whether any other program contains a virus is equivalent to a famous computer science conundrum called the ‘halting problem.’” Simply (and somewhat imprecisely) stated, the halting problem says that it’s impossible to write a program that can look at other programs and determine whether or not they will halt or run forever. Alan Turing proved this in 1931. (Here’s a good discussion of the halting problem if you want to know more.) Given the impossibility of detecting viruses with certainty, the best we can do are watch lists and heuristics. Not a comforting thought as computers become more and more important to our modern society. Kaspersky: Mac and Linux viruses to rise ’significantly’ (blog entry)According to security expert Eugene Kaspersky, we are at the brink of seeing a significant rise in malware attacks on Mac and Linux platforms. So, are hackers ready to target a broad range of platforms or is this merely hyperbole from a security firm that wants to sell products? In the PC Pro interview, Kaspersky claims that the reason for the change in tactic on the part of the hackers is Vista's half-hearted reception. In the interview Kaspersky said: Home users are not so loyal to the OS. Not many of them are satisfied with Microsoft Vista. Some Windows users will switch to other OSes. Microsoft will not lose its dominance, but it will be reduced a bit. Kaspersky thinks that this shift away from Windows is enough to make Mac and Linux a more appealing target for hackers. What surprises me is that he doesn't quantify how big he thinks that the shift needs to be. Kaspersky also believes that open-source is a double-edged sword: More people are watching open-source code, so they are more quick to find problems. If the people who make the fix are good guys, that's great; if they are bad guys, that's a problem. Kaspersky also goes on to list other platforms, such as PlayStation 3 and smartphones, which could also be targets: If there are viruses for the PlayStation 3, if the situation is such that we have to have protection for these devices, we will have products. And: This year they are going to introduce online banking through smartphones and Chinese hackers will turn to smartphone phishing. While I have great respect and admiration for Kaspersky, I'm skeptical that there's going to be enough of a migration from Windows to Mac or Linux to make hackers all that interested in targeting these platforms. Unless there's a massive shift away from Windows – something which we're not seeing signs of at present, instead what we're seeing is consumers being more interested in XP than Vista – there's going to be more than ample supply of Windows-based victims for hackers. I just can't see the sense in hackers switching focus to Mac and Linux. It doesn't make business sense – and for today’s hackers hacking is business! I get the impression from the interview that Kaspersky is very much in a brainstorming future products mode, or maybe the interview is partly a trial-balloon to see how the idea of security products for Mac and Linux are received … … which is an interesting thought. Just how would Mac and Linux users feel about having to buy security software and then pay a subscription fee on top of that? Hmmm. Because so many Mac and Linux users already believe that their operating systems is secure (or maybe even impervious to malware!) this will make it a very hard sell indeed. Microsoft's own antivirus fails to secure Vista |
Среднего профессионального образования «минусинский медицинский техникум» В сборнике собраны и систематизированы тексты для чтения по английскомк языку имеющие медицинскую направленность. Все тексты аутентичны,... |
Пояснительная записка рабочая программа составлена в соответствии... Развитие иноязычной коммуникативной компетенции в совокупности ее составляющих – речевой, языковой, социокультурной, компенсаторной,... |
||
«Спорт»; развитие речевых умений и навыков, навыков аудирования и письма Цели: тренировка произносительных навыков (звуки, интонация) при декламации стихотворения во время фонетической зарядки; повторение... |
Рабочая программа по курсу «Формирование навыков аудирования, чтения, письма и говорения для подготовки младших школьников к итоговой аттестации в системе начального... |
||
Английский язык – 3 класс Цель: изучить новую лексику; развивать навыки чтения, аудирования, говорения и письма; воспитывать уважение друг к другу, познавательный... |
1 Цель. Задачи дисциплины, ее место в подготовке специалиста (с учетом... Целостная система подготовки по иностранному языку на разных этапах обучения предполагает, с одной стороны, автономный характер обучения... |
||
Целью изучения дисциплины является развитие навыков чтения, аудирования,... Чи дисциплины: научиться иноязычному общению в разговорно-бытовой и профессиональной сферах, развивать умение самостоятельной работы... |
И. Н. Аксенова использование икт при организации самостоятельной... Овершенствования навыков всех видов речевой деятельности на основе аутентичного материала. Рассматривается важность самостоятельной... |
||
Практический курс английского языка для слушателей факультета заочного обучения хабаровск, 2014 Содержание пособия предусматривает развитие всех видов речевой деятельности в рамках учебной программы по иностранным языкам для... |
Обследование чтения и письма у младших школьников Минск В современных условиях увеличения потока информации постоянно возрастает роль чтения и письма как деятельности, которая воссоздает... |
||
Методика обучения аудированию на основе принципа автономной деятельности... Сущность и роль принципа автономной деятельности студентов при обучении иностранному языку |
Методика обучения дошкольников иностранному языку: учебное пособие Текст предоставлен Методика обучения дошкольников иностранному языку: учеб пособие для студентов вузов, обучающихся по специальности «Иностр яз.» («Методика... |
||
Рассмотрено Эти цели реализуются в процессе разнообразных видов детской деятельности: игровой, коммуникативной, трудовой, познавательно-исследовательской,... |
Рабочая программа по иностранному языку составлена на основе Примерной... Программа разработана на основе следующих нормативных документов, определяющих содержание обучения иностранному языку |
||
Рабочая программа по коррекции нарушений чтения и письма разработана... Рабочая программа коррекционно-развивающих занятий с нарушением чтения и письма разработана для детей испытывающих трудности в усвоении... |
Теоретическое обоснование выбранной проблемы Организация системы... Необходимо было в условиях современной России систематизировать патриотическое воспитание учащихся в нашей школе. И начала я работать... |
Поиск |