See also: Timeline of notable computer viruses and worms Early academic work on self-replicating programs[ edit ] The first academic work on the theory of self-replicating computer programs [17] was done in by John von Neumann who gave lectures at the University of Illinois about the "Theory and Organization of Complicated Automata ". The work of von Neumann was later published as the "Theory of self-reproducing automata". In his essay von Neumann described how a computer program could be designed to reproduce itself. Science fiction[ edit ] The first known description of a self-reproducing program in a short story occurs in in The Scarred Man by Gregory Benford which describes a computer program called VIRUS which, when installed on a computer with telephone modem dialing capability, randomly dials phone numbers until it hit a modem that is answered by another computer.

Author:Kajigrel Moogulrajas
Language:English (Spanish)
Published (Last):27 October 2009
PDF File Size:19.21 Mb
ePub File Size:14.13 Mb
Price:Free* [*Free Regsitration Required]

Even home computers were affected by viruses. The virus program is idle during this stage. Kompjuterski Virusi Computer virus Comparison of computer viruses Computer worm List of computer worms Timeline of computer viruses and worms. The vast majority of viruses target systems running Microsoft Windows.

Computer Viruses kompkuterski Data Protectionpp. Virus phases is the life cycle of the computer virus, described by using an analogy to biology. The interception can occur by code injection of the actual operating system files that would handle the read request. A Media Archaeology of Computer Viruses. Return to System Security and download it to secure your PC.

Computer virus — Wikipedia These viruses modify kompjutersik code on each infection. In his essay von Neumann described how a computer program could be designed to reproduce itself. Computer Viruses, Artificial Life and Evolution.

The triggering phase can be caused by a variety of system events, including a count of the number of times that this copy of the virus has made copies of itself. Many websites run by antivirus software companies provide free online virus scanning, with limited kompjutersii facilities after all, the purpose of the websites is to sell antivirus products and services. Some websites—like Google subsidiary VirusTotal.

This is one of the reasons that it is dangerous to open unexpected or suspicious attachments in e-mails. Lecture Notes in Computer Science. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs see code injection.

KompjuherskiFred Cohen published a demonstration that there is no algorithm that can perfectly detect all possible viruses. American Eagle Publications, Inc. Viruses that utilize this technique are said to be in metamorphic code. Archived from the original on October 5, Primjerice, XP Security Agent Antivirus software also needs to be regularly updated in order to recognize the latest threats.

In virudi, free, open-source antivirus tools have been developed, and an industry of antivirus software has cropped up, selling or freely distributing virus protection to users of various operating systems. Not all viruses have this stage. Related Posts


Računalni virus



Kompjuterski i radni stolovi


Related Articles