SlideShare une entreprise Scribd logo
1  sur  2
Yadav 1


Pahdi Yadav

Professor Milton

English 101

5 May 2008

                                            Antivirus Programs

        Today, people rely on computers to create, store, and manage critical information, many times

via a home computer network. Information transmitted over networks has a higher degree of security

risk than information kept in a user’s home or company premises. Thus, it is crucial that they take

measures to protect their computers and data from loss, damage, and misuse resulting from computer

security risks. Antivirus programs are an effective way to protect a computer against viruses.


        An antivirus program protects a computer against viruses by identifying and removing any

computer viruses found in memory, on storage media, or on incoming files. 1 When you purchase a new

computer, it often includes antivirus software. Antivirus programs work by scanning for programs that

attempt to modify the boot program, the operating system, and other programs that normally are read

from but not modified. In addition, many antivirus programs automatically scan files download from

the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer

(Karanos 201-205).


        One technique that antivirus programs use to identify a virus is to look for virus signatures, or

virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman

(Antivirus Programs), many vendors of antivirus programs allow registered users to update virus

signature files automatically from the Web at no cost for a specified time. Updating the antivirus




        1
         Bulowski points out that most antivirus programs also protect against worms and Trojan
horses (55-61).
Yadav 2


program’s signature files regularly is important, because it will download any new virus definitions that

have been added since the last update.


            Methods that guarantee a computer or network is safe from computer viruses simply do not

exist. Installing, updating, and using an antivirus program, though, is an effective technique to safeguard

your computer from loss.




        1
         Bulowski points out that most antivirus programs also protect against worms and Trojan
horses (55-61).

Contenu connexe

Tendances

Tendances (20)

Hamilton lara 2011
Hamilton lara 2011Hamilton lara 2011
Hamilton lara 2011
 
Chap 2 lab 2
Chap 2 lab 2Chap 2 lab 2
Chap 2 lab 2
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Antivirus program ----neri
Antivirus program  ----neriAntivirus program  ----neri
Antivirus program ----neri
 
Zamayla chap 2 lab 2
Zamayla chap 2 lab 2Zamayla chap 2 lab 2
Zamayla chap 2 lab 2
 
Dungogan chap 2 lab 2
Dungogan chap 2 lab 2Dungogan chap 2 lab 2
Dungogan chap 2 lab 2
 
Yadav 1(2)
Yadav 1(2)Yadav 1(2)
Yadav 1(2)
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
R esearch report with footnote
R esearch report with footnoteR esearch report with footnote
R esearch report with footnote
 
antivirus
antivirusantivirus
antivirus
 
llagas j.
llagas j.llagas j.
llagas j.
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 

En vedette

En vedette (10)

Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
 
Chap 2 lab 3 (Ej Guevarra)
Chap 2 lab 3 (Ej Guevarra)Chap 2 lab 3 (Ej Guevarra)
Chap 2 lab 3 (Ej Guevarra)
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalities
 
Buckhorn Strategic Lesson Plan
Buckhorn Strategic Lesson PlanBuckhorn Strategic Lesson Plan
Buckhorn Strategic Lesson Plan
 
We bouwen een theater - deel 9
We bouwen een theater - deel 9We bouwen een theater - deel 9
We bouwen een theater - deel 9
 
Fechas pau 11 12
Fechas pau 11 12Fechas pau 11 12
Fechas pau 11 12
 
Good Nutrition & Weight 5
Good Nutrition & Weight 5Good Nutrition & Weight 5
Good Nutrition & Weight 5
 
Grupo assista amplía sus instalaciones
Grupo assista amplía sus instalacionesGrupo assista amplía sus instalaciones
Grupo assista amplía sus instalaciones
 
U.d.1. intervalos
U.d.1. intervalosU.d.1. intervalos
U.d.1. intervalos
 
Intervalos musicales
Intervalos musicalesIntervalos musicales
Intervalos musicales
 

Similaire à Chap 2 lab2 (Ej

Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityUltraUploader
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basicsjeeva9948
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protectionphanleson
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 

Similaire à Chap 2 lab2 (Ej (17)

Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Mjtanasas
MjtanasasMjtanasas
Mjtanasas
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
Policy report barrat & associates ltd
Policy report  barrat & associates ltdPolicy report  barrat & associates ltd
Policy report barrat & associates ltd
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
M
MM
M
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 

Plus de Enriquee Guevarra

Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)Enriquee Guevarra
 
Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)Enriquee Guevarra
 
Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Enriquee Guevarra
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Enriquee Guevarra
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalitiesEnriquee Guevarra
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Enriquee Guevarra
 
Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)Enriquee Guevarra
 
Music for life (Ej Guevarra)
Music for life (Ej Guevarra)Music for life (Ej Guevarra)
Music for life (Ej Guevarra)Enriquee Guevarra
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Enriquee Guevarra
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Enriquee Guevarra
 
Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )Enriquee Guevarra
 
Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )Enriquee Guevarra
 
Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )Enriquee Guevarra
 

Plus de Enriquee Guevarra (17)

Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)
 
Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
 
Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalities
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
 
Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)
 
Music for life (Ej Guevarra)
Music for life (Ej Guevarra)Music for life (Ej Guevarra)
Music for life (Ej Guevarra)
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )
 
Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )
 
Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )
 
Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )
 
Craft barn ( Ej Guevarra )
Craft barn ( Ej Guevarra )Craft barn ( Ej Guevarra )
Craft barn ( Ej Guevarra )
 
Craft barn
Craft barnCraft barn
Craft barn
 
Autumn festival
Autumn festivalAutumn festival
Autumn festival
 

Dernier

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Chap 2 lab2 (Ej

  • 1. Yadav 1 Pahdi Yadav Professor Milton English 101 5 May 2008 Antivirus Programs Today, people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses. An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. 1 When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files download from the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201-205). One technique that antivirus programs use to identify a virus is to look for virus signatures, or virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman (Antivirus Programs), many vendors of antivirus programs allow registered users to update virus signature files automatically from the Web at no cost for a specified time. Updating the antivirus 1 Bulowski points out that most antivirus programs also protect against worms and Trojan horses (55-61).
  • 2. Yadav 2 program’s signature files regularly is important, because it will download any new virus definitions that have been added since the last update. Methods that guarantee a computer or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus program, though, is an effective technique to safeguard your computer from loss. 1 Bulowski points out that most antivirus programs also protect against worms and Trojan horses (55-61).