Question about virus defense

Assignment Help Operating System
Reference no: EM1379533

a. How can an individual machine get infected with the virus you are researching and how does it spread to other machines?
b. What damage might the virus do?
c. Give the complete web addresses of where you found this information.
d. Research a virus protection software and determine.
i. How many different virus signatures do they detect? (If you cannot find all the viruses they detect, can you find a listing of some, if so
what is that URL?)
ii. How often do they recommend obtaining updates?
iii. Give the complete web addresses of where you found this information.
e. Can your computer still get infected even if your virus software is up-to date

I need to identify 2 real computer viruses, correctly identify how the virus works and the types of damage it does. The web addresses must be valid. I also need to identify a virus protection software and describe the number of viruses they detect, how often updates are recommended and the correct web address to where you found this information.

 

Reference no: EM1379533

Questions Cloud

Applications for the programs : Applications are the programs that make our computers powerful. Not counting Microsoft Office, what are some of the new applications that you see making a big difference to computer users in next some years?
Important information about windows operating system : Assume you have learned a great deal of important data about the Windows operating system so far. However, we have not even scratched the surface of the capabilities of Windows XP.
Value in managing security and risk : Explain ISO 27001's value in managing security and risk. What are the drawbacks and benefits for obtaining ISO 27001 certification?
Scientific principles behind a computer technology : Explain the scientific principles behind a computer technology and discuss how social, political, economic or ethical impact of computers on our cultural structures and beliefs.
Question about virus defense : Discuss how can an individual machine get infected with the virus you are researching and how does it spread to other equipments?
Computing total pay and net pay : Construct a Unix shell script to input number of hours worked and pay rate and compute the total pay, then the social security amount, then the net pay.
Organization institutionalizes policies : The answer gives the learner with an understanding of management's role in the development and enforcement of data security policies, standards, practices, precess and guidelines.
Disk scheduling algorithms : Assume that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is recently serving a request at cylinder 143, and the last request was at cylinder 125.
Disadvantages to living in an information age : Discuss some of the disadvantages to living in an Information Age? At present more and more people rely on computers to create, store, and manage critical information.

Reviews

Write a Review

Operating System Questions & Answers

  Power management settings in bios

Every day at 2PM a client's computer at work reboots itself. You have made sure the power management settings in the BIOS and in the Windows Control Panel are not responsible.

  One page document describing security

Analyze the Internet and construct a one page document describing how security is maintained while transacting business over the Internet.

  Define the term context switch

Define the term context switch. Explain how context switching takes place. (use a diagram, with two processes)

  What is the main advantage of multiprogramming

What is the main advantage of multiprogramming How does the distinction between the monitor mode and user mode function as a rudimentary form of protection (security) system What is the difference between a trap and an interrupt? What is the u..

  Ethical issues of web site design

Analyze the user interaction interface of a typical website that you might wish to improve and design in terms of any ethical considerations that might require to be addressed.

  Determine the average seek time of traversed disk

Traversed Disk receives request to access random sector on random track. Suppose head starts at track 0. Determine the average seek time?

  Security and data protection systems

Determine what fault tolerance, security, and information protection systems and procedures do you recommend be instituted on and for the corporation's network from the hypothetical condition below?

  Deadlock avoidance

i. Deadlock avoidance ii. Deadlock prevention and  iii. Deadlock detection

  Expansion of network services

Assume you have been hired through your local library to help them setup a LAN to connect their three library sites.

  Describe three solutions to critical section problem

Describe three solutions to critical section problem Explain the different methods used to handle deadlocks Distinguish between "No preemption" and "circular wait" in deadlocks prevention

  Create your own shell

The premise of Project 2 is to create your own shell. Your shell will be launchable from a terminal window and act similar to the existing shell.

  Vulnerabilities in voip

Discuss at least ten Vulnerabilities in VoIP. Briefly explain each of the listed vulnerability, along with a possible recommendation for a countermeasure.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd