Asus L84L L8400 F/L Software Installation Guide (English) - Page 87

How Viruses Spread, Virus Writers

Page 87 highlights

PC-cillin How Viruses Spread There are many ways for a virus to enter your system: • Email attachments • World Wide Web (WWW) sites • FTP traffic from the Internet (file downloads) • Shared network files & network traffic in general • Demonstration software • Pirated software • Shrink-wrapped, production programs (rare) • Computer labs • Electronic bulletin boards (BBS) • Diskette swapping (using other people's diskettes for carrying data and programs back and forth) The most likely virus entry points are email, Internet and network connections, floppy disk drives, and modems or other serial or parallel port connections. In today's increasingly interconnected workplace (Internet, intranet, shared drives, removable drives, and email), virus outbreaks now can spread faster and wider than ever before. Virus Writers In the typical scenario, it is an individual, working alone, who writes a virus program and then introduces it onto a single computer, network server, or the Internet. Why? Ego, revenge, sabotage, and basic disgruntlement have all been cited as motivations. Recently, do-it-yourself "virus kits" have been popping up on the Internet, and macro scripts are becoming both easier to learn and more powerful, putting the capacity to engineer viruses in the hands of nearly everyone. In other words, no single, likely profile exits by which virus writers can be described or understood. So whatever the reason one may have for writing a virus, the important thing is to make certain your company is not victimized, that your data you are responsible for is safe, and that precious time is not wasted hunting down (and cleaning up after) viruses. 87

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104

87
PC-cillin
How Viruses Spread
There are many ways for a virus to enter your system:
• Email attachments
• World Wide Web (WWW) sites
• FTP traffic from the Internet (file downloads)
• Shared network files & network traffic in general
• Demonstration software
• Pirated software
• Shrink-wrapped, production programs (rare)
• Computer labs
• Electronic bulletin boards (BBS)
• Diskette swapping (using other people’s diskettes for carrying data and programs back and forth)
The most likely virus entry points are email, Internet and network connections, floppy disk drives, and
modems or other serial or parallel port connections. In today’s increasingly interconnected workplace (Inter-
net, intranet, shared drives, removable drives, and email), virus outbreaks now can spread faster and wider
than ever before.
Virus Writers
In the typical scenario, it is an individual, working alone, who writes a virus program and then introduces it
onto a single computer, network server, or the Internet. Why? Ego, revenge, sabotage, and basic disgruntle-
ment have all been cited as motivations. Recently, do-it-yourself “virus kits” have been popping up on the
Internet, and macro scripts are becoming both easier to learn and more powerful, putting the capacity to
engineer viruses in the hands of nearly everyone. In other words, no single, likely profile exits by which virus
writers can be described or understood.
So whatever the reason one may have for writing a virus, the important thing is to make certain your com-
pany is not victimized, that your data you are responsible for is safe, and that precious time is not wasted
hunting down (and cleaning up after) viruses.