Tag Archives: could

All About Computer Viruses (Page 1 of 3)

Feel Free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know where it appeared: Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.

You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?

Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.

In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.

In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.

A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.

When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.

This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)

These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.

Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.

For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.

All About Computer Viruses (Page 1 of 3)

Feel Free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know where it appeared: Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.

You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?

Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.

In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.

In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.

A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.

When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.

This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)

These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.

Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.

For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.

John Basso’s 2012 Technology Predictions: Prediction: Sensors Everywhere

Whenever the subject of “sensors everywhere” comes up, people usually have one of two responses:

A. George Orwell’s “1984” and omnipresent monitoring

B. Efficiency, knowledge and omnipresent monitoring

The advances we have seen recently have been pretty remarkable, and as those inventions make their way into business and consumer markets we’ll be able to do some really neat things that haven’t been possible or economical.

Like most innovations, the ability to place and monitor sensors in almost anything is really a combination of multiple innovations and changes. Specifically:

• Capable low powered devices

• Low powered networks

• IPv6

The first two are pretty obvious. Miniaturization of devices, as well as the ability to work at very low power means that we can put them almost anywhere. Also, low powered networks means that you can easily and wirelessly connect to them which makes installation and maintenance very affordable.

As a part of the networking capability, IPv6 makes it much easier to connect these devices to the internet. We explained IPv6 and its business implications in a previous post, which may be worth checking out if you have any questions about IPv6. As for its implications for sensors, IPv6 basically could give a unique web address to every atom in the galaxy. By comparison, the current system (IPv4) does not even have enough addresses for every person on the planet.

The ability to place sensors everywhere means that you can monitor and control things with more precision, and it has home, business and government implications. Using data collection software and data management applications, users can use the data to make informed and effective changes to improve performance or reduce the cost of whatever they are monitoring.

For home uses, you could easily and remotely monitor power usage, reducing your monthly utility bill. You could monitor when doors and windows are left open, the water table around your house (for basement flooding), weather and rainfall, or pretty much anything else you would want to monitor. Of course, there are hundreds of practical medical uses, including the ability to wear or implant sensors that could tell if you fall or lose consciousness and automatically call for help.

For businesses, the uses are pretty much limitless, but the short description is it gives the ability to monitor key indicators that might otherwise be more challenging to monitor. Sensors help to improve efficiency as well as improve safety and performance. We see these in manufacturing and production already, but most other industries are less capable of accurately monitoring workflows and outcomes.

For governments it will help ensure the safety and maintenance of infrastructure, including roads and bridges. It also means that traffic patterns could be more accurately determined and planned for, rather than relying on static timers and quantized car groupings.

There are some security and privacy concerns related to this which will be discussed later. However the biggest potential concern is that people will set up their own sensor networks at home and fail to secure them properly.