What is a firewall and why is it needed?
We will not go into little things like translating words, occupying them some part of the article. Just point out that a firewall (from the English - fire wall), or…

Continue reading →

Online Programs
With the development of the Internet, cloud services and various online software are becoming more widespread. Some of the services are paid, but mostly services at such sites are provided…

Continue reading →

Why does the computer not see the USB flash drive? 8 reasons
Sometimes at the most inopportune moment, when it is urgent to remove information from a USB flash drive to a PC, the computer refuses to see the new device. It…

Continue reading →

Present day viruses

There are a huge number of computer viruses in the world. To establish their exact number (along with all modifications and upgrades) no one is taken. Instead, it is customary to calculate the loss or intensity of a virus attack. But, neither one nor the other does not allow users to understand what, exactly, how and why it gets to their computer?

Reasons for creating viruses
There are no reasons for the appearance of viruses as such. These are the reasons for human stupidity. We simply have the actual value – a huge number of computer viruses and virus programs that inhabit the Internet along with sites. It’s true that it’s worth highlighting several reasons, it’s still worth it, they are especially clear to any person.
Childishness
Banal reason. Someone wanted to try “what happens if?” True, almost no one is now engaged in viral childishness. However, it is impossible not to mention it. Indeed, this is how the first virus arose. It was created to show people “I can do this, but you can’t do anything.” However, as happens in horror films, our experimental virus escaped from control and began to multiply and multiply. Fortunately, then the network was isolated and decided that such things should not be played. So, in fact, viruses were recognized as dangerous. As they say in the famous phrase “A small chest just opened.” What one managed to do, the others managed to repeat.
Way to make money
The most controversial reason. There are viruses that are designed to steal passwords. Others sleep until the right moment, and then attack a particular site. Still others are slowly starting to send your personal data somewhere on the Internet. Fourth block the system or sites, requiring you to enter a key. Since this bunch of viruses will not be variegated, they pursue one goal – the enrichment of the creator. Blackmail, trivial swindle, obtaining keys and passwords. All this leads to theft of money in different sizes. And what is the connection to the bank’s network worth when it was “inundated” with requests from hundreds of thousands of computers around the world. The latter, however, occurred once or twice. But film directors really like to beat such stories.
Revenge
Perhaps this is the most unusual reason. So, once a guy made his ex-girlfriend a Trojan program that on the day they met (every month) destroyed her OS, and she settled in no where. Actually, the girl was not very smart, and her friends were no better. So this OS killer has spread. Fortunately, a cure for it was found very quickly, the algorithm was too primitive. However, the case remained in the world practice and one should not forget about such a reason as revenge (a girl, colleagues, former bosses, parents, a school teacher, no matter who).
Other
You will not be surprised to learn that sometimes quite interesting hypotheses are put forward. And that viruses are written by developers of antivirus software, no matter what is left without work. And that viruses are written under the order of the government for the purpose of some kind of control of the population. We will not discount these reasons. But personally to the author, they sometimes seem comical.
Virus classification
No matter what the objectives of the attacker who creates the virus, they will remain with him. Neither the program code nor the distribution method will indicate this to us (although the code may indicate it, especially if this is the second reason). However, they can indicate to us the type of virus, and therefore suggest what to expect from it. According to the algorithm of work (the behavior of a computer virus when a computer is infected), it is customary to classify viruses as follows.
Parasitic viruses
Most often these are worms, viruses that are defined as “virus_name [worm]”. They settle on the computer and begin to multiply, rewriting the program code or appending their body to it. In general, they are not dangerous until a certain point. They can be compared with parasitic worms, as long as there are few of them, they almost do no harm to the host organism, but the more they are, the more noticeable their presence. They begin to noticeably load the memory and processor, as a result of which there is a drop in system performance. Fortunately, such viruses are calculated quite easily, and treating them almost does not cause inconvenience (in the most advanced cases, you have to reinstall the system, almost without losing valuable data).
Mutant viruses
The most difficult to detect viruses. They do not appear in the same form twice, but spread over networks in an encrypted form, preserving the original structure. On the infected machine, they are decrypted and begin their subversive activities. You can detect them only at the time when they begin to act. Any type of virus can appear as a mutant; it is enough to organize an encryption algorithm in it. Currently, these viruses are not so much a threat as at the dawn of their existence, since antivirus programs have become more flexible and predict the possibility of their appearance.
Trojan programs
These viruses do not spread as fast as worms, cannot modify themselves, and are sometimes easy to detect.

Linux operating systems
Linux is not an operating system, but just its kernel. Everything that you are accustomed to see and understand as an OS (buttons, windows and panels) - in fact, it…

...

Cleaning your computer from dust
The topic Cleaning a computer (judging by queries in a search engine) from the point of view of the user for the most part involves cleaning the garbage of the…

...

SeaMonkey Web Browser Overview
Shrimp support is not as dynamic (in every way) as Firefox. But as it turned out, this has not only disadvantages, but also a number of advantages. I switched to…

...

Reading books on a computer. How to read books on a computer?
I welcome all fans to read interesting and useful books, as well as those who are just interested in how you can read books on a computer. In the past…

...