What is Virus?

A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of it over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
Since 1987, when a virus infected ARPANET, a large network used by the Defences Department and many universities, many antivirus programs have become available. These programs periodically check your computer system for the best-known types of viruses.
Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate it and use memory, but cannot attach it to other programs.

The most common blunder people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you to better protect your computer from their often damaging effects.

A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files.
Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.
People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.

Half Of Viruses

WORM..
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.

TROJAN HORSE..
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

IM WORM..
A worm (a self-replicating program typically designed to perform harm to a computer or network) that propagates over instant messaging applications. The worm spreads by accessing the user's instant messaging address book, or buddy list, and sends itself to individual recipients from that list.
Like a worm that spreads over the Internet, an IM worm can crash a system or allow a malicious hacker to gain access to a user's device. Unlike the traditional form of a worm, an IM worm does not have to scan the Internet looking for vulnerable IP addresses as it spreads by taking names from user address books and identifying who is currently online and therefore vulnerable.

SKULLS..
A type of cellphone virus that deactivates all links to your cellphone applications, including e-mail, IM, and calendar. It replaces all icons on your cellphone with images of skulls.

PROXY TROJAN..
A type of Trojan horse designed to use the victim's computer as a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use your system to launch malicious attacks against other networks.

RAV MON E VIRUS..
Also called W32/Rjump, this virus is known to open a back door on a computer that runs Microsoft Windows, and then create a copy of itself in the Windows system directory of a computer. It also creates a log file that includes the port number on which the back door component listens. The Rav Mon E virus enables hackers to gain access to the computer's programs and files once it has become infected. If you are using anti-software program that is up-to-date the Rav Mon E virus can usually be detected before it does any damage. This virus is most commonly spread through e-mail attachments, although it can also be spread through portable devices such as multimedia players and digital cameras.
Apple reported that in October of 2006 many of its video iPods had been shipped out with the Rav Mon E virus already installed on them.

SMiSHING..
A compound of 'phishing' and 'SMS'. SMiShing (SMS phishing) is a type of phishing attack where mobile phone users receive text messages containing a Web site hyperlink, which, if clicked would download a Trojan horse to the mobile phone. The term SMiShing was coined by David Rayhawk in a McAfee Avert Labs blog on August 25, 2006.

TUNNELING VIRUS..
A type of virus that attempts installation beneath the antivirus program by directly intercepting the interrupt handlers of the operating system to evade detection.

VIRUS SCANNER..
A type of antivirus program that searches a system for virus signatures that have attached to executable programs and applications such as e-mail clients. A virus scanner can either search all executables when a system is booted or scan a file only when a change is made to the file as viruses will change the data in a file.

Anti-Virus


Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware,spyware, and other forms of malware.

However, no matter how useful antivirus software is, it can sometimes have drawbacks. Antivirus software can degrade computer performance if it is not designed efficiently. Inexperienced users may have trouble understanding the prompts and decisions that antivirus software presents them with. The strongest antivirus to protect your PC is Norton, ASET, Avast, Avira, AVG and Karpersky.

This is type of antivirus that can protect our PC:



Preventative Maintenance Tips For Your PC

Basic guideline that you can use to keep your PC maintained to run efficiently:

• Do not place a PC directly near a heating or cooling source, such as heating vents or air conditioners.

• Keep the PC's air vents and fans unobstructed and free of dust.

• Do not smoke around a PC. Cigarette smoke can damage exposed metal contacts.

• Do not place a PC near water sources that can splash onto the components or drip down into them. This includes open windows through which rain can come and also under plants than can drip water down into them.

• Buildup of dust can seriously hamper a PC's capability to cool down, and even if you never open your computer's case dust can still get in through the drive openings. Dust also compromises the lifespan of your PC's hardware. An efficient way to clean dust from the inside of a computer is with compressed air, blowing dust away from the motherboard and other components.

• You should never blow air directly into a floppy drive as this can cause dust to lodge in the drive and cause it to malfunction. Users who are not familiar with working inside a computer case should take the unit to a professional for cleaning because it is possible to do more harm than good to a computer if you do not know how to safely work inside of a case.

• Always turn off and unplug the system before you clean any of the components inside the case. It is also important to ground yourself to prevent static electricity discharge before touching any components inside.

• Be extremely careful when moving a PC from one location to another. Even small jolts can dislodge chips and expansion boards, so be sure to power off the system before moving it — even if it's only going from one side of your desk to another.

• Save all documentation that comes with your PC and its components. You may need to refer to the documentation if something goes wrong.

• Always shut your system down properly (in Windows use the Start --> Shutdown method) whenever possible. It is also important to respond to warnings and error messages to prevent possible data loss or corruption.

Operating System & Data Maintenance:

• Always ensure you have downloaded and installed the latest patches and service updates for your operating system, especially on a Windows-based PC. These updates will fix bugs and security exploits.

• Keep the root directory organized. Only keep your system's start up and software initialization files in the root directory. Application files and their data belong in a separate directory from the root directory.

• Do not store data files in the same directory that you store the software. This will eliminate the possibility of accidentally erasing or overwriting a software file.

• Keep a set of backup rescue disks for the operating system.

• Keep backup copies of any important data on a removable medium. Hard drives can fail and having important data on more than one medium can save a lot of stress and headaches.

• If possible use a secondary hard drive in your system for saving files. Your main drive, which is accessed more frequently is prone to mechanical drive failure sooner than your less frequently accessed secondary hard drive would be.


TIP: Windows Live OneCare offers a free tune up scan which can help you optimize your PC's performance. This scan will help you determine what basic system maintenance tasks need to be run on your computer.

Our Members

Name : Nur Shahida Binti Selamat

Birthday : 3 October 1990

Part : 3

Students : Diploma Office Management and Technology

Name : Nurfatin Asilah Binti Rohaimi (Leader)

Birthday : 25 September 1990

Part : 3

Student : Diploma Office Management and Technology

Name : Raja Hazfalina Binti Hishamuddin

Birthday : 23 April 1990

Part : 3

Student : Diploma Office Management and Technology

Name : Syaida Afiqah Binti Hussain

Birthday : 8 September 1990

Part : 3

Student : Diploma Office Management and Technology

Name : Salsabila Binti Mohd Noh

Birthday : 29 Jun 1990

Part : 3

Student : Diploma Office Management and Technology

Name : Nurul Akmal Binti Rosli

Birthday : 25 September 1990

Part : 3

Student : Diploma Office Management and Technology