A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the .. Računalni je virus mali softverski program koji se širi s jednog računala na drugo i ometa rad računala. Računalni virus može oštetiti ili izbrisati. Koliko virusi mogu biti opasni, govori i slučaj iz godine kada je kompjuterski virus Staksnet napravio haos u svetu i uspeo da ugrozi i iranski nuklearni.
|Published (Last):||3 January 2010|
|PDF File Size:||6.79 Mb|
|ePub File Size:||7.93 Mb|
|Price:||Free* [*Free Regsitration Required]|
Sprječavanje i uklanjanje virusa i drugog zlonamjernog softvera
These viruses modify their code on each infection. Payload activity might be noticeable e.
The term “virus” is also commonly, but erroneously, used to refer to other types of malware. Users would be required to click on a link to activate the virus, which would then send an email containing user data to an anonymous email addresswhich was later found to be owned by Larose.
Traditional computer viruses emerged in the s, driven by the spread of personal computers and the resultant increase in bulletin board system BBSmodem use, and software sharing. Secunia PSI  is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it.
Defending a computer against viruses may demand that a file system migrate towards detailed and explicit permission for every kind of file access.
Archived from the original on 8 August Event occurs at 32 minutes.
Guide to Computer Network Security. Computer viruses currently cause billions of dollars’ worth of economic damage each year,  due to causing system failure, wasting computer resources, corrupting data, increasing maintenance costs, etc.
Essays on Cellular Automata. A Media Archaeology of Computer Viruses. This way, if data is lost through a virus, one can start again using the backup which will hopefully be recent. This difference has continued partly due to the widespread use of administrator accounts in contemporary versions like Windows XP. Foundations of Computer Security.
Mark Russinovich November Data sent would contain items such as user IP address and email addresses, contacts, website browsing history, and commonly used phrases. Before computer networks became widespread, most viruses spread on removable mediaparticularly floppy disks. This is due to Microsoft’s large market share of desktop computer users. Bosna i Hercegovina – Hrvatski.
Retrieved 10 June The disadvantage of this detection method is that users are only protected from viruses that are detected by signatures in their most recent virus definition update, and not protected from new viruses see ” zero-day attack “.
The triggering phase can be caused by a variety of system events, including a count of the number of times that this copy of the virus has made copies of itself.
Some viruses employ polymorphic code in a way that constrains the mutation rate of the virus significantly. The virus program has managed to access the target user’s computer or software, but during this stage, the virus does not take any action.
Retrieved June 10, Archived PDF from the original on Most security software relies on virus signatures, or they employ heuristics. This is the actual work of the virus, where the “payload” will be released. In order to replicate itself, a virus must be permitted to execute code and write to memory. Upper Saddle River, NJ: Computer virus Comparison of computer viruses Computer worm List of computer worms Timeline of computer viruses and worms.
Each infected program will now contain a clone of the virus, which will itself enter a propagation phase. This life cycle can be divided into four phases:.
Virus Protection for Windows. Retrieved September 4, The virus kompjutefski propagating, that is multiplying and replicating itself. Macro viruses have become common since the mids.
Retrieved 2 September Archived from the original on 14 December Wikimedia Commons has media related to Computer viruses. Some old viruses, especially on the DOS platform, make sure that the “last modified” date of a host file stays the same when the file is infected by the virus.
Ina program called ” Elk Cloner ” was the first personal computer virus to appear “in the wild”—that is, outside the single computer or [computer] lab where it was created.
Archived PDF from the original on 23 October This is because malicious hackers and other individuals are always creating new viruses. Microsoft’s System File Checker improved in Windows 7 and later can be used to check for, and repair, corrupted system files. McAfee, via Axel Boldt. Archived from the original on 24 May The only reliable method to avoid “stealth” viruses is to “reboot” from a medium that is known to be “clear”. The majority of active malware threats are actually trojan horse programs or computer worms rather than computer viruses.