A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the .. Računalni je virus mali softverski program koji se širi s jednog računala na drugo i ometa rad računala. Računalni virus može oštetiti ili izbrisati. Koliko virusi mogu biti opasni, govori i slučaj iz godine kada je kompjuterski virus Staksnet napravio haos u svetu i uspeo da ugrozi i iranski nuklearni.

Author: Nebei Samukasa
Country: Laos
Language: English (Spanish)
Genre: Health and Food
Published (Last): 24 June 2006
Pages: 247
PDF File Size: 20.56 Mb
ePub File Size: 14.48 Mb
ISBN: 764-5-24308-542-7
Downloads: 86964
Price: Free* [*Free Regsitration Required]
Uploader: Dairr

Computer virus – Wikipedia

A okmpjuterski virus is usually very large and complex. Archived from the original on 17 December This difference has continued partly due to the widespread use of administrator accounts in contemporary versions like Windows XP. A virus typically has a search routine, which locates new files or new disks for infection. Until floppy disks fell out of use, kompjjuterski was the most successful infection strategy and boot sector viruses were the most common in the “wild” for many years.

Ina program called ” Elk Cloner ” was the first personal computer virus to appear “in the wild”—that is, outside the single computer or [computer] lab where it was created.

Granneman, Scott 6 October A memory-resident virus or simply “resident virus” installs itself as part of the operating system when executed, after which virus remains in RAM from the time the computer is booted up to when it is shut down.

These viruses modify their code on each infection. In response, free, open-source antivirus virksi have been developed, and an industry of antivirus software has cropped up, selling or freely distributing virus protection to users of various operating systems.

Computer virus

A viable computer virus must contain a search routinewhich locates new files or new disks which are worthwhile targets for infection. At said times, the executable will decrypt the virus and execute its hidden runtimesinfecting the computer and sometimes disabling the antivirus software. Virus writers use social engineering deceptions and exploit detailed knowledge of security vulnerabilities to initially infect systems and to spread the virus.


The virus will eventually be activated by the “trigger” which states which event will execute the virus, such as a date, the presence of another program or file, the capacity of the disk exceeding some limit or the user taking a certain action e. Backups on removable media must be carefully inspected before restoration.

Secondly, every computer virus must contain a routine to copy itself into the program which the search routine locates.

Idite na web-mjesto Microsoft Safety Scanner. Cabanas was released—the first known virus that targeted Windows NT it was also able to infect Windows 3. Its creator later posted the source code to Usenetallowing researchers to see how it worked. Virus Test Center, University of Hamburg. Personal computers of the era would attempt to boot first from a floppy if one had been left in the drive.

The advantage of using such slow polymorphic code is that kompjuherski makes it more difficult for antivirus professionals and investigators to obtain representative samples of the virus, because “bait” files that are infected in one run will typically contain identical or similar samples of the virus.

Ransomware and phishing scam alerts appear as press releases on the Internet Crime Complaint Center noticeboard. Many such viruses can be removed by rebooting the computer, entering Windows ” safe mode ” kompnuterski networking, and then using system tools or Microsoft Safety Scanner. Some antivirus software blocks known malicious websites that attempt to install malware.

Real World Linux Security: Different antivirus programs use different “signatures” to identify viruses. In his essay von Neumann described how kompjutersii computer program could be designed to reproduce itself. Mark Russinovich November Different antivirus programs will employ different search strings, and indeed different search methods, when identifying viruses.

The user can then delete, or in some cases “clean” or “heal” the infected file. There are two common methods that an antivirus software application uses to detect viruses, as described in the antivirus software article. Kliknite Free Download Besplatno preuzimanje. Computer viruses Computer security exploits Internet security Deception Security breaches.

Email virus — A virus that intentionally, rather than accidentally, uses the email system to spread.


Computer virus Comparison of computer viruses Computer worm List of computer worms Timeline of computer viruses and worms. Archived from the original on 29 June If the virus is encrypted with a different key for each infected komljuterski, the only part of the virus that remains constant is the decrypting module, which would for example be appended to the end.

The disadvantage of this detection method is that users are only protected from viruses that are detected by signatures in their most recent virus definition update, and not protected from new viruses see ” zero-day attack “.

For example, a virus can be programmed to mutate only slightly over time, or it can be programmed to refrain from mutating when it infects a file on a computer that already kompjuteraki copies of the virus. Burger, Ralf 16 February []. Many websites run by antivirus software kompjutedski provide free online virus scanning, with limited “cleaning” facilities after all, the purpose of the websites is to sell antivirus products and services. On page one of Dr Solomon’s Virus Encyclopaediathe undesirability of viruses, kkmpjuterski those that do nothing but reproduce, is thoroughly explained.

Retrieved 16 June Archived from the original on June 22, Retrieved September 9, Archived from the original on September 6, Archived from the original on October 5, Not all viruses have this stage. Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for so-called virus virusj.

Archived PDF from the original on September 27, A dormant virus moves into this phase when it is activated, and will now perform the function for which it was intended. The first one to appear on the Commodore Amiga was a boot sector virus called SCA viruswhich was detected in November Even home computers were affected by viruses. Archived PDF from kompjuterwki original kompjutrski Volume 1, The Basic Technologies.

Solomon’s Virus Encyclopedia ,

Author: admin