Computer Knowledge Virus Tutorial
80 pages
English

Computer Knowledge Virus Tutorial

Le téléchargement nécessite un accès à la bibliothèque YouScribe
Tout savoir sur nos offres
80 pages
English
Le téléchargement nécessite un accès à la bibliothèque YouScribe
Tout savoir sur nos offres

Description

Computer Knowledge Virus Tutorial AV Vendors | MapComputer Knowledge Virus TutorialWelcome to the Computer Knowledge tutorial on computer viruses. We'll discuss whatthey are, give you some history, discuss protection from viruses, and mention some ofthe characteristics of a virus hoax.© Computer Knowledge 2000Keep in mind that not everything that goes wrong with a computer is caused by acomputer virus or worm. Both hardware and software failure is still a leading cause ofVirus Introcomputer problems.Virus TypesIf you follow the links that appear in the left frame you should be able to proceed on aVirus History page-by-page basis. To jump to a specific page please visit our map page. A listing ofanti-virus software vendors is also available. Links to both of these should appear at theVirus Protection top of each page.Virus HoaxesPlease also don't forget to read the License/Legal info. There are license, use, anddistribution requirements for this tutorial, even if it is on the web.Current ThreatsFinally, this tutorial can be downloaded to run on your computer if you have a copy ofAdobe Acrobat (a free reader is available). The links below will allow you to download azip file with the tutorial PDF file in it (if you don't understand the zip compression formatplease see our info page on this) and/or a copy of the latest Acrobat PDF reader.Download Tutorial Zip File (475K)Download Acrobat ReaderNew/updated pages:Page added on NTFS Alternate Data ...

Informations

Publié par
Nombre de lectures 48
Langue English

Extrait

Computer Knowledge Virus Tutorial
AV Vendors | Map
Computer Knowledge Virus Tutorial
Welcome to the Computer Knowledge tutorial on computer viruses. We'll discuss what
they are, give you some history, discuss protection from viruses, and mention some of
the characteristics of a virus hoax.© Computer Knowledge 2000
Keep in mind that not everything that goes wrong with a computer is caused by a
computer virus or worm. Both hardware and software failure is still a leading cause ofVirus Intro
computer problems.
Virus Types
If you follow the links that appear in the left frame you should be able to proceed on a
Virus History page-by-page basis. To jump to a specific page please visit our map page. A listing of
anti-virus software vendors is also available. Links to both of these should appear at the
Virus Protection top of each page.
Virus Hoaxes
Please also don't forget to read the License/Legal info. There are license, use, and
distribution requirements for this tutorial, even if it is on the web.Current Threats
Finally, this tutorial can be downloaded to run on your computer if you have a copy of
Adobe Acrobat (a free reader is available). The links below will allow you to download a
zip file with the tutorial PDF file in it (if you don't understand the zip compression format
please see our info page on this) and/or a copy of the latest Acrobat PDF reader.
Download Tutorial Zip File (475K)
Download Acrobat Reader
New/updated pages:
Page added on NTFS Alternate Data Streams (6 Sep 2000)
Summary History page added (29 Jul 2000)
File Extensions and Source Code Viruses (12 Jul 2000)
Entire tutorial updated/redesigned (June 2000)
Please visit our sponsors.
Click Here to Visit our Sponsor
file:///D|/My Documents/web/cknow/vtutor/index.htm [9/7/2000 4:06:57 PM]Tutorial Map
AV Vendors | Map
Computer Knowledge Virus Tutorial | home
Tutorial Map
Here you'll find links to any page in the tutorial. The list is organized along the lines of the© Computer Knowledge 2000 tutorial so you can see how the information flows.
Virus Intro
Top Level Pages
Virus Types
Virus Intro
Virus History Virus Types
Virus Protection Virus History
Virus ProtectionVirus Hoaxes
Virus Hoaxes
Current Threats
Current Threats
Virus Intro
Virus Behaviour
Number of Viruses
How Serious Are Viruses?
What About Good Viruses?
Hardware Threats
Software Threats
Virus Types
What Viruses Infect
System Sector Viruses
File Viruses
Macro Viruses
Companion Viruses
Cluster Viruses
Batch File Viruses
Source Code Viruses
Visual Basic Worms
How Viruses Infect
Polymorphic Viruses
Stealth Viruses
Fast and Slow Infectors
Sparse Infectors
Armored Viruses
Multipartite Viruses
Cavity (Spacefiller) Viruses
Tunneling Viruses
Camouflage Viruses
NTFS ADS Viruses
Droppers
Virus Droppers
Virus History
Virus Histories
Dr. Solomon's History
1986-1987 - The Prologue
1988 - The Game Begins
1989 - Datacrime
1990 - The Game Gets More Complex
1991 - Product Launches and Polymorphism
1992 - Michelangelo
1993 - Polymorphics and Engines
The Future
Robert Slade's History
Earliest history of viral programs
Early viral related programs
Fred Cohen
Pranks and Trojans
Apple Virus
Lehigh and Jerusalem
(c) Brain
MacMag virus
Virus Protection
Types of Protection
Scanning
Integrity Checking
Interception
General Information
AV Product Use Guidelines
File Extensions
Safe Computing Practices
Outlook and Outlook Express
Disable Scripting
Backup Strategy
On-going Virus Information
Virus Hoaxes
On-going Hoax Information
Current Threats
Back Orifice
CIH Spacefiller
Kakworm
Laroux
Love Letter
Melissa
Pretty Park
Stages
Single Item Pages
Anti-Virus Software
License/Legal
Virus Plural: Viruses
Partition Sector
DOS Boot Sector
FDISK /MBR Problems
False Authority Syndrome
Logic Bombs
Trojans
Worms
Please visit our sponsors.
Click Here to Visit our Sponsor
file:///D|/My Documents/web/cknow/vtutor/vtmap.htm (1 of 2) [9/7/2000 4:07:12 PM]Tutorial Map
file:///D|/My Documents/web/cknow/vtutor/vtmap.htm (2 of 2) [9/7/2000 4:07:12 PM]Anti-Virus Software
AV Vendors | Map
Computer Knowledge Virus Tutorial | home
Anti-Virus Software
There are a number of companies that produce anti-virus software. This is not intended
© Computer Knowledge 2000 to be a complete list of anti-virus companies; but, it is a good starting place. A more
complete (though perhaps somewhat dated) list may be found at:
Virus Intro http://victoria.tc.ca/int-grps/books/techrev/contacts.lst
Virus Types
AntiViral Toolkit Pro
Virus History http://www.avp.com/
http://www.avp.ch/
Virus Protection
http://www.avp.tm/
Virus Hoaxes http://www.avp.ru/
Current Threats
F-Prot
http://www.complex.is/
F-Prot Professional
http://www.commandcom.com/
http://www.DataFellows.com/
Integrity Master (an excellent "smart" integrity checker)
http://www.stiller.com/
McAfee VirusScan
http://www.nai.com/
MIMESweeper (mail firewall)
http://www.mimesweeper.com/
Norman Virus Control
http://www.norman.com/
Norton Anti-virus, Symantec Anti-virus for Mac
http://www.symantec.com/
Trend Micro (PC-Cillin, InterScan, Scanmail, Serverprotect)
http://www.antivirus.com/
Sophos Sweep
http://www.sophos.com/
And, should you not catch a virus and it activates with a really nasty payload that
effectively erases your hard disk there are companies that will attempt to recover your
data if it is important and you have not followed our recommendation to back up
frequently. These procedures are labor intensive so you should expect to pay
accordingly.
Ontrack Data Recovery, Inc.
http://www.ontrack.com/
DataRescue
http://www.datarescue.com/
Please visit our sponsors.
Click Here to Visit our Sponsor
file:///D|/My Documents/web/cknow/vtutor/vtavsoftware.htm [9/7/2000 4:07:30 PM]License/Legal
AV Vendors | Map
Computer Knowledge Virus Tutorial | home
License/Legal
Copyright 1996-2000, Computer Knowledge. All Rights Reserved
© Computer Knowledge 2000
The Computer Knowledge Virus Tutorial is a copyright product of Computer Knowledge.
It also contains copyrighted material from others (used with permission). Please honor
Virus Intro the copyrights. Read the tutorial, learn from the tutorial, download and run the PDF
version of the tutorial on your computer, link to the tutorial. But, please don't copy it and
claim it as your own in whole or part.Virus Types
Virus History The PDF version of the Computer Knowledge Virus Tutorial should be considered
freeware. It is NOT in the public domain. It is copyrighted by Computer Knowledge and it
Virus Protection and all accompanying materials are protected by United States copyright law and also by
international treaty provisions.
Virus Hoaxes
The tutorial requires no payment of license fees for its individual use as an educationalCurrent Threats
tool. If you are paying to use the tutorial please advise Computer Knowledge (PO Box
5818, Santa Maria, CA 93456 USA). Please provide contact information for those
charging the fee.
License for Distribution of the PDF Version
No royalties are required for distribution so long as distribution charges only cover the
costs of such distribution (plus a nominal profit if the distribution channel is a
profit-making channel). Under no circumstances is payment of such fees to be
represented or understood to constitute legal ownership of this tutorial or any of its
associated files.
Any distribution for profit beyond that described just above requires written permission
from Computer Knowledge and payment of negotiated royalties.
You may not use, copy, rent, lease, sell, modify, decompile, disassemble, otherwise
reverse engineer, or transfer the licensed program except as provided in this agreement.
Any such unauthorized use shall result in immediate and automatic termination of this
license.
In no case may this product be bundled with hardware or other non-shareware software
without written permission from Computer Knowledge (PO Box 5818, Santa Maria, CA
93456 USA).
All distribution of the Computer Knowledge Virus Tutorial is further restricted with regard
to sources which also distribute virus source code and related virus construction/creation
materials. The tutorial may not be made available on any site, CD-ROM, or with any
package which makes available or contains viruses, virus source code, virus
construction programs, or virus creation material.
Permission to distribute the Computer Knowledge Virus Tutorial program is not
transferable, assignable, saleable, or franchisable. Each entity wishing to distribute the
package must independently satisfy the terms of this limited distribution license.
You agree that the software will not be shipped, transferred or exported into any country
or used in any manner prohibited by the United States Export Administration Act or any
other export laws, restrictions or regulations.
U.S. Government Information:

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents