Студопедия

Главная страница Случайная страница

Разделы сайта

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника






How Computer Viruses Work






Strange as it may sound, the computer virus is something of an Information Age marvel. On the one hand, viruses show us how vulnerable we are -- a properly engineered virus can have a devastating effect, disrupting productivity and doing billions of dollars in damages. On the other hand, they show us how sophisticated and interconnected human beings have become.

For example, experts estimate that the Mydoom worm infected approximately a quarter-million computers in a single day in January 2004. Back in March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained. […] In January 2007, a worm called Storm appeared -- by October, experts believed up to 50 million computers were infected. That's pretty impressive when you consider that many viruses are incredibly simple.

When you listen to the news, you hear about many different forms of electronic infection. The most common are:

  • Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.
  • E-mail viruses - An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software.
  • Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.
  • Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

Questions:

· Do you know the names of any viruses and worms? Are they still active?

· What are the forms of electronic infection? In which way a computer virus differs from a worm, a Trojan horse?

· In which way do computer viruses show us how sophisticated and interconnected human beings have become?

· Do you agree with the author that the computer virus is something of an Information Age marvel?

Exercise 2. Find Russian equivalents for the following words and word combinations:


- strange as it may sound

- a properly engineered virus

- to infect

- to completely turn off their e-mail systems

- the virus could be contained

- electronic infection

- to piggyback on real programs

- to attach itself to a program

- program runs

- to reproduce

- wreak havoc

- e-mail virus

- to replicate itself

- to mail automatically

- to require a double-click

- to launch

- the infected message

- to erase your hard disk

- security holes

- to scan the network


Exercise 3. Provide Russian equivalents and learn the words. Illustrate them by examples from the British National Corpus online concordance.

a virus, a worm, a Trojan horse, vulnerable, sophisticated, to have a devastating effect, disrupting productivity, billions of dollars in damages, to infect, until the virus could be contained, forms of electronic infection, a piece of software, to piggyback on real programs, to attach oneself to a program, a spreadsheet, to reproduce by attaching to other programs, to wreak havoc, to replicate oneself by automatically mailing oneself to, to launch, the preview pane, to erase the hard disk, security holes, to copy oneself to the new machine

Exercise 4. Translate the following using vocabulary (from exercise 1-2):






© 2023 :: MyLektsii.ru :: Мои Лекции
Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав.
Копирование текстов разрешено только с указанием индексируемой ссылки на источник.