SlideShare a Scribd company logo
Yadav 1


Pahdi Yadav

Professor Milton

English 101

5 May 2008

                                            Antivirus Programs

        Today, people rely on computers to create, store, and manage critical information, many times

via a home computer network. Information transmitted over networks has a higher degree of security

risk than information kept in a user’s home or company premises. Thus, it is crucial that they take

measures to protect their computers and data from loss, damage, and misuse resulting from computer

security risks. Antivirus programs are an effective way to protect a computer against viruses.


        An antivirus program protects a computer against viruses by identifying and removing any

computer viruses found in memory, on storage media, or on incoming files. 1 When you purchase a new

computer, it often includes antivirus software. Antivirus programs work by scanning for programs that

attempt to modify the boot program, the operating system, and other programs that normally are read

from but not modified. In addition, many antivirus programs automatically scan files download from

the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer

(Karanos 201-205).


        One technique that antivirus programs use to identify a virus is to look for virus signatures, or

virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman

(Antivirus Programs), many vendors of antivirus programs allow registered users to update virus

signature files automatically from the Web at no cost for a specified time. Updating the antivirus




        1
         Bulowski points out that most antivirus programs also protect against worms and Trojan
horses (55-61).
Yadav 2


program’s signature files regularly is important, because it will download any new virus definitions that

have been added since the last update.


            Methods that guarantee a computer or network is safe from computer viruses simply do not

exist. Installing, updating, and using an antivirus program, though, is an effective technique to safeguard

your computer from loss.




        1
         Bulowski points out that most antivirus programs also protect against worms and Trojan
horses (55-61).

More Related Content

DOCX
(Alexa 09) chap.2 lab 2
DOCX
Chap 2 lab2 (Ej Guevarra)
DOCX
DOCX
Mjtanasas1
DOCX
Pahdi Yadav 1(bryan salvo)
DOCX
chap 2 lab 2 {(bryan123)}
DOCX
Cataluña antivirus programs paper
DOCX
Cataluña antivirus program
(Alexa 09) chap.2 lab 2
Chap 2 lab2 (Ej Guevarra)
Mjtanasas1
Pahdi Yadav 1(bryan salvo)
chap 2 lab 2 {(bryan123)}
Cataluña antivirus programs paper
Cataluña antivirus program

What's hot (20)

DOCX
Hamilton lara 2011
DOCX
Chap 2 lab 2
DOCX
Kent philip neri (lab 2)
DOC
Antivirus program ----neri
DOCX
Zamayla chap 2 lab 2
DOCX
Dungogan chap 2 lab 2
DOCX
Yadav 1(2)
DOCX
Taylor 1
DOCX
Pahdi yadav antivirus
DOCX
R esearch report with footnote
DOCX
antivirus
DOCX
llagas j.
DOCX
Maranan chap2 lab2
PPT
Computer viruses and antiviruses PPT
PPTX
Antivirus ppt
PPTX
Computer virus-and-antivirus
PPTX
Viruses notes
DOCX
CLASS VII COMPUTER SECURITY
PPTX
Firewall , Viruses and Antiviruses
PPT
Antivirus!!
Hamilton lara 2011
Chap 2 lab 2
Kent philip neri (lab 2)
Antivirus program ----neri
Zamayla chap 2 lab 2
Dungogan chap 2 lab 2
Yadav 1(2)
Taylor 1
Pahdi yadav antivirus
R esearch report with footnote
antivirus
llagas j.
Maranan chap2 lab2
Computer viruses and antiviruses PPT
Antivirus ppt
Computer virus-and-antivirus
Viruses notes
CLASS VII COMPUTER SECURITY
Firewall , Viruses and Antiviruses
Antivirus!!
Ad

Viewers also liked (10)

DOCX
Leadership is stewardship (ej guevarra)
DOCX
Chap 2 lab 3 (Ej Guevarra)
DOCX
Leading different personalities
PDF
Buckhorn Strategic Lesson Plan
PDF
We bouwen een theater - deel 9
PDF
Fechas pau 11 12
PDF
Good Nutrition & Weight 5
PDF
Grupo assista amplía sus instalaciones
PPTX
Intervalos musicales
Leadership is stewardship (ej guevarra)
Chap 2 lab 3 (Ej Guevarra)
Leading different personalities
Buckhorn Strategic Lesson Plan
We bouwen een theater - deel 9
Fechas pau 11 12
Good Nutrition & Weight 5
Grupo assista amplía sus instalaciones
Intervalos musicales
Ad

Similar to Chap 2 lab2 (Ej (17)

DOCX
Kent philip neri (lab 2)
DOCX
Mjtanasas
DOCX
Pahdi yadav antivirus
DOCX
Policy report barrat & associates ltd
PDF
Cscu module 03 protecting systems using antiviruses
PPT
Copy of antiviruse
PDF
Beyond layers and peripheral antivirus security
PPTX
Chapter 5.pptx
PPT
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
PPT
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
PPT
cybersafety_and_cyber_security_basics.ppt
DOCX
PPTX
An introduction to cyber security by cyber security infotech pvt ltd(csi)
PPT
Cybersafety basics
PPTX
cscu module 03 Protecting Systems Using Antiviruses.pptx
PPTX
Computer Security 101
PDF
Ch14 Desktop Protection
Kent philip neri (lab 2)
Mjtanasas
Pahdi yadav antivirus
Policy report barrat & associates ltd
Cscu module 03 protecting systems using antiviruses
Copy of antiviruse
Beyond layers and peripheral antivirus security
Chapter 5.pptx
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
cybersafety_and_cyber_security_basics.ppt
An introduction to cyber security by cyber security infotech pvt ltd(csi)
Cybersafety basics
cscu module 03 Protecting Systems Using Antiviruses.pptx
Computer Security 101
Ch14 Desktop Protection

More from Enriquee Guevarra (17)

DOCX
Leadership is stewardship (Ej guevarra)
DOCX
Leading different personalities (Ej Guevarra)
DOCX
Hankins 1 (Ej Guevarra)
DOCX
Wireless communications paper (Ej Guevarra)
DOCX
Leadership is stewardship (ej guevarra)
DOCX
Leading different personalities
DOCX
Leadership is stewardship (ej guevarra)
DOCX
Leading Different Personalities (Ej Guevarra)
DOCX
Music for life (Ej Guevarra)
DOCX
Shop for sale ( Ej Guevarra )
DOCX
Shop for sale ( Ej Guevarra )
DOCX
Rent a cabin ( Ej Guevarra )
DOCX
Rent a cabin ( ej guevarra )
DOCX
Airplane rides ( Ej Guevarra )
DOCX
Craft barn ( Ej Guevarra )
DOCX
Craft barn
DOCX
Autumn festival
Leadership is stewardship (Ej guevarra)
Leading different personalities (Ej Guevarra)
Hankins 1 (Ej Guevarra)
Wireless communications paper (Ej Guevarra)
Leadership is stewardship (ej guevarra)
Leading different personalities
Leadership is stewardship (ej guevarra)
Leading Different Personalities (Ej Guevarra)
Music for life (Ej Guevarra)
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )
Rent a cabin ( ej guevarra )
Airplane rides ( Ej Guevarra )
Craft barn ( Ej Guevarra )
Craft barn
Autumn festival

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Chapter 3 Spatial Domain Image Processing.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Cloud computing and distributed systems.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation theory and applications.pdf
PPT
Teaching material agriculture food technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Spectroscopy.pptx food analysis technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
“AI and Expert System Decision Support & Business Intelligence Systems”
Chapter 3 Spatial Domain Image Processing.pdf
The AUB Centre for AI in Media Proposal.docx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
20250228 LYD VKU AI Blended-Learning.pptx
Cloud computing and distributed systems.
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation theory and applications.pdf
Teaching material agriculture food technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
Spectroscopy.pptx food analysis technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Programs and apps: productivity, graphics, security and other tools
Spectral efficient network and resource selection model in 5G networks
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Digital-Transformation-Roadmap-for-Companies.pptx
Network Security Unit 5.pdf for BCA BBA.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Chap 2 lab2 (Ej

  • 1. Yadav 1 Pahdi Yadav Professor Milton English 101 5 May 2008 Antivirus Programs Today, people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses. An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. 1 When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files download from the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201-205). One technique that antivirus programs use to identify a virus is to look for virus signatures, or virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman (Antivirus Programs), many vendors of antivirus programs allow registered users to update virus signature files automatically from the Web at no cost for a specified time. Updating the antivirus 1 Bulowski points out that most antivirus programs also protect against worms and Trojan horses (55-61).
  • 2. Yadav 2 program’s signature files regularly is important, because it will download any new virus definitions that have been added since the last update. Methods that guarantee a computer or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus program, though, is an effective technique to safeguard your computer from loss. 1 Bulowski points out that most antivirus programs also protect against worms and Trojan horses (55-61).