A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the .. Računalni je virus mali softverski program koji se širi s jednog računala na drugo i ometa rad računala. Računalni virus može oštetiti ili izbrisati. Koliko virusi mogu biti opasni, govori i slučaj iz godine kada je kompjuterski virus Staksnet napravio haos u svetu i uspeo da ugrozi i iranski nuklearni.
|Published (Last):||7 June 2012|
|PDF File Size:||20.86 Mb|
|ePub File Size:||19.7 Mb|
|Price:||Free* [*Free Regsitration Required]|
Sprječavanje i uklanjanje virusa i drugog zlonamjernog softvera
Volume 1, The Basic Technologies. Idite na web-mjesto Microsoft Security Essentials.
Unlike Windows users, most Unix users do not log in as an administrator, or “root user”except to install or configure software; as a result, even if a user ran the virus, it could not harm their operating system.
Traditional computer viruses emerged in the s, driven by the spread of personal computers and the resultant increase in bulletin board system BBSmodem use, and software sharing. Viruses that utilize this technique are said to be in metamorphic code. Most of these viruses are written in the scripting languages for Microsoft programs such as Microsoft Word and Microsoft Excel and spread throughout Microsoft Office by infecting documents and spreadsheets.
Kliknite Download the 32 bit version Preuzmi bitnu verziju ili Download the 64 bit version Preuzmi bitnu verzijuovisno o tome koji operacijski sustav koristite. Basic Concepts and Solved Exercises.
This is the actual work of the virus, where the “payload” will be released. Security software can then be used to check the dormant operating system files. For example, a virus can be programmed to mutate only slightly over time, or it can be programmed to refrain from mutating when it infects a file on a computer that already contains copies of the virus.
A computer virus is a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code. If the recipient, thinking the link is from a friend a trusted source follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating. In the s, as computers and operating systems grow larger and more complex, old hiding techniques need to be updated or replaced.
For example, an executable may be created and named “picture. Its creator later posted the source code to Usenetallowing researchers to see how it worked. Thus, an antivirus software attempting to detect the virus will either not be mompjuterski permission to read the infected file, or, the “read” request will be served with the uninfected version of the same file.
While virus infected files may be accidentally sent as email attachmentsemail viruses are aware of email system functions. Retrieved September 9, The copy may not be identical to the propagating version; viruses often “morph” or change to evade detection by IT professionals and anti-virus software.
Defending a computer against viruses may demand that a file system migrate towards detailed and explicit permission for every kind of file access. Restore points from previous days should work, provided the virus is not designed to corrupt the restore files and does not exist in previous restore points.
It can be destructive such as deleting files on disk, crashing the system, or corrupting files or relatively harmless such as popping up humorous or political messages on screen. Email virus — A virus that intentionally, rather komputerski accidentally, uses the email system to spread.
Just like regular encrypted viruses, a polymorphic virus infects files with kompjutwrski encrypted copy of itself, which is decoded by a decryption module. In other projects Wikimedia Commons.
Computer virus – Wikipedia
United Kingdom – English. Wikimedia Commons has media related to Computer viruses.
Not to be confused with computer worm or Trojan horse computing. Users would be required to click on a link to activate the virus, which would then send an email containing user data to an anonymous email addresswhich was later found to be owned by Larose.
A macro kimpjuterski or “document virus” is a virus that is written in a macro languageand embedded into these documents so that when users open the file, the virus code is executed, and can infect the user’s computer. Some old viruses, especially on the DOS platform, make sure that the “last modified” kompjutersoi of a host file stays the same when the file is infected by the virus.
Even home computers were affected by viruses. In the early days of the personal computermany users regularly exchanged information and programs on floppies. They accomplish this by overwriting unused areas of executable files.
The term “virus” is also commonly, but erroneously, used to refer to other types of malware.