OVERVIEW OF VIRUS 
1949, John Von Neuman, say "self altering automata theory" which is the result of research mathematicians. 1960,  the lab BELL (AT & T), experts in the lab BELL (AT & T) to  experiment the theory expressed by john v Neuman, they play around with  the theory to a type of game / game. The  experts make a program that can reproduce itself and can destroy  lawan.Program-made program that is able to survive and destroy all other  programs, it will be deemed the winner. This  game eventually became a favorite game in each and every time they also  realize komputer.semakin lab and began to be aware of this game is  because the program created more and more dangerous, so that they do  surveillance and strict security. 
1980,  the program that eventually became known as the "virus" was  successfully spread beyond the lab environment, and began circulating in  cyberspace. 1980, begin to known viruses that spread in the cyber world. 
B.PENGERTIAN VIRUS 
"A  That program can infect other programs by modifying them to include a  copy of itself.A slighty altered virus can spread throughout a computer  system or network using the authorization of every user using it to  infect Their programs. Every That gets infected programs can also act as a viral infection That Grows "(Fred Cohen) 
The first time the term "virus" is used by Fred Cohen in 1984 in the United States. A  computer virus named "Virus" because it has some fundamental  similarities with the virus in medical terms (biological viruses). 
Computer  viruses can be interpreted as a computer program biasa.Tetapi have a  fundamental difference with other programs, which created the virus to  infect other programs, convert, manipulate and even destroying it. There  is to be noted here, the virus will infect only when the trigger  program or programs that have been infected had been executed, where it  differs from the "worm". This paper will not discuss the worm because it would divert us from our later discussion of this virus. 
C.KRITERIA VIRUS 
A program called the new virus could be said is really true if the virus has at least five criteria: 
A. The ability of a virus to get information 2. Ability to examine a program 3. Its ability to multiply and spread 4. His ability to manipulate 5. Its ability to hide itself. 
Now will try to explain briefly what is meant the ability of each and why this is necessary. 
1.Kemampuan to obtain information 
In general, a virus requires a list of the names of files in a directory, for what? so  that he can identify what programs will he tulari, such as macro  viruses that will infect all files ending in *. doc after the virus was  found, this is where the ability to gather information necessary for the  virus that can make a list / all data files, continue to sort them by  looking for files  that can ditulari.Biasanya this data is created when an infected  program / virus infected or even the program is executed. The  virus will immediately undertake to collect data and put it in the RAM  (usually: P), so that when the computer shuts down all the lost data but  it will be created each bervirus program is run and are usually made as  a hidden file by the virus. 
2.Kemampuan check divulging program 
A  virus must also be biased to examine a program that will be infected,  for example, he served infect program extension *. Doc, he should check  whether the document file has been infected or not, because if it is  then he will be useless infecting her 2 times. This  is very useful to enhance the ability of a virus infecting one in terms  of speed of file / program.Yang common practice is to have a virus /  mark the file / program that has infected so it is easy to recognize by  the virus. Examples of such labeling is to give a unique byte in every file that has been infected. 
3.Kemampuan to multiply 
If this virus emang "bang-get", this does not mean without the virus. The core of the virus is the ability mengandakan itself by infecting other programs. A  virus has been found when his victim (either a file or program) then it  will recognize it by check, if not already infected then the virus will  begin to infect the action by writing a byte identifier in the program /  file, and so on mengcopikan / write the object code of the virus above the file / program infected. Some common ways the virus to infect / reproduce itself is: 
a.File / Program to be infected deleted or renamed. then created a file using that name with the virus (ie virus changed his name to the name of the deleted file) b.Program  virus is already in execution / loads into memory will directly infect  other files by riding the entire file / program. 
4.Kemampuan held manipulation 
Regular (routine) owned by a virus will be started after a virus infects a file / program. contents of this routine can range from the lightest to the destruction.This  routine use of the ability of an operating system (Operating System),  so it has the same ability to those of the operating system. for example: 
a.Membuat image or message on the monitor B.Change / change change the label of each file, directory, or the label of the drive in pc c.Memanipulasi program / file is infected d.Merusak program / file e.Mengacaukan printer working, etc. 
Hiding himself 5.Kemampuan 
Hiding  is the ability of self to be possessed by a virus so that all the good  work from the beginning to the success of transmission can  terlaksana.langkah the usual steps are: 
-The  original program / virus is stored in coded form and machines combined  with other programs that are considered useful by the user. -Virus program is put on the boot record or track that is rarely noticed by the computer itself -Virus program is made as short as possible, and the infected file does not change its size -The virus does not change the description of the time a file , Etc. 
D.SIKLUS LIFE VIRUS 
Virus life cycle in general, through four stages: 
o Dormant phase (Phase Rest / Sleep) In this phase the virus is not active. The  virus is activated by a particular condition, such as: the date  specified, the presence of another program / execution of other  programs, etc.. Not all of the virus through this phase 
o Propagation phase (Phase Distribution) In this phase the virus copies itself to a program or to a place of storage media (both hard drives, ram, etc.). Each infected program would be the "klonning" virus (depending on how the virus infects) 
o Trigerring phase (Phase Active) In this phase the virus is active and this will also trigger by several conditions such as the Dormant phase 
o Execution phase (Execution Phase) At this phase the virus that have been active earlier will perform its function. Such as deleting files, display messages, etc. 
E.JENIS - TYPE VIRUS 
To  further refine our knowledge about the virus, I'll try to give an  explanation of the types of viruses that often roam the cyber world. 
Macro 1.Virus This  type of virus must have been very often we dengar.Virus is written with  the programming language of an application rather than the programming  language of an Operating System. The  virus can run its constituent if the application can run properly, that  is if the computer can run applications mac word so this virus works on  a Mac computer operating system. virus samples: 
W97M-variant, ie the length of 1234 bytes W97M.Panther, akanmenginfeksi normal.dot and infect the document when opened. -WM.Twno.A;  TW 41 984 bytes long, it will infect Ms.Word document that uses a macro  language, usually the extension *. DOT and *. DOC , Etc. 
2.Virus Boot Sector Boot  sector viruses are common in all these menyebar.Virus reproduce itself  will remove or replace the original boot sector virus boot program. So  when there is booting the virus will be loaded kememori and then the  virus will have the ability to control the standard hardware (ex ::  monitor, printer, etc.) and from memory it also will spread eseluruh  drives and connected kekomputer (ex: floppy, other drives other than drive c). virus samples: -Variant virus wyx ex: wyx.C (B) infect the boot record and floppy; length: 520 bytes; characteristics: memory resident and encrypted) -Variant of V-sign: infect the Master Boot Record; length of 520 bytes; characteristics: resident in memory (memory resident), encrypted, and polymorphic) 4th-Stoned.june / bloody!: infect:  Master boot record and floppy; length of 520 bytes; characteristics:  resident in memory (memory resident), encrypted and displays the message  "Bloody! june 4th 1989" after the computer boots 128 times 
3.Stealth Virus This virus will master table in DOS interrupt table that we often refer to as "Interrupt interceptor". virus  is capable of instruction-level instructions to control the DOS and  usually they are hidden as well as a full name or size. virus samples: -Yankee.XPEH.4928,  infect the file *. COM and *. EXE; length of 4298 bytes;  characteristics: resident in memory, ukurantersembunyi, has a trigger -WXYC  (which includes any boot record category for entering stealth kategri  also included here), an infected floppy motherboot record; length of 520  bytes; resident in memory; size and hidden viruses. -Vmem (s): infect  files *. EXE, *. SYS and *. COM; fie 3275 bytes long; characteristics:  resident in memory, the size of the hidden, in the encryption. , Etc. 
4.Polymorphic Virus The virus is designed to make misleading antivirus program, meaning that the virus is always trying to avoid being recognized by the anti-virus is always changing the way the fox  
virus samples: 
-Necropolis A / B, infect  a file *. EXE and *. COM; file 1963 bytes long; characteristics:  resident in memory, the size and tesembunyi virus, encrypted, and can  change the structure change -Nightfall, infect  a file *. EXE; file 4554 bytes long; characteristics: resident in  memory, the size and tesembunyi virus, has a trigger, terenkripsidan can  change the structure , Etc. 
5.Virus File / Program This  virus infects files that can be executed directly from the operating  system, whether it's application file (*. EXE), or *. COM is usually  also the result of infection from this virus can be detected by changes  in the size of the file that attacked. 
Partition 6.Multi Virus This  virus is a combination dariVirus boot sector and file viruses: that the  work performed resulted in two, that he can infect the files *. EXE and  also infect the Boot Sector. 
HOW TO SPREAD VIRUS F.BEBERAPA 
Viruses  as biological virus must have spread to the media, computer viruses can  spread control every aspect of your computer / other engines are also a  number of ways, including: 
1.Disket, storage media R / W External storage media can be an easy target for viruses to be used as media. Well as a place to stay or as a distribution medium. Media bias operation R / W (read and Write) is carrying the virus and allow it to serve as a distribution medium. 
2.Jaringan (LAN, WAN, etc.) The  relationship between multiple computers directly it is possible to move  part of a virus when there is exchange / executing the file / program  containing the virus. 
3.WWW (internet) It is likely an accident in the plant site of a 'virus' that will infect computers that access it. 
4.Software a Freeware, Shareware or even pirated Many  viruses that are deliberately planted in a good program that  disseminate free of charge, or trial version that would have a virus  embedded in it. 
5.Attachment on email, transferring files Almost  all types of viruses these days use the email attachment is because all  internet service users must use email to communicate, these files are  intentionally striking / attract attention, and often have a double  extension on the file naming. 
G.PENANGULANGANNYA 
1.Langkah-Steps for Prevention For prevention you can do some of the following steps: o  Use Antivirus updatean you trust with the latest, never an appun matter  as long as the brand is always updated, and turn on the Auto protect o  Always scan all external storage media that will be used, perhaps it is  a bit inconvenient, but if you work Autoprotect anti virus can be  passed to this procedure. o If you are connected directly to the Internet try to combine your Antivirus with Firewall, Anti-spamming, etc. 
Once Lagkah 2.Langkah-Infected 
o  Detection and determine roughly where the source of the virus if the  diskette, network, email, etc., if you are connected to the network then  there is a good idea to isolate your computer first (either by  unplugging or disabling of the control panel) o Identify and classify what type of virus that attacks your pc, by the way: - The symptoms, such as: messages, files are corrupted or lost, etc. - Scan with your antivirus, if you are hit while walking Autoprotect vius  definition in the computer means you do not have data of this virus,  try to update manually, or download a virus definitionnya for your  install. If the virus is blocking your attempt to update it, try to use other media (computer) with the latest antivirus updatean. o  Clean up after you successfully detected and recognized it immediately  try to find ways of removal or to destroy it at sites that provide  information on the progress of the virus. It's if the latest antivirus updates you do not succeed destroy it.  
 
 
No comments:
Post a Comment