You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
y Skaife, Kurtis J<br />
Computer Viruses<br />
A computer virus finds its way on to your computer hidden in a seemingly innocuous program. The virus is<br />
harmless until one opens the file or runs the program containing the virus. The virus's effects can range from<br />
simply annoying to malicious, damaging your hardware, software or files. The virus can easily spread to other<br />
computers when one unknowingly sends infected attachments.<br />
Computer Worms<br />
A worm is similar to a virus but unlike a virus, a worm can replicate and spread without the computer's operator<br />
opening the infected file. Once on a computer, a worm can make and send out hundreds of thousands of copies of<br />
itself. One way the worm can infect others is by sending itself to every address in your email, the process will<br />
then repeat itself from those computers. Worms often eat up a lot of a computer's memory or a network's<br />
bandwidth. A worm can also allow others to control your computer from afar.<br />
Trojan Horse<br />
A Trojan Horse will appear to be useful software but once installed, it will begin infecting a computer. The<br />
Trojan Horse may simply be annoying such as changing the computer's icons, but it may be more harmful by<br />
deleting files and information from the computer. A Trojan Horse often opens a backdoor in the computer<br />
allowing unauthorized access to the computer including sensitive information that can be found.<br />
Prevention<br />
To protect a computer one should frequently update the operating system and have anti-virus software<br />
installed. The software should be updated frequently as well so that it can protect the computer from the latest<br />
versions of viruses and worms. Using a firewall is also a good idea, this can be in the form of hardware or<br />
software. The firewall is another line of defense from viruses and can prevent an unauthorized user from gaining<br />
access to a computer.<br />
13