KOMPJUTERSKI VIRUSI PDF

A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the .. Računalni je virus mali softverski program koji se širi s jednog računala na drugo i ometa rad računala. Računalni virus može oštetiti ili izbrisati. Koliko virusi mogu biti opasni, govori i slučaj iz godine kada je kompjuterski virus Staksnet napravio haos u svetu i uspeo da ugrozi i iranski nuklearni.

Author: Aralkree Moogujin
Country: Albania
Language: English (Spanish)
Genre: Photos
Published (Last): 26 January 2011
Pages: 394
PDF File Size: 18.9 Mb
ePub File Size: 1.39 Mb
ISBN: 918-9-49467-722-2
Downloads: 47787
Price: Free* [*Free Regsitration Required]
Uploader: Majar

Anti-keylogger Antivirus software Browser security Internet security Mobile security Network security Defensive computing Firewall Intrusion detection system Data loss prevention software. Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for so-called virus vurusi. Fundamentals of Information Systems Security.

Uses authors parameter link CS1 maint: In the s, as computers and operating systems grow larger and more complex, old hiding techniques need to be updated or replaced. Before computer networks became widespread, most viruses spread on removable mediaparticularly floppy disks.

A computer virus is a type of malicious software that, when executed, replicates itself by kompjutefski other computer programs and inserting its own code. COM filesdata files such as Microsoft Word documents or PDF filesor in the boot sector of the host’s hard drive or some combination of all of these. Ina program called ” Elk Cloner ” was the first personal computer virus to appear “in the wild”—that is, outside the single computer or [computer] lab where it was created.

Retrieved from ” https: In order to avoid detection by users, some viruses employ different kinds of deception. Since these would be symmetric keys, stored on the infected host, it is entirely possible to decrypt the final virus, but this is probably not required, since self-modifying code is such a rarity that it may be reason for virus scanners to at least “flag” the file as suspicious. This is because malicious hackers and other individuals are always creating new viruses. Retrieved 23 May The virus places a copy of itself into other programs or into certain system areas on the disk.

  DVA 9965R PDF

To enable metamorphism, a “metamorphic engine” is needed.

Sprječavanje i uklanjanje virusa i drugog zlonamjernog softvera

Wikimedia Commons has media related to Computer viruses. Archived from the original on Kompjuterskl 6, Archived from the original on 24 May Retrieved June 10, The term “virus” is also commonly, but erroneously, used to refer to other types of malware. This is one of the reasons that it is dangerous to open unexpected or suspicious attachments in e-mails.

Idite na web-mjesto Microsoft Safety Scanner.

Computer virus – Wikipedia

This is the latest accepted revisionreviewed on 15 December On its 50th use the Elk Cloner virus would be activated, infecting the personal computer and displaying a short poem komjuterski “Elk Cloner: As software is often designed with security features to prevent unauthorized use of system resources, many viruses must exploit and manipulate security bugswhich are security defects in a system or application software, to spread themselves and infect other computers.

Until floppy disks fell out of use, this was the most successful infection strategy and boot sector viruses were the most common in the “wild” for many years. It can be destructive such as deleting files on disk, crashing the system, or corrupting files or relatively harmless such as popping up humorous or political messages on screen.

  HOW TO OUTSMART THE CREDIT BUREAUS PDF

Retrieved 16 April Burger, Ralf 16 February []. However, not all viruses carry a destructive “payload” and attempt to hide themselves—the defining characteristic of viruses is that they are self-replicating computer programs which modify other software without user consent.

A viable computer virus must contain a search routinewhich locates new files or new disks which are worthwhile targets for infection.

Retrieved November 28, They generally target a specific type of email system Microsoft’s Outlook is the most commonly usedharvest email addresses from various sources, and may append copies of themselves to all email sent, or may generate email messages containing copies of themselves as attachments. Crna Gora – Srpski.

Computer virus

Archived PDF from the original on 23 October Users would be required to click on a link to activate the virus, which would then send an email containing user data to an anonymous email addresswhich was later found to be owned by Larose. This page was last edited on 15 Decemberat Computer viruses for dummies in Danish.

The term computer virus, coined by Fred Cohen inis a misnomer.

Macro viruses have become common since the mids. Bulletin board —driven software sharing contributed directly to the spread of Trojan horse programs, and viruses were written to infect popularly traded software.