Hacking+and+Computer+Viruses

__Hacking and Viruses__  __What are computer viruses?__

 Computer viruses are programs written by "mean" people. These virus programs are placed into a commonly used program so that program will run the attached virus program as it boots, therefore, it is said that the virus "infects" the executable file or program.

A virus is inactive until you execute an infected program or application or start your computer from a disk that has infected system files. Once a virus is active, it loads into your computer's memory and may save itself to your hard drive or copies itself to applications or system files on disks you use.

Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or even erasing your entire hard drive. Many viruses do nothing more than display a message or make sounds / verbal comments at a certain time or a programming event after replicating themselves to be picked up by other users one way or another. Other viruses make your computer's system behave erratically or crash frequently. Sadly many people who have problems or frequent crashes using their computers do not realize that they have a virus and live with the inconveniences. .



__What is hacking?  __

Hacking involves unauthorised access to computer systems, usually by finding out or breaking passwords. Once into a computer system a hacker can do an enormous amount of damage. Stand-alone computers are less of a risk as the damage is limited to just that computer. Computers which form part of a network or those with external links, such as attached modems, are at greater risk as they can be accessed from other computers.

__The measures that must be taken in order to protect against hacking and Viruses __

__Hacking: __  - Using user Ids (user identification) and passwords - Blocking external access - external hackers can be blocked by disconnecting modems from the telephone line when not being used. - Systems with permanent phone connections need special software called a 'firewall' to try and prevent unauthorised access over networks and the Internet. - Physically making a computer or network difficult to access - by keeping individual computers in secure areas and blocking access to removable media so data cannot easily be copied. - Encryption - this involves transforming the data so that it is unreadable without a digital key. Encrypted data is therefore meaningless if it is accessed or intercepted. It is particularly important to encrypt data transferred over wireless networks because the data is so easy to intercept.



__ Computer viruses: __  Anti-virus software <span style="color: black; font-family: Arial; font-size: 10pt; msoansilanguage: EN-GB; msobidilanguage: AR-SA; msofareastfontfamily: Calibri; msofareastlanguage: EN-US; msofareastthemefont: minor-latin;"> is usually required to detect and then destroy them but it is important to have regular updates to deal with new viruses. The anti-virus software scans the files on a computer looking for any viruses which it then removes and alerts the user. <span style="font-family: Arial; font-size: 10pt; mso-ansi-language: EN-GB; mso-bidi-font-weight: bold; mso-fareast-font-family: Calibri;"> Protecting floppy disks <span style="color: black; font-family: Arial; font-size: 10pt; mso-ansi-language: EN-GB; mso-fareast-font-family: Calibri; msoansilanguage: EN-GB; msoansilanguage: EN-GB; msobidilanguage: AR-SA; msofareastfontfamily: Calibri; msofareastfontfamily: Calibri; msofareastlanguage: EN-US; msofareastthemefont: minor-latin; msofareastthemefont: minor-latin;"> - The 'write-protection' hole in the corner of the floppy disk can be kept covered to prevent accidental wiping of the disk or the introduction of viruses. <span style="font-family: 'Comic Sans MS'; font-size: 12pt; msobidifontfamily: 'Times New Roman'; msofareastfontfamily: 'Times New Roman'; msofareastlanguage: EN-GB;"><span style="font-family: 'Arial','sans-serif'; font-size: 14pt; line-height: 115%; mso-ansi-language: EN-GB; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">__To reduce the risk:__ <span style="font-family: 'Arial','sans-serif'; font-size: 10pt; line-height: 115%; mso-ansi-language: EN-GB; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"> <span style="font-family: 'Arial','sans-serif'; font-size: 12pt; line-height: 115%; mso-ansi-language: EN-GB; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><span style="msobidifontfamily: 'Times New Roman'; msofareastfontfamily: 'Times New Roman'; msofareastlanguage: EN-GB;"> <span style="font-family: Arial; font-size: 10pt; mso-ansi-language: EN-GB; mso-fareast-font-family: Calibri;">- Install a virus protection program and keep it up-to-date! -Never open an email attachment that comes from someone unknown or is not clearly explained in the email message that it is attached to.! -Keep the write-protection hole covered on floppy disks that are used to store original "clean" programs - so they can be reinstalled with confidence. -Be careful of the websites you visit and the hyperlinks you click on. Many websites are designed to trick visitors into downloading viruses or spyware by offering free downloads. If you are unsure of a hyperlink, always hover over it with the mouse before clicking so you can see where it will take you to. <span style="msobidifontfamily: 'Times New Roman'; msofareastfontfamily: 'Times New Roman'; msofareastlanguage: EN-GB;">- Never use a floppy disk of memory stick given to you from an untrustworthy source or pass floppy disks around between your friends.