A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the .. Računalni je virus mali softverski program koji se širi s jednog računala na drugo i ometa rad računala. Računalni virus može oštetiti ili izbrisati. Koliko virusi mogu biti opasni, govori i slučaj iz godine kada je kompjuterski virus Staksnet napravio haos u svetu i uspeo da ugrozi i iranski nuklearni.

Author: Voodooramar Tuk
Country: Italy
Language: English (Spanish)
Genre: History
Published (Last): 26 November 2009
Pages: 181
PDF File Size: 17.42 Mb
ePub File Size: 2.62 Mb
ISBN: 893-5-62290-580-1
Downloads: 23771
Price: Free* [*Free Regsitration Required]
Uploader: Brazshura

This is the latest accepted revisionreviewed klmpjuterski 15 December Different antivirus programs will employ different search strings, and indeed different search methods, when identifying viruses.

Kompjuterski Virusi

Retrieved November 28, Real World Linux Security: Retrieved 16 June Uses authors parameter link CS1 maint: On its 50th use the Elk Cloner virus would be activated, infecting the personal computer and displaying a short poem beginning “Elk Cloner: In the s, as computers and operating systems grow larger and more complex, old hiding techniques need to be updated or replaced. They generally target a specific type of email system Microsoft’s Outlook is the most commonly usedharvest email addresses from various sources, and may append copies of themselves to all email sent, or may generate email messages containing copies of themselves as attachments.

The term “virus” is also commonly, but erroneously, used to refer to other types of malware. Computer virus Comparison of computer viruses Computer worm List of computer worms Timeline of computer viruses and worms.


Computer virus – Wikipedia

Kliknite Free Download Besplatno preuzimanje. The work of von Neumann was later published as the “Theory of self-reproducing automata”. Defending a computer against viruses may demand that a file system migrate towards detailed and explicit permission for every kind of file access.

The virus program has managed to access the target user’s computer or software, but during this stage, the virus does not take any action. This is due to Microsoft’s large market share of desktop computer users.

Foundations of Computer Security. Archived from the original on 24 May Archived from the original on September 7, In response, free, open-source antivirus tools have been developed, and an industry of antivirus software has cropped viruai, selling or freely distributing virus protection to users of various operating systems.

An example of a virus that does this is CiaDoor. It may be possible to recover copies of essential user data by booting from a live CDor connecting the hard drive to another computer and booting from the second computer’s operating system, taking great care not to infect that computer konpjuterski executing any infected programs on the original drive.

At said times, the executable will decrypt the virus and execute its hidden runtimesinfecting the computer and sometimes disabling the antivirus software.

United Kingdom – English. Some old viruses, especially on the DOS platform, make sure that the “last modified” date of a host file stays the same when the file is infected by the virus. This is the actual work of the virus, where the “payload” will be released.


However, antivirus professionals do not accept the concept of “benevolent viruses”, as any desired function can be implemented without involving a virus automatic compression, for instance, is available under the Windows operating system at the choice of the user.

Upper Saddle River, NJ: Polymorphic code was the first technique that posed a serious threat to virus scanners.

It can be destructive such as deleting files on disk, crashing the system, or corrupting files or relatively harmless such as popping up humorous or political messages on screen.

There are two common methods that an antivirus software application uses to detect viruses, as described in the antivirus software article. A second method to find viruses is to use a heuristic algorithm based on common virus behaviors.

Computer virus

Trojanac je zlonamjerni softverski program koji se krije unutar drugih programa. Resident viruses overwrite interrupt handling code or other functionsand when the operating system attempts to access the target file or disk sector, the virus code intercepts the request and redirects the control flow to the replication module, infecting the target.

The art of computer virus research and defense.