A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the .. Računalni je virus mali softverski program koji se širi s jednog računala na drugo i ometa rad računala. Računalni virus može oštetiti ili izbrisati. Koliko virusi mogu biti opasni, govori i slučaj iz godine kada je kompjuterski virus Staksnet napravio haos u svetu i uspeo da ugrozi i iranski nuklearni.
|Published (Last):||16 March 2016|
|PDF File Size:||2.71 Mb|
|ePub File Size:||11.37 Mb|
|Price:||Free* [*Free Regsitration Required]|
Event occurs at 32 minutes. Archived from the original on 20 December Burger, Ralf 16 February . Retrieved 24 July False positives can be disruptive, especially in a commercial environment, because it may lead to a company instructing staff not to use the company computer system until IT services kompjutedski checked the system for viruses. If the recipient, thinking the link is from a friend a trusted source follows the link to the website, the virus hosted at the site may be able to infect this new virsi and continue propagating.
The first kompjutsrski work on the theory of self-replicating computer programs  was done in by John von Neumann who gave lectures at the University of Illinois about the “Theory and Organization of Complicated Automata “.
For example, an executable may be created and named “picture. This kompjutsrski the actual work of the virus, where the “payload” will be released. To avoid being detected by emulation, some viruses rewrite themselves completely each time they are to infect new executables.
Software development strategies that produce large numbers of “bugs” will generally also produce potential exploitable “holes” or “entrances” for the virus.
Archived from the original on September 7, This is the latest accepted revisionreviewed on 15 December Retrieved June 10, A macro virus or “document virus” is a virus that is written in a macro languageand embedded into these documents so that when users open the file, the virus code is executed, and can infect the user’s computer.
Many websites run by antivirus software companies provide free online virus scanning, with limited “cleaning” facilities after all, the purpose of the websites is to sell antivirus products and services.
Virus Test Center, University of Hamburg. Pritisnite OK da biste nastavili ili Cancel da biste ostali na trenutnoj stranici.
In order to avoid detection by users, some viruses employ different kinds of deception. The disadvantage of this detection method is that users are only protected from viruses that are detected by signatures in their most recent virus definition update, and not protected from new viruses see ” zero-day attack “.
The virus program has managed to access the target user’s computer or software, but during this stage, the virus does not take any action. The Gammima virus, for example, propagates via removable flash drives.
Foundations of Computer Security. Antivirus Tools and Techniques for Computer Systems. Basic Concepts and Solved Exercises. Just like regular encrypted viruses, a polymorphic virus infects files with an encrypted copy of itself, which is decoded by a decryption module. Archived from the original on July 4, This is due to Microsoft’s large market share of desktop computer users.
A virus may also send a web address link as an instant message to all the contacts e.
Computer virus – Wikipedia
United Kingdom – English. Different antivirus programs use different “signatures” to identify viruses. Archived copy as title CS1 maint: Archived PDF from the original on 23 October Retrieved 2 September See polymorphic code for technical detail on how such engines operate. The triggering phase can be caused by a variety of system events, including a count of the number of times that this copy of the virus has made copies of itself. Kliknite Open File Location Otvori mjesto datoteke.
A dormant virus moves into this phase when it is activated, and will now perform the function for which it was intended. This will make it more likely that the detection by the virus scanner will be unreliable, and that some instances of the virus may be able to avoid detection.
Retrieved June 21, Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for so-called virus signatures. Microsoft’s System File Checker improved in Windows 7 and later can be used to check for, and ko,pjuterski, corrupted system files. Retrieved September 4, Mark Russinovich November