Continued from page 1
So if I were you, I’d click on View on
toolbar in your Outlook or Outlook Express and close
preview pane. (You have to click on View and then Layout in Outlook Express.)
On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike,
classic viruses, they attack
machine itself rather than individual files.
Worms sit in your working memory, or RAM, Nachenberg said.
OK, so we’ve talked about how
viruses get into a computer. How do they cause so much damage once they’re there?
Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to
example of
virus that initially infects your Microsoft Word program.
Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect. This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.
Often
destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said.
There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment –
reason virus writers would want to waste their time creating viruses in
first place.
The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of
virus-writing population has other intentions in mind.
For these other intentions, we first need to explain
“backdoor” concept.
The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once
virus writer receives
signal, they can use and abuse your computer to their own likings.
Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.
Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in
Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate.
Now back to
real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want
feds on his case. So he instructs
viruses on
various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.
OK, so
virus writers now control these computers. What will they use them for? One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.
That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If
authorities could track down
original senders of spam, they could crack down on spam itself. Spam senders don’t want that.
Ever heard of phishing emails? Those are
ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sent
same way spam is sent, by sending them via innocent computers.
Of course makers of anti-virus software use a variety of methods to combat
onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.
Signature scanning is similar to
process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match
code in it with similar code in your computer. When it finds such virus code, it lets you know!
©2004 by Kara Glover

Kara Glover is a Computer Tutor and Troubleshooter. You can find her articles and tutorials on topics such as Microsoft Word®, Excel®, and PowerPoint® on her website: http://www.karathecomputertutor.com