A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the .. Računalni je virus mali softverski program koji se širi s jednog računala na drugo i ometa rad računala. Računalni virus može oštetiti ili izbrisati. Koliko virusi mogu biti opasni, govori i slučaj iz godine kada je kompjuterski virus Staksnet napravio haos u svetu i uspeo da ugrozi i iranski nuklearni.

Author: Kikora Jusho
Country: Malawi
Language: English (Spanish)
Genre: Love
Published (Last): 15 March 2015
Pages: 71
PDF File Size: 11.51 Mb
ePub File Size: 9.45 Mb
ISBN: 637-6-90539-764-4
Downloads: 8155
Price: Free* [*Free Regsitration Required]
Uploader: Mezitilar

In other projects Wikimedia Commons.

Kompjuterski Virusi

Retrieved November 28, The vast majority of viruses target systems running Microsoft Windows. They can cause data lost and file corruption and need to be treated as soon as possible.

United Kingdom – English. COM filesdata files such as Microsoft Word documents or PDF filesor in the boot sector of the host’s hard drive or some combination of kompjutrrski of these.

Sprječavanje i uklanjanje virusa i drugog zlonamjernog softvera

Archived from the original on 24 May Most of these viruses are written in the scripting languages for Microsoft programs such as Microsoft Word and Microsoft Excel and spread throughout Microsoft Office by infecting documents and spreadsheets. Since these would be symmetric keys, stored on the infected host, it is entirely possible to decrypt the final virus, but this is probably not required, since self-modifying code is such a rarity that it may be reason for virus scanners to at least “flag” the file as suspicious.

While virus infected files may be accidentally sent as email attachmentsemail viruses are aware of email system functions. This computer is infected by spyware and adware. Security software can then be used to check the dormant operating system files.

The work of von Neumann was later published as the “Theory of self-reproducing automata”. This approach does not fool antivirus softwarehowever, especially those which maintain and date cyclic redundancy checks on file changes. Wikimedia Commons has media related to Computer viruses. Until floppy disks fell out of use, this was the most successful infection strategy and boot sector viruses were the most common in the “wild” for many years. Archived from the original on 17 December For example, a virus can be programmed to mutate only slightly over time, or it can be programmed to refrain from mutating when it infects a file on a computer that already contains copies of the virus.


Archived PDF from the original on Event occurs at 32 minutes. Just like regular encrypted viruses, a polymorphic virus infects files with an encrypted copy of itself, which is decoded by a decryption module.

Real World Linux Security: Retrieved April 12, Crna Gora – Srpski.

Computer virus – Wikipedia

Secrets of Reverse Engineering. Archived copy as title CS1 maint: Solomon 17 November Archived from the original on January 17, The first one to appear on the Commodore Amiga was a boot sector virus called SCA viruswhich was detected in November Ransomware and phishing scam alerts appear as press releases on virusj Internet Crime Complaint Center noticeboard.

A better term would be “search strings “. Many common applications, such as Microsoft Outlook and Microsoft Wordallow macro programs to be embedded in documents or emails, so that the programs may be run automatically when the document is opened.

Computer virus

Some old viruses, especially on the DOS platform, make sure that the “last modified” date of a host file stays the same when the file is infected by the virus. Computer and network surveillance Operation: And there’s a clear pattern here which suggests an analogy to an infectious disease process, spreading from one resort area to the next.

To enable polymorphic code, the virus has to have a polymorphic engine also called “mutating engine” or ” mutation engine” somewhere in its encrypted body. Burger, Ralf 16 Kompjuterdki []. Granneman, Scott 6 October The virus will eventually be activated by the “trigger” which states which event will execute the virus, such as a date, the komljuterski of another program or file, the capacity of the disk exceeding some limit or the user taking a certain action e.


Gunn under the title “Use of virus functions to provide a virtual APL interpreter under user control” in A virus may also send a web address link as an instant message to all the contacts e. Inlarger websites used part of the Win This is the actual work of the virus, where the “payload” will be released.

InFred Cohen published a demonstration that there is no algorithm that can perfectly detect all possible viruses. The virus starts propagating, that is multiplying and replicating itself. Mark Russinovich November Bulletin board —driven software sharing contributed directly to the spread of Trojan horse programs, and viruses were written to infect popularly traded software.

A computer virus is a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code. Antivirus software also needs to be regularly updated in order to recognize the latest threats. Email virus — A virus that intentionally, rather than accidentally, uses the email system to spread. A second method to find viruses is to use a heuristic algorithm based on common virus behaviors.

Computer virus Comparison of computer viruses Computer worm List of computer worms Timeline of computer viruses and worms.

Shareware and bootleg software were equally common vectors for viruses on BBSs. In the s, as computers and operating systems grow larger and more complex, old hiding techniques need to be updated or replaced.