From the early viruses, created as experiments in the 1980s, for the latest malicious code, one of the biggest worries for all computer users is the threat of viruses entering their systems. To prevent viruses from entering a system, there are basically just two options. The first of these is to place a protective "bubble" in the computer site. This in practice means that the car isolation, disconnected from the Internet or any other network, does not use any floppy disks, CD-ROMs or other removable disks. That way you can be sure you will not get the virus on your computer. The second option is to install an antivirus program. These are designed to give you peace between you and the viruses.
An antivirus program is no more than an information analysis system and then, if it finds something is infected, it erases it. Information is scanned (or scanned) in different ways depending on where it comes from.
The information is in the "Source system" (Open Source) and must reach "System Destination". The information system interpretation differs depending on whether it is implemented in the operating systems, in all particular requests or mechanisms are needed. The interpretation mechanism should be specific to any operating system or component in which the antivirus will be implemented. For example, in Windows 9x, a virtual VxD which Anti-Virus is used, which constantly monitors disk activity. Antivirus products that are not specifically designed for operating systems, but apply to other applications, have a different interpretation mechanism. For example, in an Antivirus for Firewalls CVP, the firewall that provides antivirus information to scan it via the CVP protocol and in the sendmail antivirus, the MilterAPI filter facilitates information interpretation. Sometimes an interpretation mechanism is not provided by antivirus (such as a VxD) or application (such as CVP). In this case, special applications between application and antivirus should be used. In other words, sources that capture information and pass it into antivirus, offering full integration in order to disinfect viruses. Once the information is scanned, or using methods, if a threat has been detected, two operations are performed:
1. Cleared information is returned to the interpretation mechanism, which in turn will return to the system so that it can proceed to its final destination. This means that if an email was being received, the message will allow up to MailBox.
2. A warning is sent to the user interface. This user interface may vary greatly. In an antivirus for workstations, a message may be displayed on the screen, but in an alarm server solution can be sent as an e-mail message, an internal network message, an entry to an activity report, or as a message type to antivirus management tool. As you can see, antivirus programs do not perform miracles, nor is it a software tool that you need to be careful about. It is a very simple security ally that provides precision and advanced technology. Consider this when copying several MB (megabytes) to your computer's hard disk, the antivirus that is being copied to HDD files scans more than 65,000 viruses without affecting the normal functioning of the computer and without understanding the user.
No comments:
Post a Comment