Download Using this User`s Manual

Transcript
Chapter 2 – Introduction to Computer Viruses
Some viruses act very quickly, while others are set to go off at a certain time. Some
merely content themselves with spreading to other disks and volumes, but all
system viruses can potentially cause damage.
Trojan Horses
The name Trojan Horse comes from an episode in the war that opposed the Greeks
and the city of Troy, several millennia ago. The Greeks built a huge, hollow
wooden horse and gave it to the Trojans, apparently as a gift, before supposedly
sailing away and ending the war. While some of the Trojans were skeptical about
it, the horse was taken inside their stronghold. That night, Greek warriors emerged
from the horse, opened the city gates, and Greek soldiers from outside stormed the
city.
It is obvious that the Trojans were never told not to open attachments. The Trojan
horses that we are worried about are programs that look innocent and claim to do
a certain task, but actually contain malicious code or viruses. In many cases, Trojan
horses can be even more dangerous than other viruses. Some examples are
ChinaTalk, which looks like a system extension but deletes folders, or the famous
MacMag Trojan, which infected System files.
Worms
Worms are one of the oldest forms of viral programs on computers. They spread
by methods other than attaching themselves to files and applications, and can be
very difficult to find. One of the most serious worms on the Macintosh, called the
AutoStart worm, created invisible files that could destroy data and files.
Intego VirusBarrier X4 User's Manual
Page 19