1 / 10

The Utility Programs:

The Utility Programs:. The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed by the utility software: Detecting and removing the computer Virus Disk Management Disk Formatting Disk De-fragmentation

nora
Télécharger la présentation

The Utility Programs:

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. • Tasks performed by the utility software: • Detecting and removing the computer Virus • Disk Management • Disk Formatting • Disk De-fragmentation • Scanning the disk • Disk Partitioning • Disk cleanup • Changing the file system of Hard disk

  2. Diagnosing the problems or errors in the system • Screen beautification • Recovering the lost data • Data compression and decompression • Sorting and merging data • Data conversion • Backing up and restoring the data • Accelerating down loading speed on internet

  3. Types of Utility Software: • Antivirus Toolkit • Disk Management utilities • Diagnostic software • Data recovery software • Compression and decompression software • Sort and merge utilities • Backup Utility • Text Editors

  4. Computer Virus Def: It is illegal set of instructions/program which is illegally copied to the system and destroy the system data and software.

  5. Sources of Viruses • Computer networks(LANs) • Internet • Spams/emails • Use of Pirated software • Use of portable I/O devices (FDD/CD/USB) • Infected applications & files

  6. Controls for Virus Infection • Implementation of licensed antivirus software • Regularly update virus definitions • System security policies should be formulated and announced • Restriction on use of portable devices • Use of corporate emails accounts • Avoid unidentified emails • Use only copy right softwares

  7. Types of viruses • Boot Sector Virus • Macro Virus • Trojan Horse Virus • Memory Resident Viruses • RootKit Viruses • Email Virus • Worms • Logic Bombs • Polymorphic viruses

  8. Trojan Horse: A trojan horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.Worms:A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail.

  9. Boot sector Virus: A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup. These are normally spread by floppy disks. Macro Virus:Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents.Memory Resident Viruses:Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes. Rootkit Virus: A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term rootkit comes from the linux administrator root user. These viruses are usually installed by trojans and are normally disguised as operating system file

  10. Polymorphic Viruses:A polymorphic virus not only replicates itself by creating multiple files of itself, but it also changes it's digital signature every time it replicates. This makes it difficult for less sophisticated antivirus software to detect.Logic Bombs/Time Bombs: These are viruses which are programmed to initiate at a specific date or when a specific event occurs. Some examples are a virus which deletes your photos on Halloween, or a virus which deletes a database table if a certain employee gets fired.

More Related