EXERCISE 10

Discuss the following questions in class.

puter society thinks that Intel company, the most powerful CPU producer, has an agreement with Microsoft corporation that the letter will develop more sophisticated, large and demanding software to force users to buy new processors and upgrade their computers. Do you think this might be true? How does this suggestion correlate with Windows 2000 and Microsoft Office 2000? Do you think that Bill Gates’ monopoly on Windows operating systems is very dangerous for the competition and price-making process?

2. Ask anyone in your group who has a computer if Windows 98 is better than Windows 2000? Why and why not?

UNIT III

COMPUTER VIRUSES

Text I

What We Call aComputer Virus


EXERCISE 1

Read and translate the text.

The word “virus” is used in the same sense as the biological equivalent to describe all kinds of malware (malicious software), including worms or Trojans. A computer virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the user. A true virus must replicate itself, and must execute itself. A computer virus will pass from one computer to another like a real biological virus passes from person to person. For example, it is estimated by experts that the Mydoom worm infected a quarter-million computers in a single day in January 2004. There are tens of thousands of viruses out there, and new ones are discovered every day. Here is the classification of basic types of viruses.

НЕ нашли? Не то? Что вы ищете?

Viruses can be subdivided into a number of types, the main ones being: Boot sector viruses, Companion viruses, Email viruses, Logic bombs and time bombs, Macro viruses.

Two other types of malware are often classified as viruses, but are actually forms of distributing malware: Trojan horses and Worms.

A boot sector virus affects the boot sector of a hard disk, which is a very crucial part. The boot sector is where all information about the drive is stored, along with a program that makes it possible for the operating system to boot inserting its code into the boot sector, a virus guarantees that it loads into memory during every boot sequence. A boot virus does not affect files; instead, it affects the disks that contain them. During the days when programs were carried around on floppies, the boot sector viruses used to spread like wildfire. However, with the CD-ROM revolution, it became impossible to infect pre-written data on a CD, which eventually stopped such viruses from spreading. Examples of boot viruses are Polyboot. B and AntiEXE.

Multipartite viruses are a combination of boot sector viruses and file viruses. These viruses come in through infected media and reside in memory. They then move on to the boot sector of the hard drive. From there, the virus infects executable files on the hard drive and spreads across the system. There aren’t too many multipartite viruses in existence today, but in their heyday, they accounted for some major problems due to their capacity to combine different infection techniques. A significantly famous multipartite virus is Ywinz.

A logic bomb employs code that lies inert until specific conditions are met. The resolution of the conditions will trigger a certain function (such as printing a message to the user and/or deleting files). Logic bombs may reside within standalone programs, or they may be part of worms or viruses. An example of a logic bomb would be a virus that waits to execute until it has infected a certain number of hosts. A time bomb is a subset of logic bomb, which is set to trigger on a particular date and/or time. An example of a time bomb is the infamous ‘Friday the 13th’ virus.

Macro Viruses infect files that are created using certain applications or programs that contain macros. These include Microsoft Office documents such as Word documents, Excel spreadsheets, PowerPoint presentations, Access databases, and other similar application files such as Corel Draw, AmiPro, etc. Since macro viruses are written in the language of the application, and not in that of the operating system, they are known to be platform-independent—they can spread between Windows, Mac, and any other system, so long as they’re running the required application. With the ever-increasing capabilities of macro languages in applications, and the possibility of infections spreading over net-works, these viruses are major threats. The first macro virus was written for Microsoft Word and was discovered back in August 1995. Today, there are thousands of macro viruses in existence—some examples are Relax, Melissa. A and Bablas.

The only function of Trojans is to destroy and delete files. They can automatically delete all the core system files on your machine. The Trojan could be controlled by the attacker or could be programmed to strike like logic bomb-starting on a specific day or at specific hour. Trojans are aimed to generate a lot of internet traffic on the victim’s machine, to the extent that the Internet connection is too overloaded to let the user visit a website or download anything. They infect as many machines as possible and simultaneously attack specific e-mail addresses with random subjects and contents that cannot be filtered.

Computer Worms are programs that reproduce and run independently, and travel across network connections. The main difference between viruses and worms is the method in which they reproduce and spread. A virus is dependent upon a host file or boot sector, and the transfer of files between machines to spread, while a worm can run completely independently and spread of its own accord through network connections. The security threat of worms is equivalent to that of a virus. Worms are capable of doing a whole range of damage such as destroying essential files in your system, slowing it down to a great extent, or even causing some essential programs to crash. Two famous examples of worms are the MS-Blaster and Sesser worms.

EXERCISE 2

Learn the following words and expressions.

Malware (malicioussoftware) – поражающиевирусомпрограммы

malicious – злонамеренный, злокозненный

malevolent  - недоброжелательный

crucial – значительный, ключевой

tobootup – загружаться, выполнять начальную загрузку

spreadlikewildfire - распространяться со сверхъестественной быстротой

toreside – обитать, пребывать

intheirheyday – в зените славы, расцвета

topropagate – распространяться

notorious - пользующийся дурной славой; печально известный; пресловутый;

vulnerable – уязвимый

dormant – дремлющий, потенциальный, скрытый

topinpoint – указать точно, засечь

breed – племя

a generic term – общееназвание

in common parlance - впросторечии

benign -  добрый, милостивый

perse - сам по себе, по существу

EXERCISE 3

Answer the questions after reading the text.


    What viruses do you know? Where is the word ‘virus’ derived from? Do you know its plural form? Have you ever experienced destroying activity of any virus? Make a list of damages caused by viruses. What anti-virus programme do you have in your computer? Do you find it safe enough?

EXERCISE 4

Words can combine to make new compound words. Look at the examples. Then make as many compounds as you can combining a word from A with a word from B. Check the meaning.

Example: a computer program; an E-mail address


A

B

computer

program

E-mail

address

companion

file

bomb

spreadsheets

time

Logic

sector

databases

boot

data

loss

reformatting

system

new-age

crash

application

Excel

Access

browser

memory

web

hard disk

virus

software

Macro

EXERCISE 5

Look through the text about viruses again. Write questions to the answers.

____________________________________ ?

a. To replicate itself and execute itself.

____________________________________ ?

b. Like a real biological virus.

____________________________________ ?

c. In January, 2004.

____________________________________ ?

d. Trojan horses and worms.

____________________________________ ?

e. It doesn’t affect files.

____________________________________ ?

f. A combination of boot sector viruses and file viruses.

____________________________________ ?

g. It lies inert until specific conditions are met.

____________________________________ ?

h. ‘Friday the 13th’ virus.

____________________________________ ?

i. They are known to be platform-independent.

_ ___________________________________ ?

j. To destroy and delete files.

____________________________________ ?

k. It is the method in which they reproduce and spread.

EXERCISE 6

Open brackets. Use the correct form of an adverb (Present Participle or Past Participle).

A computer virus is a computer program (written/writing) to alter the way a computer operates. Multipartite viruses come in through (infected/infecting) media and reside in memory. With the (increased/increasing) capabilities of macro languages in applications, macro viruses are major threats. The user often finds the banners (annoying/annoyed). Trojans can also open back doors so that computer hackers can gain access to passwords and other personal information (storing/stored) on a computer. The first PC virus was a boot sector virus (calling/called) (c)Brain, created in 1986 by two brothers, Basit and Amjad Farooq Alvi from Pakistan. Traditional computer viruses emerged in the 1980s, (driven/driving) by the spread of personal computers. If a user tries to start an (infecting/infected) program, the virus code may be executed first. Some viruses try to avoid detection by killing the tasks (associated/associating) with antivirus software before it can detect them. As computers and operating systems grow larger and more complex, old hiding techniques need to be (updated/updating) or (replaced/replacing).

EXERCISE 7

Из за большого объема этот материал размещен на нескольких страницах:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42