News:

This week IPhone 15 Pro winner is karn
You can be too a winner! Become the top poster of the week and win valuable prizes.  More details are You are not allowed to view links. Register or Login 

Main Menu

Most commonly used Security Techniques against viruses.

Started by Sunite, October 03, 2007, 08:46:05 PM

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

Sunite

Most commonly used Security

Techniques against viruses.



/>





 




Virus detection and its

removal are mode through an antivirus or with

some other security program. Different antivirus

programs are available in the market and over

Internet. The most common and famous security

technique against viruses is as under:


/>Virus Signature/ Virus Definition


/>Virus signature is a known pattern of code of

a code of a virus program; this pattern is used

by antivirus program to detect viruses and then

to remove these viruses. You should update virus

definition continuously by downloading updates

from Internet. This ensures that your antivirus

is always able to detect changing viruses.

/>
Inoculation

Inoculation file

is separate file created and maintained by

antivirus program to record information like

file size and file creation date. This

information later on is used for virus detection

and removal.


Quarantine

/>
Quarantine is a separate area on a hard

disk. It contains the infected files and folders

that cannot be cleared or deleted by antivirus

due to some reason, for example sharing

violation or unknown virus for that antivirus.



Recovery Disk

Recovery

disk is a removable disk that holds un-infected

system commands and startup information. In case

the boot record of actual hard disk fails, this

recovery disk can be used to start the computer.

Afterwards an antivirus program can be used to

remove the virus.

Un-authorized

access

Accessing a computer system

without the knowledge or permission of its user

is called unauthorized access. It is always

recommended to restrict computer resources with

the help of usernames and passwords. These are

unique combination of characters to identify

users and their secret codes respectively.

/>
Firewall

Firewall is a

security system consisting of hardware and

software to prevent unauthorized access of a

network or computer. Big companies use a

separate computer firewall software or hardware

to protect their date from unauthorized access.

Firewall check outgoing and incoming traffic and

manage data access to the authorized users only.



Biometric Devices

A

biometric device reads personal characteristics

like fingerprints hand structure, facial

features, and voice recognition to authenticate

a user for any further access to a computer

system or other peripheral devices. A biometric

device translates the personal characteristics

into digital code that is matched to already

store user data in that system. If the digital

data matches with any of the stored data, it

gives access to the person. In case of no match,

the access is denied.

 

/>