Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2





НазваниеПрограмма по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2
страница7/19
Дата публикации19.01.2014
Размер0.54 Mb.
ТипУчебник
100-bal.ru > Информатика > Учебник
1   2   3   4   5   6   7   8   9   10   ...   19

Elk Cloner


Elk Cloner was the first computer virus known to have (1) … in the wild. In 1982, Richard Skrenta, then fifteen years old, wrote the virus for the Apple II operating system, which was (2) … on floppy diskettes. When a computer (3) … from a floppy disk (4) … with Elk Cloner, the virus would start, and would subsequently copy itself to any (5) … floppy disk that was (6) …. Because computers of that time had dual floppy disk drives, and because diskettes were often (7) … around among friends, the virus was frequently (8) …. After contagion, every 50th time that a computer booted up, it would display the following text:

Elk Cloner: The program with a personality

It will get on all your disks

It will infiltrate your chips

Yes it's Cloner!

It will stick to you like glue

It will modify ram too

Send in the Cloner!

Elk Cloner was not (9) … to cause damage, but was (10) … as a practical joke. According to WorldHistory.com, the adolescent Skrenta had a penchant for modifying programs so that they stopped working after some code-specified time period had (11) …, at that point displaying some joke text that Skrenta had written. Not surprisingly, the young programmer's friends grew leery of allowing him access to their diskettes. Elk Cloner's capacity to copy itself (the major criterion of a virus) made it possible for Skrenta to continue to annoy his friends without requiring physical access. The virus is (12) … to have spread widely among his fellow students (and also to his math teacher), thus ensuring Elk Cloner's place in history.

3. Find and correct ten grammar mistakes
Virus hoax

A virus hoax is a false warning about a computer virus. Typically, the warning arrive in a e-mail note or distributed through a note in a company's internal network. This notes are usually forwarded using distribution lists and they will typical suggest that the recipient forwards the note to other distribution lists.

If you got a message about a new virus, you can check them out by go to one of the leading Web sites that keep up with viruses and virus hoaxes. If someone sends you note about a virus that you learn is a virus hoax, reply to the sender that the virus warning is a hoax.

Ex. 4. Summarizing.

Compile a table which will illustrate the differences between virus types. In order to do it think of a number of columns that your table will have and choose relevant column headings.

Ex. 5. Reading and reporting.



Describe any existing virus, its code, the way it infects a program, its reproduction, trigger and payload routines.
As an example take the Chernobyl virus

Chernobyl virus


The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all computer data when an infected file is executed. Since many files are executed during computer use, the virus is able to spread quickly and infect those files. The Chernobyl virus is the first virus known to have the power to damage computer hardware. The activated viral strain attempts to erase the hard drive and overwrite the system's BIOS as well.

The virus was detected as early as 1998, but its payload was first triggered April 16, 1999 - which was the 13th anniversary of the disaster at the Chernobyl nuclear reactor. Although U.S. and European computer users were affected, especially students and some businesses, most of Chernobyl's damage was wrought in Asia and the Middle East. Chernobyl actually is a variant of a virus known as CIH, the initials for the alleged author of the virus, Chen Ing-hau, a Taiwanese computer engineering student). Some CIH variants activate on the 26th day of each month, while others do their damage on April 26 or June 26.

CIH is sometimes referred to as a "space filler virus," referring to its ability to clandestinely take up file space on computers and prevent anti-virus software from running.

Users of Windows 95 and Windows 98 are more susceptible to the risk of contracting the CIH virus. It is under these programs that the virus replicates and becomes active. Users of DOS, Windows 3.x, Windows NT, Windows 2000 or Macintosh are not considered at risk.


Ex.6. Discussion


Discuss weak and strong features of anti-virus software.
Ex.7. Listening

VIRUS PROTECTOIN

1) Listen to the recording and write down the main virus protection measures. Pay special attention the ones that have not been discussed in this unit yet.
RECUPERATION FROM A VIRUS ATTACK

2) Listen to a computer security expert talking about the measures that should be taken in enterprises in case of a virus attack. Make a list of steps mentioned in the recording. Take down as many details as you can.
Additional texts
The 25th Anniversary of the Virus (blog entry)
Don Reisinger notes that depending on what you count as a virus, it may actually be the 30th anniversary of the virus. I think it’s fair to say that it’s the 25th anniversary of viruses on PCs and leave it at that. For some virus history, be sure to check out VirusList’s history of malicious programs. Click through to the years (like the early 80s) to see the details. Also, Wikipedia has a timeline of notable viruses and worms.

The first PC virus was written by a 9th grader named Rich Skrenta. Interestingly, Rich recently stepped down as CEO of Topix.net. In an interview with Security Focus, Rich gave the details of why he invented a virus:

“I had always been mechanically curious, taking apart tube radios and telephones and wiring up O gauge Lionel train sets when I was young. When I got an Apple II in the 7th grade, I was in heaven. I had been playing jokes on schoolmates by altering copies of pirated games to self-destruct after a number of plays. I’d give out a new game, they’d get hooked, but then the game would stop working with a snickering comment from me on the screen (9th grade humor at work here)”.

Soon, classmates were getting wary of letting Skrenta near their disks. He needed a way to alter their floppies to contain his “booby traps” without physically being able to get his hands on them. “I hit on the idea to leave a residue in the operating system of the school’s Apple II. The next user who came by, if they didn’t do a clean reboot with their own disk, could then be touched by the code I left behind. I realized that a self-propagating program could be written, but rather than blowing up quickly, to the extent that it laid low it could spread beyond the first person to others as well. I coded up Elk Cloner and gave it a good start in life by infecting everyone’s disks I could get my hands on.”

Of course, if Rick hadn’t done it, someone else would have. Since the early 80’s viruses have become more sophisticated–and more sinister. Viruses are how botnets are created and secrets are stolen. Millions of dollars are spent every year combating them.

And fighting viruses isn’t easy. I sometimes get asked a question something like: “When will someone write a program that detects viruses perfectly?” The answer is “never,” unfortunately. Ford and Spafford talk about this in the Science paper: “Building a computer program that can tell with absolute certainty whether any other program contains a virus is equivalent to a famous computer science conundrum called the ‘halting problem.’” Simply (and somewhat imprecisely) stated, the halting problem says that it’s impossible to write a program that can look at other programs and determine whether or not they will halt or run forever. Alan Turing proved this in 1931. (Here’s a good discussion of the halting problem if you want to know more.)

Given the impossibility of detecting viruses with certainty, the best we can do are watch lists and heuristics. Not a comforting thought as computers become more and more important to our modern society.


Kaspersky: Mac and Linux viruses to rise ’significantly’ (blog entry)


According to security expert Eugene Kaspersky, we are at the brink of seeing a significant rise in malware attacks on Mac and Linux platforms. So, are hackers ready to target a broad range of platforms or is this merely hyperbole from a security firm that wants to sell products?

In the PC Pro interview, Kaspersky claims that the reason for the change in tactic on the part of the hackers is Vista's half-hearted reception. In the interview Kaspersky said:

Home users are not so loyal to the OS. Not many of them are satisfied with Microsoft Vista. Some Windows users will switch to other OSes. Microsoft will not lose its dominance, but it will be reduced a bit.

Kaspersky thinks that this shift away from Windows is enough to make Mac and Linux a more appealing target for hackers. What surprises me is that he doesn't quantify how big he thinks that the shift needs to be. Kaspersky also believes that open-source is a double-edged sword:

More people are watching open-source code, so they are more quick to find problems. If the people who make the fix are good guys, that's great; if they are bad guys, that's a problem.

Kaspersky also goes on to list other platforms, such as PlayStation 3 and smartphones, which could also be targets:

If there are viruses for the PlayStation 3, if the situation is such that we have to have protection for these devices, we will have products.

And:

This year they are going to introduce online banking through smartphones and Chinese hackers will turn to smartphone phishing.

While I have great respect and admiration for Kaspersky, I'm skeptical that there's going to be enough of a migration from Windows to Mac or Linux to make hackers all that interested in targeting these platforms. Unless there's a massive shift away from Windows – something which we're not seeing signs of at present, instead what we're seeing is consumers being more interested in XP than Vista – there's going to be more than ample supply of Windows-based victims for hackers. I just can't see the sense in hackers switching focus to Mac and Linux. It doesn't make business sense – and for today’s hackers hacking is business!

I get the impression from the interview that Kaspersky is very much in a brainstorming future products mode, or maybe the interview is partly a trial-balloon to see how the idea of security products for Mac and Linux are received …

… which is an interesting thought. Just how would Mac and Linux users feel about having to buy security software and then pay a subscription fee on top of that? Hmmm. Because so many Mac and Linux users already believe that their operating systems is secure (or maybe even impervious to malware!) this will make it a very hard sell indeed.


Microsoft's own antivirus fails to secure Vista
1   2   3   4   5   6   7   8   9   10   ...   19

Похожие:

Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2 iconПрограмма по формированию навыков безопасного поведения на дорогах...
Проектно-образовательная деятельность по формированию у детей навыков безопасного поведения на улицах и дорогах города
Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2 iconПрограмма по формированию навыков безопасного поведения на дорогах...
Цель: Создание условий для формирования у школьников устойчивых навыков безопасного поведения на улицах и дорогах
Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2 iconПрограмма по формированию навыков безопасного поведения на дорогах...
«Организация воспитательно- образовательного процесса по формированию и развитию у дошкольников умений и навыков безопасного поведения...
Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2 iconПрограмма по формированию навыков безопасного поведения на дорогах...
Цель: формировать у учащихся устойчивые навыки безопасного поведения на улицах и дорогах, способствующие сокращению количества дорожно-...
Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2 iconПрограмма по формированию навыков безопасного поведения на дорогах...
Конечно, главная роль в привитии навыков безопасного поведения на проезжей части отводится родителям. Но я считаю, что процесс воспитания...
Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2 iconПрограмма по формированию навыков безопасного поведения на дорогах...
Поэтому очень важно воспитывать у детей чувство дисциплинированности и организованности, чтобы соблюдение правил безопасного поведения...
Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2 iconПрограмма по формированию навыков безопасного поведения на дорогах...
Всероссийский конкур сочинений «Пусть помнит мир спасённый» (проводит газета «Добрая дорога детства»)
Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2 iconПрограмма по формированию навыков безопасного поведения на дорогах...
Поэтому очень важно воспиты­вать у детей чувство дисциплинированности, добиваться, чтобы соблюдение правил безопасного поведения...
Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2 iconПрограмма по формированию навыков безопасного поведения на дорогах...

Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2 iconПрограмма по формированию навыков безопасного поведения на дорогах...

Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2 iconПрограмма по формированию навыков безопасного поведения на дорогах...

Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2 iconПрограмма по формированию навыков безопасного поведения на дорогах...

Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2 iconПрограмма по формированию навыков безопасного поведения на дорогах...

Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2 iconПрограмма по формированию навыков безопасного поведения на дорогах...

Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2 iconПрограмма по формированию навыков безопасного поведения на дорогах...

Программа по формированию навыков безопасного поведения на дорогах и улицах «Добрая дорога детства» 2 iconПрограмма по формированию навыков безопасного поведения на дорогах...



Школьные материалы


При копировании материала укажите ссылку © 2013
контакты
100-bal.ru
Поиск