Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
англ яз в сфере комп.технологий.doc
Скачиваний:
13
Добавлен:
16.11.2019
Размер:
874.5 Кб
Скачать

Unit VIII

Viruses

EXERCISE 1

Answer the questions before reading the text

  • What viruses do you know?

  • Where is the word ‘virus’ derived from? Do you know its plural form?

  • Have you ever experienced destroying activity of any virus?

  • Make a list of damages caused by viruses.

  • What anti-virus programme do you have in your computer? Do you find it safe enough?

EXERCISE EXERCISE 2

Words can combine to make new compound words. Look at the examples. Then make as many compounds as you can combining a word from A with a word from B. Check the meaning.

Example: a computer program; an E-mail address

A

B

computer

program

E-mail

address

companion

file

bomb

spreadsheets

time

Logic

sector

databases

boot

data

loss

reformatting

system

new-age

crash

application

Excel

Access

browser

memory

web

hard disk

virus

software

Macro

EXERCISE EXERCISE 3

Read and translate the text using the following words and word combinations.

Malware (malicious software) – поражающие вирусом программы

malicious – злонамеренный, злокозненный

malevolent - недоброжелательный

crucial – значительный, ключевой

to boot up – загружаться, выполнять начальную загрузку

spread like wildfire - распространяться со сверхъестественной быстротой

to reside – обитать, пребывать

in their heyday – в зените славы, расцвета

to propagate – распространяться

notorious - пользующийся дурной славой; печально известный; пресловутый;

vulnerable – уязвимый

dormant – дремлющий, потенциальный, скрытый

to pinpoint – указать точно, засечь

breed – племя

a generic term – общее название

in common parlance - в просторечии

benign - добрый, милостивый

per se - сам по себе, по существу

Text 1 Computer viruses

The word virus is used in the same sense as the biological equivalent to describe all kinds of malware (malicious software), including worms or Trojans. A computer virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the user. A true virus must replicate itself, and must execute itself. A computer virus will pass from one computer to another like a real biological virus passes from person to person. For example, it is estimated by experts that the Mydoom worm infected a quarter-million computers in a single day in January 2004. There are tens of thousands of viruses out there, and new ones are discovered every day. Here is the classification of basic types of viruses.

Viruses can be subdivided into a number of types, the main ones being: Boot sector viruses, Companion viruses, Email viruses, Logic bombs and time bombs, Macro viruses.

Two other types of malware are often classified as viruses, but are actually forms of distributing malware: Trojan horses and Worms.

A boot sector virus affects the boot sector of a hard disk, which is a very crucial part. The boot sector is where all information about the drive is stored, along with a program that makes it possible for the operating system to boot up. By inserting its code into the boot sector, a virus guarantees that it loads into memory during every boot sequence. A boot virus does not affect files; instead, it affects the disks that contain them. During the days when programs were carried around on floppies, the boot sector viruses used to spread like wildfire. However, with the CD-ROM revolution, it became impossible to infect pre-written data on a CD, which eventually stopped such viruses from spreading. Examples of boot viruses are Polyboot.B and AntiEXE.

Multipartite viruses are a combination of boot sector viruses and file viruses. These viruses come in through infected media and reside in memory. They then move on to the boot sector of the hard drive. From there, the virus infects executable files on the hard drive and spreads across the system. There aren’t too many multipartite viruses in existence today, but in their heyday, they accounted for some major problems due to their capacity to combine different infection techniques. A significantly famous multipartite virus is Ywinz.

A logic bomb employs code that lies inert until specific conditions are met. The resolution of the conditions will trigger a certain function (such as printing a message to the user and/or deleting files). Logic bombs may reside within standalone programs, or they may be part of worms or viruses. An example of a logic bomb would be a virus that waits to execute until it has infected a certain number of hosts. A time bomb is a subset of logic bomb, which is set to trigger on a particular date and/or time. An example of a time bomb is the infamous ‘Friday the 13th’ virus.

Macro Viruses infect files that are created using certain applications or programs that contain macros. These include Microsoft Office documents such as Word documents, Excel spreadsheets, PowerPoint presentations, Access databases, and other similar application files such as Corel Draw, AmiPro, etc. Since macro viruses are written in the language of the application, and not in that of the operating system, they are known to be platform-independent—they can spread between Windows, Mac, and any other system, so long as they’re running the required application. With the ever-increasing capabilities of macro languages in applications, and the possibility of infections spreading over net-works, these viruses are major threats. The first macro virus was written for Microsoft Word and was discovered back in August 1995. Today, there are thousands of macro viruses in existence—some examples are Relax, Melissa.A and Bablas.

The only function of Trojans is to destroy and delete files. They can automatically delete all the core system files on your machine. The Trojan could be controlled by the attacker or could be programmed to strike like logic bomb-starting on a specific day or at specific hour. Trojans are aimed to generate a lot of internet traffic on the victim’s machine, to the extent that the Internet connection is too overloaded to let the user visit a website or download anything. They infect as many machines as possible and simultaneously attack specific e-mail addresses with random subjects and contents that cannot be filtered.

Computer Worms are programs that reproduce and run independently, and travel across network connections. The main difference between viruses and worms is the method in which they reproduce and spread. A virus is dependent upon a host file or boot sector, and the transfer of files between machines to spread, while a worm can run completely independently and spread of its own accord through network connections. The security threat of worms is equivalent to that of a virus. Worms are capable of doing a whole range of damage such as destroying essential files in your system, slowing it down to a great extent, or even causing some essential programs to crash. Two famous examples of worms are the MS-Blaster and Sesser worms.

EXERCISE EXERCISE 4

Look through the text about viruses again. Write questions to the answers.

____________________________________ ?

a. To replicate itself and execute itself.

____________________________________ ?

b. Like a real biological virus.

____________________________________ ?

c. In January, 2004.

____________________________________ ?

d. Trojan horses and worms.

____________________________________ ?

e. It doesn’t affect files.

____________________________________ ?

f. A combination of boot sector viruses and file viruses.

____________________________________ ?

g. It lies inert until specific conditions are met.

____________________________________ ?

h. ‘Friday the 13th’ virus.

____________________________________ ?

i. They are known to be platform-independent.

_ ___________________________________ ?

j. To destroy and delete files.

____________________________________ ?

k. It is the method in which they reproduce and spread.

EXERCISE EXERCISE 5

Open brackets. Use the correct form of an adverb (Present Participle or Past Participle).

  1. A computer virus is a computer program (written/writing) to alter the way a computer operates.

  2. Multipartite viruses come in through (infected/infecting) media and reside in memory.

  3. With the (increased/increasing) capabilities of macro languages in applications, macro viruses are major threats.

  4. The user often finds the banners (annoying/annoyed).

  5. Trojans can also open back doors so that computer hackers can gain access to passwords and other personal information (storing/stored) on a computer.

  6. The first PC virus was a boot sector virus (calling/called) (c)Brain, created in 1986 by two brothers, Basit and Amjad Farooq Alvi from Pakistan.

  7. Traditional computer viruses emerged in the 1980s, (driven/driving) by the spread of personal computers.

  8. If a user tries to start an (infecting/infected) program, the virus code may be executed first.

  9. Some viruses try to avoid detection by killing the tasks (associated/associating) with antivirus software before it can detect them.

  10. As computers and operating systems grow larger and more complex, old hiding techniques need to be (updated/updating) or (replaced/replacing).

EXERCISE EXERCISE 6

All these sentences are false. Make them negative to obtain the right answer.

  1. Boot sector viruses were prevalent in the 1980s. (Not nowadays)

  2. A companion virus has host files per se.

  3. However, the slow infector approach does not seem very successful.

  4. Windows XP uses the MS-DOS command prompt.

  5. Trojan horses are viruses in the strict sense because they can replicate automatically.

  6. Computer viruses come into existence spontaneously, they are likely to be created by bugs in regular programs.

  7. Resident viruses search for hosts when they are started.

  8. This approach fools anti-virus software, however.

  9. Anti-virus software changes the underlying capability of host software to transmit viruses.

EXERCISE EXERCISE 7

Find in the text sentences containing a word or a group of words from the following. Read them out and translate.

In the same sence, all kinds of malware, in a single day, along with, used to spread like wildfire, in their heyday, infamous, eventually, on a specific day or at specific hour, to a great extent

EXERCISE EXERCISE 8

Work in pairs. Share opinions about:

1) computer viruses and their way of spreading;

2) boot sector viruses;

3) multipartite viruses;

4) a logic bomb;

5) macro viruses;

6) Trojan horses;

7) computer worms.

EXERCISE EXERCISE 9

Read the text. Use the list of words and word combinations after the text to translate it.