CIS 1200 Lecture Notes - Lecture 80: Antivirus Software
Document Summary
A hacker is repeatedly making requests of that computer system through a computer he or she has taken over as a zombie. Firewalls are software programs or hardware devices designed to keep computers safe from hackers. Firewall close off all open logical ports and make your computer invisible to other computers on the internet. Time bombs are triggered by a passage of time or on a certain date. Encryption viruses search for common data files and then compress them using a complex encryption key. The user then has to pay to get the file unlocked. Polymorphic viruses change their own code (or periodically rewrite themselves) to avoid detection. Most polymorphic viruses infect one certain type of file (. exe files, for example) Multipartite viruses are designed to infect multiple file types in an effort to fool the antivirus software that is looking for them.