Thursday, October 17, 2019

COMPUTER VIRUS


COMPUTER VIRUS

A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions. The term 'computer virus' was first formally defined by Fred Cohen in 1983. Computer viruses never occur naturally. They are always induced by people. Once created and released, however, their diffusion is not directly under human control. After entering a computer, a virus attaches itself to another program in such a way that execution of the host program triggers the action of the virus simultaneously. It can self-replicate, inserting itself onto other programs or files, infecting them in the process.
 Not all computer viruses are destructive though. However, most of them perform actions that are malicious in nature, such as destroying data. Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software. For example, some can infect files without increasing their sizes, while others try to evade detection by killing the tasks associated with the antivirus software before they can be detected. Some old viruses make sure that the "last modified" date of a host file stays the same when they infect the file.
Types of Computer Viruses
1. Boot Sector Virus.
Even though this virus has now become obsolete, it still pops out in one way or the other. This virus got attention when floppy disks were used to boot a computer. In modern computers, this virus could appear on the “Master Boot Record”.
2. Resident Virus.
After inserting itself directing into the memory of your system, this virus has the capability to take a number of actions. One of its more troublesome features is its ability to run away. Leaving behind the file which was originally infected, this virus has the ability to run on its own.
3. Direct Action Virus.
Similar to the Vienna virus which shocked computers in 1998, this virus comes into action after you have executed the file. The load is delivered to your computer and the virus becomes active. However, this virus has a limitation. It takes no action unless the file which is infected gets implemented again.
4. Polymorphic Virus.
One of the factors that epitomize the usefulness of this virus is its ability to evade. The Antivirus programs that are enabled on our computers detect the presence of any virus by detecting its code. Polymorphic virus has exploited  this limitation beautifully as it changes its code every time the infected file is executed. Thus, it becomes nearly impossible for any ordinary antivirus to track it down.
5. File Infector Virus.
Although the word “file” in its name might suggest otherwise, this virus does not take the help of files every time. In fact, the file is only the starting point as the file infector dwarfs the first file after which it re-writes the file.
6. Multipartite Virus.
If you have read carefully the aforementioned viruses, you might have noticed that they use two methods for their transmission. Either they use one method or a single payload is delivered.
However, this virus wants to claim both. Depending upon the operating system of your computer or the files that exist on your computer, it might use any of the two methods to spread.
7. Macro Virus.
Appearing in the form of a word document which seemingly links the user to pornographic websites, Melissa is one of the most known Micro Virus. Going one step further, this virus not only exploits the user but also his/her friends by mailing the copies of the infected virus document to the contact list.

Thursday, October 10, 2019

QUIZ!!!

Ezhuthachan Quiz was conducted on MTTC by Malayalam Association on 10.10.2019. First prize was shared by Deepika and Thushara of MTTC. 








Wednesday, October 9, 2019

LITERARY FEST


Ezhuthidam 2019 - Literary fest was conducted by 63rd College Union from 9-11 October 2019.





Friday, October 4, 2019

UNAI PROGRAM

United Nations Academic Impact UNAI - initiation meeting held in the presence of Mr. Saji Charuvil Thomas of New York,  UN Representative of UNAI at MTTC on 4.October.2019






RECITATION COMPETITION

RECITATION AT BNV TRAINING COLLEGE THIRUVALLAM






Tuesday, October 1, 2019

TWINNING PROGRAM




Very gifted people, they win and they win, and they are told that they win because they are a winner. That seems like a positive thing to tell children, but ultimately, what that means is when they lose, it must make them a loser.









Peer teaching day 15

To day the class was taken for Juniors. It was a face to face class. I shared the class with Anju mariyam sam. The model was Constructivist ...