One of the main reasons for the destruction of information today is the spread of computer viruses.

Computer virus - is a special computer program, as a rule, is small in size, which, when launched, destroys or corrupts the data stored on the computer. A computer virus can perform the following harmful actions:

deletion or corruption of files;

change (corruption) of the file allocation table on the disk, which is responsible for the integrity of the data;

clogging of RAM and disk memory with empty information;

slowing down the computer or its complete stop (hanging).

A computer virus can "attribute" itself to other programs, as they say, "infect" them. Such "infection" leads to the fact that computer viruses can spread and multiply on their own. As a result, a large number of computers can fail at the same time.

A program that contains a virus is called "infected". The mechanism of action of the infected program is as follows. When such a program starts running, at some point a virus takes control, performs harmful actions, and then infects other programs. After the virus has performed its harmful actions, it transfers control to the program in which it is located. And this program continues to work the same as usual. Thus, outwardly, the operation of an infected program looks the same as that of a non-infected program.

All actions of the virus are performed quickly and imperceptibly. Therefore, it can be very difficult for a PC user to notice that a harmful virus is working on a computer. However, there are a number of signs that can be used to make an assumption that a computer is infected. These include the following:

programs stop working or start to work incorrectly (for example, "freeze", make incorrect calculations, lose data, etc.);

· Extraneous messages, symbols, drawings, etc. are displayed on the screen;

Computer work slows down significantly or the computer freezes;

there is a sudden loss of data on the disk;

· some files are corrupted, or they are completely deleted, etc.

If these signs appear, you need to scan your computer for viruses.

In order for a computer to become infected with a virus, it is necessary that the virus enters the computer. The virus can penetrate using floppy disks, which are used to transfer data between computers, through the organization's local area network, through other computer networks(for example, via the Internet).



However, in addition to the penetration of a virus into a computer, there is another condition for infecting a computer. This condition is that a program containing a virus has been executed at least once on the computer. Therefore, direct infection of a computer with a virus can occur in one of the following cases:

An infected program has been executed on the computer;

· the computer was booted from a floppy disk containing an infected boot sector;

An infected operating system has been installed on the computer;

· Files containing infected macros were processed on the computer.

Normal browsing of floppy disks does not infect a computer with a virus, even if the files on the disk are infected. The computer will be infected only if an infected program is launched from a floppy disk or an infected document file (for example, a document created in Microsoft Word) is opened for viewing.

Despite the possibility of infecting a computer with a virus, you need to know that not all computer files can become infected with a virus. The following components are attacked by the virus file system computer:

· executable files, ie. files with extensions EXE, COM, BAT;

· the boot sector and the master boot sector of disks (i.e. the sectors of magnetic disks that are used to boot the operating system on the computer);

device drivers and dynamic libraries (usually have the extension SYS and dll);

graphic files, for example, with the extension JPG;

Text files (.txt extension), raster image files (.bmp extension) and a number of other files are usually not infected with computer viruses.

The most dangerous are viruses that, after being launched, remain in RAM and constantly infect computer files until it is turned off or rebooted. Also dangerous are those viruses that infect the boot sectors of disks. Since, if the boot sector of the hard drive is infected, then every time the computer is booted, this virus will restart and infect new programs.

So far, there are no viruses that can disable the hardware of a computer, but there are viruses that can change the password to start the computer and thus prevent you from starting work.

Classification of computer viruses

There are three main groups viruses:

· file viruses;

Boot viruses

combined file-boot viruses.

File viruses write their code in the body of the executable (command) file and, accordingly, are launched when the program itself starts.

File viruses also include macrocommand viruses that are distributed with documents office applications, such as Microsoft Word or Microsoft Excel. This is because office application documents contain not only text, tables, graphic images etc., but also macros- programs that allow you to perform certain actions while working with a document. These macros are attacked by viruses.

The distribution mechanism of macrocommand viruses is as follows. For example, one or more virus macros are written to a text file with the DOC extension. When the user starts working with this file, at a certain moment a macro containing a virus is launched. In this case, the virus takes control and infects other documents.

Boot viruses are activated and distributed at the time of booting the operating system. Boot viruses usually attack the boot record on a floppy disk or the master boot record on a hard drive.

The work of the boot virus looks like this. When the computer is booted from an infected disk, the virus takes control, and then the operating system continues to load under the control of the virus, which makes it difficult for antivirus programs to detect it. After loading the operating system, the virus begins to control all access to disks and floppy disks. As soon as the user inserts the floppy disk and accesses it, the virus infects it.

File-boot viruses the most dangerous and perfect. They use propagation methods common to both file and boot viruses. That is, during their work, they infect both files and boot records and are activated either when a file is launched or when loaded from an infected disk.

Among the viruses, the following types can also be distinguished:

Simple viruses

polymorphic viruses;

stealth viruses.

Simple viruses are viruses detected by their code, which they write to the infected file. Anti-virus programs know this code and, when checking files, determine if they are infected by this code. There are no problems with the detection of such viruses.

However, many viruses use algorithms encryption your code. The difficulty of detecting such viruses lies in the fact that with each new infection they change their codes. But, since the virus encryption procedure is still known, its code can still be calculated. Therefore, after scrambled viruses, mutant viruses or polymorphic viruses .

They differ from simple and encrypting viruses in that they completely change the procedure for decrypting the code when each new virus instance is created, so it is impossible to isolate their code and many antivirus programs cannot detect such viruses. Those. every time a virus is launched, it creates a similar virus, but with a different code, which infects the computer's files. The problem of recognizing such viruses is quite complicated, and has not yet received a completely reliable solution.

In the process of scanning your computer, anti-virus programs read data from hard drives and find infected files. Stealth viruses after their launch, they leave special modules in the computer's RAM that intercept programs' access to the computer's disks. If such a module detects that some program is trying to read and check an infected file, then it replaces the readable data on the go and thus remains unnoticed, deceiving anti-virus programs.

To fight such viruses, if you suspect the presence of stealth viruses on your computer, you need to boot from the system floppy disk and diagnose the computer by running the anti-virus program from this diskette.

Although prevention is considered the most effective treatment, there are a number of folk remedies that can stop the virus in its tracks. Below are the most effective folk remedies that have a proven ability to block the reproduction of viruses.

Why do viruses multiply in the body?

When winter seems to drag on indefinitely, there is often a decrease in the activity of the immune system. Therefore, a person becomes prone to colds, flu, herpes and other viral infections. Viruses are tiny nucleic acid particles that invade living cells and divert those cells' resources to replicate (reproduce). Some folk remedies are known to support the immune system and can help strengthen the immune system's resistance to viral infections. Are there home remedies that can destroy viruses and shorten the duration of the illness they cause? Fortunately, there are many folk remedies available that have antiviral properties. In most cases, such alternative treatment is represented by herbs, as well as two metals - silver and zinc.

Colloidal Silver to Treat Hundreds of Diseases

Colloidal silver has been used in folk medicine for medicinal purposes since ancient times. It is known that in the period from 1900 to 1940. there were various forms of silver that were used to treat hundreds of diseases. Recently, interest in the use of this folk remedy has grown. Colloidal silver is a suspension of tiny particles that do not dissolve even when the concentration changes. Colloidal silver is used in modern supplements and is a suspension of pure metallic silver in water. It is believed that this folk remedy works by blocking enzymes that allow viruses, bacteria, and fungi to use oxygen (in fact, silver “suffocates” these microorganisms). Preliminary studies show that folk remedies based on colloidal silver can be used not only to treat the "simple", most common viruses, but even to block the reproduction of the hepatitis C virus and the HIV virus in AIDS patients.

Zinc - treatment for herpes and cold viruses

Several double-blind, placebo-controlled studies have shown zinc to be an effective treatment for the common cold. Zinc acetate and zinc gluconate reduced the duration and severity of cold symptoms. Topical application of zinc is also used to treat cold sores caused by the herpes simplex virus. One study showed that the use of zinc monoglycerolate led to a complete cure of herpetic lesions in 70% of individuals, while zinc oxide had a curative effect in only 9% of individuals. Thus, it is very important which form of zinc is used. Positively charged Zn2+ ions are effective against herpes and cold viruses. This tool does not allow viruses to multiply, because it blocks the process by which nucleic acid chains are linked. The amount of Zn2+ ions available to the body is highest in supplements containing zinc acetate (nearly 100%) and zinc gluconate (about 30%), but is almost zero with other forms of zinc (such as citrate, orotate, and picolinate). The presence of Zn2 + ions in the supplement is evidenced by the appearance of dry mouth (bonds are formed with saliva proteins).

Black elderberry is an effective folk remedy for the influenza virus, herpes and HIV

Black elderberry has long been used as food, and is also one of the oldest folk remedies. These berries are especially effective in treating the flu virus. In a double-blind clinical study, more than 90% of 15 patients who took elderberry extract (60 ml per day for adults and 30 ml for children) showed a significant reduction in flu symptoms after two days and a complete recovery after three days. Individuals who took this folk remedy also had higher levels of antibodies to the influenza virus in their blood, indicating an increased immune response. In an independent study by Norwegian scientists, elderberry extract was shown to significantly reduce the duration of flu symptoms by about four days. This folk remedy is believed to be effective in treating the flu virus because it binds to tiny proteins on the surface of the virus that allow it to enter living cells. Flavonoids, including quercetin, may also be involved in the medicinal effects of black elderberry. These flavonoids include anthocyanins, which are powerful antioxidants and protect cells from damage. The possibility of using this folk remedy for the treatment of other viral infections, including HIV and herpes, has been studied. In laboratory conditions, this folk remedy was found to significantly reduce the virulence of HIV strains and completely inhibit the replication of four strains of the herpes simplex virus, including two strains resistant to the drug acyclovir.

Olive leaves are a folk remedy for inhibiting a large number of viruses.

Olive trees grow around the Mediterranean and were probably first planted in Crete around 3500 BC. Olive oil is a major part of the Mediterranean diet and is very beneficial for cardiovascular health. The leaves of olive trees contain a bitter substance called oleuropein. In laboratory studies, it was shown that one of the components - elenoic acid - is a powerful inhibitor a large number viruses: influenza, herpes, polio and Coxsackie. Calcium elenolate also acts on retroviruses in leukemia by blocking reverse transcriptase enzymes that allow viruses to replicate by altering the DNA and RNA of healthy cells. Studies in infected hamsters have shown that calcium elenolate reduces levels of parainfluenza 3 myxovirus and prevents it from spreading to the lungs. A controlled clinical study in Budapest involving over 500 patients showed that olive leaf extract is extremely effective in treating a wide range of conditions. Complete and fast recovery after taking olive leaf extract was noted in 115 of 119 patients with respiratory tract infections and in 120 of 172 patients with herpes.

Green tea is a folk remedy of Chinese medicine

Green tea is a traditional Chinese medicine that has been used for over 4,000 years. Its health benefits have been proven in numerous studies. Green tea contains a group of flavonoids - catechins, which are able to inhibit viral infections. The catechins bind to the hemagglutinin of the influenza virus and thus prevent the virus from entering the host cell. Studies in China have shown that the action of green tea extract and catechins is also based on the blocking of viral enzymes: reverse transcriptase and DNA polymerase, which is necessary for viruses to replicate. A number of studies have shown that this folk remedy effectively suppresses HIV, herpes and hepatitis viruses.

Licorice root against mutated influenza, HIV and hepatitis viruses

It happens that flu virus mutations occur, resulting in epidemics that claim thousands of lives. Scientists from the Institute for Medical Virology in Frankfurt studied the effectiveness of four drugs (including ribavirin, which is recommended for treatment) and a substance found in licorice root, glycyrrhizin, against coronavirus samples from patients with SARS. The results, published in The Lancet, showed that glycyrrhizin outperformed all four drugs in suppressing the virus. Unlike drugs, this agent was not toxic to cells, virus-infected. Glycyrrhizin leads to a decrease in viral replication and inhibits the uptake of viruses on the outer cell, as well as their ability to penetrate into the cell. This folk remedy in laboratory studies has also shown the ability to inhibit the reproduction of HIV. Clinical studies have shown that glycyrrhizin injections may have a beneficial effect on AIDS. There is also preliminary evidence that oral administration of this folk remedy may be safe and effective for the long-term treatment of HIV infection. A preliminary study in people with acute and chronic viral hepatitis showed that taking 2.5 g of licorice root three times a day (assuming 750 mg of glycyrrhizin) was superior to the effects of the antiviral drug inosine. Licorice extract can be an effective treatment for many other viral diseases.

Pau D'Arco - divine tree in Brazilian folk medicine

Pau D'Arco - lapacho or ant tree bark - is a tree with a huge pink dome of flowers native to the Amazon rainforest. This "divine tree" has long been used in Brazilian folk medicine to treat a wide range of ailments, including colds, flu, herpes, and stomatitis virus. The inner bark contains a large amount of chemicals called quinoids. One of the most studied among these compounds is lapachol. This substance is active against various viruses, including herpes simplex types 1 and 2, influenza, polio virus and vesicular stomatitis virus. The mechanism of action of this folk remedy is based on the inhibition of DNA and RNA polymerase and retrovirus reverse transcriptase (the same mechanism in olive leaves and green tea).

St. John's wort - a folk remedy for the treatment of influenza, herpes and HIV viruses

St. John's wort is a well-known folk remedy for depression, and is also used to heal wounds, as well as relieve pain from neuralgia, fibrosis, and sciatica. Laboratory studies have shown that this folk remedy also has antiviral activity against influenza viruses, herpes simplex and HIV. Hypericin and pseudohypericin are chemicals found in St. John's wort that are active against enveloped viruses. These are viruses that rip off a piece of cell membrane when they leave an infected cell and wrap themselves in it to fool the body's immune system. Herpes, HIV, and hepatitis C viruses are enveloped viruses. Hypericin and pseudohypericin attack these fragments of the cell membrane (but do not attack the membranes of living cells).

Garlic - a folk remedy since the time of the pharaohs

Garlic has been cultivated for over 5000 years. This folk remedy was appreciated by the Egyptian pharaohs. In many cultures, garlic has been used as a folk remedy for colds and flu. In laboratory studies, garlic has been shown to have antiviral, antibacterial, and antifungal properties. The antiviral and other medicinal properties of garlic are provided by its numerous compounds that work together. The most significant of these is allicin, which produces the pungent smell of garlic. It is made from another compound, alliin (when fresh garlic is cut or chewed), and can also be obtained from powdered garlic supplements. Old garlic does not contain allicin, but some antiviral activity may be present due to the presence of allylcysteine. Several laboratory studies have confirmed that garlic is an excellent tool for killing cold viruses, as well as herpes simplex types 1 and 2.

Echinacea to treat viruses that affect the respiratory tract

Echinacea purpurea supports the immune system and may also have a direct antiviral effect. Preparations of echinacea roots and flowering parts of the plant have been shown in several clinical studies to be effective in reducing the severity and duration of symptoms in patients with colds, upper respiratory tract infections, and symptoms of viral bronchitis.

Folk remedies that have antiviral properties can and should be used in the complex treatment of diseases such as influenza, herpes, and even hepatitis and HIV. In some cases (colds and flu), even the use of one folk remedy (for example, black elderberry) can provide protection adequate to taking several pharmaceutical preparations. For some folk remedies, the ability to kill viruses in vitro has been proven, for some - in the course of clinical studies. It is ideal to take a holistic approach to the treatment of viral diseases. This involves the use of several antiviral folk remedies along with immune-boosting nutrients (vitamins A, C and E, zinc, selenium, coenzyme Q10 and probiotics).

7 comments

Lemon balm tea is drunk for colds and flu. This folk remedy is also used to treat the herpes virus and chickenpox.

Astragalus is known in Chinese folk medicine as the immune-enhancing herb Huang Qi. This folk remedy has been shown to be effective in treating flu and cold viruses, as well as the Coxsackie virus (which can cause inflammation of the heart). Astragalus tincture and decoction are especially effective. This folk remedy should be taken at the very beginning of the disease.

Ginger is another Chinese traditional medicine that increases the fire of digestion. If there is a risk of infection with the flu virus, treatment with ginger tea, which should be drunk several times a day, is effective.

Before being treated with folk remedies, you need to consult a doctor so that there are no allergies or other side effects! I know for sure that rosehip tea contains a lot of vitamins and helps with colds, my grandmother treated me with it. Inhalations with essential oils of eucalyptus relieve the common cold. I usually try to be treated at the first symptoms of a cold so that there are no complications. I drink antiviral balm Alvin. It has a natural composition, extracts of thyme, linden and vitamin C, so it is also useful for immunity. If treated on time and correctly, all viruses disappear in 3-4 days.

He was ill with the flu. Cough, runny nose, fever full program. The runny nose was so strong that the doctor sent me to the ENT. The doctor diagnosed sinusitis, prescribed treatment and prescribed antibiotics. Said Azitral would be great for me. I bought a pack of 6 capsules, by the way inexpensive. I took it for only 3 days, the temperature subsided, and the procedures helped. I feel great. In general, I recommend, it would be interesting to know your opinion.

This is a very good option. If you choose which antibiotic to buy, then I advise Azitral. There are several reasons, it helps quickly, inexpensive, does not harm the stomach. I judge by my father-in-law. He was seriously ill with the flu heat, vomiting, then got a complication - a sore throat began. They called a doctor. He prescribed Azitral. They doubted whether to give it to the father-in-law, because he has a weak stomach. Father-in-law drank 1 capsule a day 2 hours after lunch. On the third day, the angina receded. The father-in-law feels fine. I recommend Azitral. Has anyone else taken this drug?

Pavel and Andrey, I will join your opinion. Our grandfather got the flu. A week later I went on the mend, but suffered from bronchitis. The doctor prescribed antibiotics, recommended Azitral, because they asked for an inexpensive medicine. Grandfather drank 1 capsule a day. Helped after 3 capsules. There were no side effects, grandfather did not complain. If anyone chooses antibiotics, especially for the elderly, then I advise Azitral.

How to deal with viruses in the body?

HOW DOES A VIRUS ATTACK THE BODY? HOW DOES THE BODY FIGHT VIRUSES? AIDS RESPONSE MULTIPLE SCLEROSIS PROTECTIVE EFFECTS OF ACID

Chapter 18. PREVENTION OF VIRAL DISEASES

Viruses are everywhere where there is life. They accompany us always and everywhere. And the harm that they cause us is very great - more than half of all our diseases are provoked by viruses. Viruses have been causing devastating epidemics for thousands of years, bringing despair and death to people.

Even colds are caused by viruses. Most colds are included in the medical nomenclature under the name "acute respiratory diseases" - ARI. And if we know today that viruses are to blame for the occurrence of colds, then there should be something antiviral as a remedy for these diseases.

But more recently, a completely different opinion was held about colds. In The Raw Vegetable Juice Treatment, Walker writes:

There is a whole world of different viruses around us. And what happens when "enemies" penetrate the body? Can this be prevented?

Each of our movements, wherever we are and whatever we do, is accompanied by contact with the hordes of these creatures. We pick up a magazine - we leave on its pages a part of the microscopic inhabitants of our body, and in return we get a portion of new microbes and viruses, we breathe or sneeze - and again exchange our microflora with the outside world.

From the moment of birth, a person is forced to constantly interact with these ubiquitous invisibles. And of course, not all such contacts pass without a trace for our body. Both adults and children suffer from infectious diseases. However, despite their prevalence, for most of us, viruses are such terribly small creatures that cause the flu or another form of SARS, they can be dangerous, but a gauze bandage reliably protects against them. Yes, viruses, of course, are also to blame for the epidemic of bird and.

Science knows viruses of bacteria, plants, insects, animals and humans. There are more than 1000 of them in total. The processes associated with the reproduction of the virus most often damage and destroy the host cell. Reproduction of viruses, associated with the destruction of cells, leads to the emergence of disease states in the body.

A virus is genetic material surrounded by a protective cocoon. Viruses are the smallest among microbes. Depending on the shape, they are divided into helical, icosahedrons (twenty-sided).

Can the treatment of a viral infection with folk remedies be effective? Nobody likes to be sick, that's a fact. But, in most cases, the disease comes unexpectedly. And, the most unpleasant thing is that it comes "without warning."

For example, I drove a couple of stops in public transport or just visited a cold mother-in-law, as after a certain period of time a runny nose and poor health appear. And the virus that “does not ask for a special invitation” is to blame.

What are viruses and how to remove folk remedies

Infections are a large group of diseases, the appearance of which is provoked various types viruses.

Viral diseases are common among both children and adults.

The most common ailments of viral etiology.

Some people are frivolous about their own health, but there are those who are constantly looking for problems in the body, taking tests, consulting with many specialists and strengthening immunity using various methods. How to do it correctly so as not to harm yourself? What does the immunogram say? Does the state of the liver and intestines affect the immune system? Is it possible to prepare for the cold season? Oleg Nazar, Chief Immunologist of the Moscow Health Department, Associate Professor of the Department of Clinical, Laboratory Immunology and Allergology of the P. L. Shupyk National Medical Academy of Postgraduate Education, answered these and other questions during the FACTS direct line.

"A child's immune system is fully developed by the age of 12"

Svetlana from Mironovka. The son is five years old. We are taking him to the sea for the second summer, but immediately after that the child falls ill with bronchitis. Whether to check status.

HOW DOES THE BODY FIGHT VIRUSES?

For the time being, we will not consider the case favorable for the body, when the virus that invaded the cell is immediately suppressed by the cell, but consider the second case, when some time after the contact of the virus with the cell, mass reproduction of viruses and cell death begins, that is, when an infectious disease begins.

The replicated viruses emerging from the cell immediately put on a protein shell. According to the protein shell, the immune system distinguishes between friends and foes and begins to produce antibodies against the latter. But antibodies will not be produced so quickly, and the disease grows, and in this case the body uses its favorite and proven trick - it raises the body temperature above normal in order to restrain the reproduction of viruses in this way.

We will return to consider the temperature factor in the body's fight against a viral infection, and now we will pay a little attention to the immune system. It seems to me that medicine is somewhat.

Treatment with folk remedies

Symptoms and treatment of diseases with folk remedies at home

Treatment of viruses with folk remedies

Colds, flu and other viral infections are common problems of mankind. Although prevention is undoubtedly the best "doctor". But, alas, when a virus strikes us, we have to resort to a number of natural remedies that can stop it already on our own.

At this time of the year, as winter enters the finish line, our immune systems are at their lowest ebb, prone to colds, flu, herpes, and other viral infections. Viruses are tiny nucleic acid particles that invade living cells and disrupt the resources of those body units in order to reproduce themselves. We know that certain immune support substances can help build our resistance to viral infections. But we don't always remember about natural treatments that can actually kill viruses and shorten the duration of the diseases they cause... Fortunately, there are many products available and not expensive that have antiviral properties. Most of these are herbs, but we'll start with two metals - silver and zinc.

Treatment of viruses with folk remedies: influenza, Epstein Barra herpes, papillomas, - at home

Silver has been used in medicine since ancient times and from 1900 to 1940 various forms of silver were the main substance used to treat hundreds of ailments. Recently, interest in the use of colloidal silver has also increased. A colloid is a suspension of ultra-fine particles. Colloidal silver is used in modern supplements and is a suspension of pure metallic silver in water. It works like this, when it enters the body, with the help of oxygen, it begins the elimination of viruses, bacteria, fungi - in other words, it suffocates them. Although clinical trials have not yet been conducted with oral administration of colloidal silver, initial case studies have shown that injections of the silver compound drastically reduced the activity of the HIV virus in AIDS patients. There are also numerous reports of the effectiveness of colloidal silver against the hepatitis C virus.

Topical application of zinc is also used to treat ulcers that are caused by the herpes simplex virus. Laboratory. The study found that use of zinc monoglycerolate resulted in complete healing of inflamed lesions in 70 percent of subjects, while zinc oxide healed only 9 percent. So, it becomes clear that the form of zinc in use is obvious. As can be seen from other studies, positively charged Zn2+ ions are effective against herpes and cold viruses. Zn2+ ions help the body prevent viral replication by blocking the process by which nucleic acid chains are "separated". The amount of zinc available for absorption by the body in Zn2+ ions from supplementation is highest with zinc acetate (nearly 100 percent) and zinc gluconate (about 30 percent), but almost zero with other forms of zinc such as citrate, orotate, and picolinate.

Close-up of bunch of black elderberry on white background

Black elderberry has long been used as a food and is one of nature's oldest remedies. It seems that its berries are especially effective against the influenza virus. In a double-blind clinical study, more than 90% of 15 patients taking elderberry extract (60 ml per day for adults and 30 ml per day for children) showed a significant reduction in flu symptoms after two days and a complete recovery after three days. However, it took six days for the control group, up to 90% of patients showed improvement. The elderberry extract group also had higher blood levels of influenza antibodies than the control group, indicating an increased immune response. In an independent study in Norway, elderberry extract was shown to significantly reduce the duration of flu symptoms by about four days.

Olive trees (Olea Europea) grow around the Mediterranean and were probably first cultivated in Crete around 3500 BC. Olive oil is a major part of the Mediterranean diet, but the health-promoting properties of the olive tree do not seem to be limited to its known cardiovascular health benefits. The leaves contain a bitter substance called oleuropein, one component of which, elenoic acid, has been identified as a strong broad-spectrum virus inhibitor in laboratory tests. The calcium salt of elenoic acid destroys all viruses that have been tested against influenza, including herpes, polio and coxsackie viruses. Calcium elenolate also seems to act on retroviruses for murine leukemia by blocking its reverse transcriptase enzymes. Studies in infected hamsters have shown that calcium elenolate reduces levels of myxovirus type 3 parainfluenza and prevents it from spreading to the lungs. A clinical trial in Budapest involving over 500 patients concluded that olive leaf extract was extremely effective in treating a wide range of ailments. Complete and rapid recovery after taking the extract was noted in 115 of 119 patients with respiratory tract infections and 120 of 172 patients with viral skin infections such as herpes.

Green tea (Camellia sinensis) has been considered a Chinese medicine for 4,000 years. Also, its health benefits have recently been confirmed by scientific methods. Green tea contains a group of flavonoids called "catechins" that inhibit viral infections by binding to the hemagglutinin of the influenza virus, thus preventing the virus from entering the body's cells. Research in China has shown that green tea extract and isolated catechin derivatives also work by blocking the viral reverse transcriptase and DNA polymerase enzymes that allow viruses to replicate. Green tea test compounds were effective in suppressing HIV, herpes and hepatitis viruses. So far, no clinical studies have been conducted to further explore green tea's potential as a treatment for influenza and other viral illnesses.

Researchers at the Institute for Medical Virology in Frankfurt are investigating four pharmaceuticals (including ribavirin, recommended for treatment) and glycyrrhizin, a compound found in licorice (licorice) root, against SARS coronavirus samples in patients. The results, published in The Lancet, showed that Glycyrrhizin performed all four drugs to inhibit the virus. Unlike ribavirin, it is also non-toxic to virus-infected cells. Glycyrrhizin leads to a decrease in viral replication and inhibits both the uptake of viruses on external cells and their ability to enter cells. Licorice has also been shown to inhibit the replication of HIV in laboratory studies. Clinical trials have shown that glycyrrhizin injections may have beneficial effects in the treatment of AIDS and there is preliminary evidence that oral licorice may also be safe and effective for the long-term treatment of HIV infection. . A preliminary study in people with acute and chronic viral hepatitis found that taking 2.5 g of liquorice three times a day (assuming 750 mg of glycyrrhizin) was superior to the antiviral drug inosine poly-IC. Whole licorice extract (not de-glycyrrhizinated licorice or DGL) can also be an effective treatment for several other viral illnesses.

Pau D'Arco (Tabebuia impetiginosa), also known as lapacho or IPE Roshu, is a huge domed tree native to the Amazon rainforest. It is known as the "divine tree". Indigenous peoples in Brazil have long been used in folk medicine to treat a wide range of ailments, including colds, flu, herpes, and stomatitis virus. The inner bark contains large amounts of chemicals called quinoids. One of the best studied of these compounds is Lapachol, which has been found in laboratory tests to be active against a variety of viruses, including herpes simplex I and II, influenza, polio virus, and vesicular stomatitis viruses. The mechanism of action of Pau D'Arco, like olive leaf and green tea, is thought to be through inhibition of DNA and RNA polymerase and retrovirus reverse transcriptase. Lapachol is known to reduce viral replication in humans, but no clinical data are available.

St. John's wort is a well-known herbal remedy for depression, and has traditionally been used to help heal wounds, as well as to relieve the pain of neuralgia, sciatica, and fibrosis. Laboratory studies have shown that it also has antiviral activity against influenza, herpes simplex virus and HIV. Hypericin and pseudohypericin, chemicals in St. John's wort, are active against enveloped viruses. These are viruses that "tear off" part of the cell membrane when they seal off an infected cell and lock themselves into it as a way of tricking the body's immune system.

Garlic has been cultivated for over 5,000 years and has been valued for its medicinal properties since the time of the pharaohs. It is used as a folk remedy in many cultures to protect against colds and flu. In laboratory studies, garlic has been found to have antiviral, antibacterial, and antifungal properties. The key to garlic's antiviral and healing properties are its hundreds of beneficial compounds that work synergistically. The most significant of these is allicin, which produces the pungent smell of garlic. It is made from another compound, alliin, when fresh garlic is cut or chewed, and can also be obtained from powdered garlic supplements with allicin. Allicin in turn produces other sulfur compounds such as ajoene, allyl sulfides and vinyldithiins. Cooked garlic products do not have allicin, but may have some antiviral activity due to the presence of S-allylcysteine. The properties of garlic have been confirmed in laboratory tests in which fresh garlic, allicin and various other sulfur compounds in garlic, killed the common cold virus, various strains of the powerful ZA virus, and herpes simplex virus types I and II. Clinical trials are needed to definitively prove the effectiveness of garlic in fighting colds and flu.

The herb Echinacea (Echinacea purpurea) is known to support the immune system and may also have direct antiviral effects. Preparations of echinacea roots and flowering parts have been shown in several clinical trials to be effective in reducing the severity and duration of symptoms in patients with colds, upper respiratory tract infections, and viral symptoms bronchitis.

The natural antivirals described in this article can provide a (and sometimes more effective) alternative to pharmaceuticals. Because some of them have been shown to kill viruses only in vitro and have not yet been the subject of clinical trials, the best approach in treating viral diseases is to take a holistic approach. This will include the use of several antiviral products along with immune-boosting nutrients such as vitamins A, C and E, zinc, selenium, coenzyme Q10 and probiotics.

Post navigation

Add a comment Cancel reply

The fight against SARS in practice

Even, it would seem, quite recently you enjoyed the summer, spent time near the reservoirs, drank refreshing ice drinks. And then, completely unexpectedly, autumn burst in with a train of all seasonal troubles. One of the companions of autumn is an acute respiratory viral infection. It is very easy to be in the risk zone, especially when it becomes epidemic.

What is SARS?

This infection includes different types of pneumotropic viruses that have more than a dozen subtypes. ARVI is localized in the upper and lower respiratory tract. It is very easy to catch this infection by airborne droplets, especially in a large crowd of people. Therefore, if you have a personal car and the ability to limit your stay in the crowd during the SARS period, this is great.

The pneumotropic virus that enters the body settles in the nasopharynx and larynx on the mucous tissues. This is indicated by a sore throat, a runny nose and an unpleasant dry cough. Reproducing, the virus enters the vessels and thereby causes fever and weakness.

The invincible power of interferon in the fight against SARS

At this point, your body begins to resist, producing a substance such as interferon. This is a unique component to which there is no resistance of viruses. After all, he himself does not take part in the fight against SARS, but only activates certain body resources to protect against infection. Cells immediately begin to produce substances to fight the virus.

If there is not enough interferon in the body (this happens with weakened immunity), it is administered artificially. It exists in two forms: human (leukocyte) and synthetic (recombinant).

This substance in medicine is used in different doses and in different ways. Intramuscularly or intravenously, it is administered as the strongest antiviral agent in case of a threat of a fatal outcome of the disease (HIV, tumors, papillomavirus, hepatitis). Nasal interferon is prescribed for the treatment of acute respiratory viral infections. However, it should be used already at the first signs of the disease, then the effectiveness will be much higher, and the disease will be fleeting.

How to kill a virus?

There is one long-proven medical truth. The virus settles in the cell, and in order to kill it, you need to kill the cell, which can be extremely unsafe for the body. Therefore, all existing antiviral drugs only stop its progression. But the body itself must destroy the virus. That is why it is so important to maintain a good combat-ready immunity.

What to do if you get SARS?

First of all, you should consult a doctor so that he can establish a diagnosis and help prevent all possible complications.

It should be noted that complications most often appear when certain oversights are made. Following the above recommendations, you can significantly alleviate your condition and transfer the disease easily.

Plentiful drink. An organism affected by a virus quickly dehydrates. Shortness of breath appears and sweating increases. Therefore, you should drink liquid as often as possible. In this way, the appearance and accumulation of thick mucus, which entails many complications, can be prevented.

The stronger the sweating, the higher the temperature and the higher the dryness in the room, the more liquid should be drunk. Moreover, drinking will be best absorbed if it corresponds to the temperature of the room. As a liquid, you can use compotes from fresh fruits or dried fruits, mineral water, tea.

You can find out that dehydration is starting by rare urges out of need. Then the volume of drinks needs to be increased.

Food. If the appetite is gone, do not be afraid that without food the body will weaken. On the contrary, both the stomach and the liver are cleared of food and focused on fighting infection. Be guided by your desire. If you don't want to eat, don't force yourself.

Room. It is not necessary to tightly close the windows, put on woolen socks and wrap yourself in a warm blanket. Indeed, in such an atmosphere, viruses will feel at home and actively multiply. But there is no need to go to the other extreme either. Excessive cold will cool the skin, while the internal organs will be hot. This can cause painful spasms.

Experienced doctors recommend that you often ventilate the room, do it every day. wet cleaning and maintain the air temperature no more than 20 degrees. Humidity should be around 60%, and clothing on the body is warm, but not hot. You can provide the desired humidity with a special humidifier or cover the battery (in winter) with a wet towel.

Auxiliary medicines

Of course, during the illness you need to be observed by a doctor. However, there are some things you can do to help yourself. These drugs are drugs that contain paracetamol. It will lower the temperature and allow you to assess your condition. If complications begin, it will be ineffective. This is a sure sign that it's time to seek emergency medical attention.

It is impossible to protect yourself and completely isolate yourself from viruses. However, following the above recommendations, you can protect yourself from many negative consequences and survive SARS with minimal losses. Be healthy and don't get sick!

Flu Protection: 10 Ways to Kill the Virus Quickly

More than a dozen Russian cities are under quarantine. This means that the probability of getting the virus into the body is close to 100%. The most important task comes first - how to urgently destroy the virus before it provokes the disease.

It has been established that the influenza virus, after being introduced into the human body, “sits” on the mucous membrane for about 6 hours quietly, doing nothing and not doing anything, and only then begins its dirty work of cell destruction. It is in these 6 hours that you need to deal with him. What should you urgently do if you feel that you have caught the virus from someone?

Blow your nose. The first important action, while the virus is still on the mucous membrane, is to try to remove it mechanically, that is, just blow your nose.

Take a steam bath. If someone in the house has a bath or sauna - be sure to take a steam bath in it. This will boost the immune system to fight the virus. In general, during a cold period it is useful to visit a sauna or a bath more often.

Take a hot shower. If you don't have a sauna, at least take a hot shower or soak in a hot bath. By the way, this must be done every time you get cold outside. Hot water will restore fullness and thereby stimulate the immune system.

Attention! Alcohol is able to cope with viruses, while they have not yet bred in large numbers. Therefore, a cold is poured with alcohol only in the first hours from the moment of the disease. Then it will be ineffective.

Drink medicinal grog. If someone does not accept vodka, you can try another healing drink. Everyone knows the grog in English literature. Grog is a warming and cleansing agent. First you need to boil the syrup. To do this, take 400 grams of sugar and one glass and a quarter of water. On low heat, stirring constantly, cook the mixture until all the sugar is dissolved. Then 250 grams of rum or cognac and the juice of one lemon are added to the syrup. Grog should be drunk hot. Healing grog can be prepared in another way. Take half a glass of rum, 2 sugars, 1 lemon, 1 single tea bag and put all these products in a glass cup or fireproof glass. Pour in a quarter cup of boiling water. The mixture should be stirred and drunk.

Drink tea for teetotalers. If the soul cannot stand anything alcoholic at all, then drink hot tea with ginger. Ginger improves immunity and resistance to colds. It is better to brew green tea, and add only fresh ginger. The same help in the fight against viruses will have a lemon.

Attention! Never drink green tea on an empty stomach! It has a powerful effect on the secretory function of the stomach. Be sure to eat some sandwich or a couple of cookies.

Do acupressure. After the steam room and a strong drink, you need to lie down a little wrapped up. In order not to waste time in vain, we continue to crack down on viruses - we do massage. You need to rub your palms, especially in places of depressions. Then stretch your fingers. The movements during this massage resemble the removal of a ring from a finger. You need to “remove the ring” from each finger. We wrinkled our hands, we pass to our feet. A cold, it turns out, can be cured and ... with your feet. The Chinese do just that. To protect yourself from a possible runny nose, you need to rub the first one well, or, as it is also called, the big toe. When the throat hurts, the third finger is massaged. And even better - rub the entire foot. It will not harm, but, on the contrary, will benefit.

Smell phytoncides. Now let's move on to phytoncides, which, as you know, have a bactericidal effect. You need to take a freshly cut piece of onion, wrap it in gauze and put it in your ear. Since the ear, throat, and nose can safely be called "communicating vessels," the onion fumes will surely reach the nose. And the throat too. This can be understood immediately, as soon as it tickles in the throat. If you don't like this procedure, then at least smell the onion. You can smell lavender oil, which doctors consider the most versatile oil remedy for cold viruses. In addition, against cold viruses, you can use lavender, cloves, bergamot, juniper, calendula.

Make an inhalation. This is an excellent tool for the destruction of viruses that have invaded the nasopharyngeal mucosa. In a pot of hot water, add some germicidal essential oil (lavender, clove, bergamot, juniper, calendula) or Vietnamese Golden Star balm (a match head-sized lump is enough), or medicinal plants (such as bay leaf, lemon balm, chamomile, oregano or lavender). If someone is used to using the old folk way - to breathe over potatoes cooked "in uniform", this also helps, so you can not change the habit.

Attention! Inhalations for colds can be done only on the first day of illness. For 2-3 days it is already dangerous, because together with the medicine you can inhale into the lungs the viruses that have bred in large numbers by this time.

Night procedure. Dip your feet and hands in hot water. Keep them for about 5 minutes until the skin turns red. The main thing is that there should be no “busting”, that is, a burn. As a result, steamed and rosy skin should look like "gloves" on the hands and "knee socks" on the legs. Pour dry mustard into a cotton sock, put it on, and pull a woolen sock over it. And that's it - we go to bed.

If you're lucky, after all these procedures, the virus that has entered the body must surrender to the mercy of the winner.

Sokolov Roman

Informatics essay " Computer viruses and fight against them.

Download:

Preview:

MU Department of Education of the Zyryansky District Administration

MOU Tsyganovskaya basic comprehensive school

Regional scientific and practical conference

Schoolchildren "Planet - 3000"

(Abstract on computer science)

Completed by: Sokolov Roman Yurievich, student

Grade 9 MOU TsOOSH

Head: Sokolova Nadezhda Ivanovna,

Informatics teacher MOU Tsyganovskaya school

S. Tsyganovo

Page

1. Introduction ………………………………………………………………………….. 1

2. What is a virus? .............................................. ................................................. ... 2 - 4

3. Where do Computer viruses come from? ……………………………… 5

4. Crime in the area computer technology. ………………………. 5 – 6

5. Signs of the appearance of viruses……………………………………………… 6

6. A bit of history …………………………………………………………… 6

7. Classification of viruses. …………………………………………………… 7 – 9

8. Prevention ………………………………………………………………… 9

9. Antivirus programs …………………………………………………. 10 - 11

10. Conclusion ………………………………………………………………….. 11

11. Materials used ……………………………………………………… 12

Target:

Explore the "working mechanism" of computer viruses.

Tasks:

  • Deepen knowledge about computer viruses;
  • Identify signs of the appearance of viruses, their classification;
  • Learn to organize and properly use the information received.
  • Improve skills in working with antivirus programs.

1. Introduction

For my work in computer science, I chose the topic “Computer viruses and the fight against them”. Because, being a “teapot”, I had to deal with viruses on my PC more than once. This topic is painfully close - and I want to devote my work to it.
Computer viruses. What is it and how to deal with it? Dozens of books and hundreds of articles have already been written on this topic, hundreds (or thousands) of specialists in dozens (maybe hundreds) of companies are professionally engaged in the fight against computer viruses. It would seem that this topic is not so complex and relevant as to be the object of such close attention. However, it is not. Computer viruses have been and remain one of the most common causes of information loss. There are cases when viruses blocked the work of organizations and enterprises. Moreover, a few years ago, a case was recorded when a computer virus caused the death of a person - in one of the hospitals in the Netherlands, a patient received a lethal dose of morphine because the computer was infected with a virus and gave incorrect information.
As in the case of the common cold, a computer attacked by a virus begins to show painful symptoms. Infecting a person with a virus leads to a slow reaction, weight changes, general weakness, pain, partial or complete amnesia, and even death. When infected with a virus, computers show similar symptoms: programs running slower than normal, unexplained changes in file size, unusual and frequent error messages, data loss or changes, and complete system crash. Some relatively harmless computer viruses replicate but don't do anything terrible. These viruses may display an erroneous message on the screen. However, in some cases, a virus that attacks, say, a hospital life support system and produces an incorrect message can have fatal consequences. In addition, viruses can cause serious damage to the system, such as erasing all information from the hard drive.

2. What is a virus?

One of the famous "doctors" D.N. Lozinsky gave a definition of the virus using the example of a clerk.
Imagine a neat secretary who comes to work in his office and every day finds on his desk a stack of sheets of paper with a list of tasks that he must complete during the working day. He takes the top sheet, reads the instructions of his superiors, follows them punctually, throws the “used” sheet into the trash can and moves on to the next sheet. Suppose an intruder sneaks into an office and places a piece of paper in a pile of papers that says, "Rewrite this sheet twice and put copies in the neighbors' assignment pile." What will the secretary do? Rewrite the sheet twice, put it on the neighbors' table, destroy the original and proceed to the execution of the second sheet from the stack, i.e. continue to do their real job. What will the neighbors, being the same neat workers, do when they find a new task? The same as the first: they will rewrite it twice and distribute it to others. In total, four copies of the original document are already roaming around the office, which will continue to be copied and distributed to other tables.
A computer virus works in much the same way, only the programs are the stacks of instructions, and the computer is the secretaries. Just like a secretary, a computer accurately executes all program commands (task sheets), starting from the first one. If the first command sounds like "copy me into two other programs," then the computer will do so, and the virus command gets into two other programs. When the computer moves on to other "infected" programs, the virus will spread further and further throughout the computer in the same way. In the above example about the secretary and the office, the leaf virus does not check whether the next task folder is infected or not. In this case, by the end of the working day, the office will be littered with such copies, and the secretaries will only rewrite the same text and distribute it to their neighbors - after all, the first one will make two copies, the next victims of the virus will already be four, then 8, 16, 32, 64, etc., i.e. the number of copies will be doubled each time. If an employee spends 30 seconds rewriting one sheet and another 30 seconds distributing copies, then in an hour more than 1,000,000,000,000,000,000 copies of the virus will “roam” around the office! Most likely, of course, there will not be enough paper, and the spread of the virus will be stopped for such a banal reason. Ironically (although it was not at all funny to the participants in this incident), just such a case occurred in 1988 in America - several global information transmission networks turned out to be overflowing with copies of a network virus (Morris virus) that sent itself from computer to computer. Therefore, the "correct" viruses do this: Rewrite this sheet twice and put copies in the neighbors' task stack if they do not already have this sheet. The problem is solved - there is no "overpopulation", but each pile contains a copy of the virus, while the secretary still has time to cope with normal work. “But what about data destruction?” - you ask. Everything is very simple - just add something like the following to the sheet: “1. Rewrite this sheet twice and put copies in the neighbors' task pile if they do not already have this sheet. 2. Look at the calendar - if today is Friday, which fell on the 13th, throw all the documents into the trash. This is approximately what a well-known virus does.
Jerusalem (other name - Time"). By the way, this example shows very well why in most cases it is impossible to determine exactly where the virus came from in the computer. All employees have the same (up to handwriting) COPIES, but the original with the attacker's handwriting has long been in the trash.

Computer viruses are programs that can reproduce themselves in multiple copies, possibly by being attributed to other programs, and possibly perform some side effects. This definition is given, rather, on an intuitive level, since a strict definition of a computer virus does not yet exist.
* The first of the reasons that do not allow a precise definition of a virus is the impossibility of unambiguously distinguishing distinguishing features that would correspond only to viruses.

*The second difficulty that arises when formulating the definition of a computer virus is that this definition must be tied to a specific operating system in which this virus is distributed. For example, theoretically, there may be operating systems in which the presence of a virus is simply impossible. An example of this would be a system where it is forbidden to create and modify areas of executable code, i.e. it is forbidden to modify objects that are either already running or can be run by the system under any conditions.
Therefore, it seems possible to formulate only a mandatory condition for some sequence to be a virus. A mandatory property of a computer virus is the ability to create duplicates of itself (not necessarily identical to the original) and inject them into computer networks and/or files, computer system areas and other executable objects. At the same time, duplicates retain the ability to further distribution. It should be noted that this condition is not sufficient (ie final) because, for example, the MS-DOS operating system satisfies this property, but is not a virus. That is why there is still no exact definition of the virus, and it is unlikely that one will appear in the foreseeable future. Therefore, there is no precisely defined law by which "good" files can be distinguished from "viruses". Moreover, sometimes even for a particular file it is quite difficult to determine whether it is a virus or not.

3. Where do computer viruses come from?

I remind you that, unlike biological viruses, computer viruses are created by humans. The authors of viruses with their "works" bring a lot of harm to computer users. They can cause computer crashes or even complete loss of data on the hard drive. A virus can enter a system in one of several ways: a floppy disk, a software manufacturer's CD-ROM, a network interface or modem connection, or the global Internet when receiving e-mail.
Viruses enter a computer from floppy disks, through modems, and over network connections.
Historically, the floppy disk has been the most common carrier of viruses, mainly because they were used to transfer information from one computer to another. It is much easier to infect a floppy disk. A virus can get on it if you simply insert a floppy disk into the drive of an infected computer and, for example, read its table of contents. The situation here is the same as with the AIDS virus - the greater the number of partners with whom you exchange programs (floppy disks), the higher the likelihood of infection. However, these ways of penetration of viruses into the system are far from exhausted. The ease with which the Internet allows the exchange of information has a downside: it has made the Internet a conducive medium for the spread of computer viruses and other malware. Of course, not every program or document downloaded from the Internet or sent to you by e-mail contains viruses. Reputable bulletin board operators and system operators of online services scan new files for viruses before making them available to the public, but you can never be sure that the resulting files have been checked. Everyone who works on the Internet needs a good antivirus protection.
But first of all, this concerns the tendency for viruses to acquire the function of spreading by e-mail. According to technical support statistics"Kaspersky Lab"about 85% of all reported cases of infection were caused by the penetration of viruses with the help of this source. Thus, compared with 1999, the increase in the number of such incidents was about 70%. In this regard, Kaspersky Lab reiterates the importance of installing a reliable anti-virus protection system for e-mail.
Switching the attention of virus creators to e-mail is quite natural. As practice shows, most malicious programs are created for those operating systems, applications, data transfer technologies that are most popular. Today, email is the de facto standard for both business and informal communication. Hundreds of millions of people around the world cannot imagine a normal business without this way of communicating with partners. This predetermined the orientation of the creators of viruses to e-mail.

4. Crime in the field of computer technology.

In many countries, there are legislative measures to combat computer crimes and malicious activities, and anti-virus programs are being developed. software, however, the number of new software viruses is increasing. Persons who use their knowledge and experience for unauthorized access to information and computing resources, to obtain confidential and secret information, to commit malicious actions, are called hackers and crackers in the literature. The actions of hackers or computer hooligans can cause significant harm to computer owners and owners (creators) of information resources, as they lead to computer downtime, the need to restore corrupted data, or to discredit legal entities or individuals, for example, by distorting information on electronic bulletin boards or on WEB servers on the Internet. The motives of actions of computer intruders are very different: the desire for financial acquisitions; the desire to harm and take revenge on the head of the organization from which, for one reason or another, the employee quit; psychological traits of a person (envy, vanity, desire to somehow prove oneself, just hooliganism, etc.).

5. Signs of the appearance of viruses.

When a computer is infected with a virus, it is important to detect it. To do this, you should know about the main signs of the manifestation of viruses. These include the following:

  • termination of work or incorrect operation of previously successfully functioning programs;
  • slow computer performance
  • inability to boot the operating system;
  • disappearance of files and directories or distortion of their contents;
  • changing the date and time of file modification;
  • resizing files;
  • unexpected significant increase in the number of files on the disk;
  • a significant reduction in the size of free RAM;
  • displaying unintended messages or images on the screen;
  • submission of unforeseen sound signals;
  • frequent freezes and computer crashes.

It should be noted that the above phenomena are not necessarily caused by the presence of the virus, but may be due to other causes. Therefore, it is always difficult to correctly diagnose the state of the computer.


6. A bit of history

Let's talk about recent history: "Brain", "Vienna", "Cascade" and so on. Those who started working on the IBM-PC already in the mid-80s have not yet forgotten the epidemic of these viruses in 1987-89. Letters rained down on the screens, and crowds of users rushed to the display repair specialists (now the opposite is true: the hard drive has died of old age, and they blame it on a virus unknown to advanced science). Then the computer played the foreign anthem "Yankee Doodle", but no one rushed to fix the speakers - they quickly figured out that it was a virus, and not just one, but a dozen.
So viruses began to infect files. The "Brain" virus and the ball of the "Pingpong" virus jumping across the screen marked the victory of the virus over the Boot sector as well. All this did not please the users of the IBM-PC, and antidotes appeared. One of the first antiviruses was the domestic ANTI-KOT: it was the legendary Oleg Kotik who released the first versions of his program, which destroyed as many as 4 (four) viruses (the American SCAN appeared in our country a little later). Unfortunately, ANTI-KOT detects the “Time” (“Jerusalem”) virus by the “MsDos” combination at the end of the file, and some other antiviruses carefully attach these same letters to all files with the COM or EXE extension. It should be noted that the stories of the conquest of Russia and the West by viruses differ from each other. The first virus to spread rapidly in the West was the "Brain" boot virus, and only then did the "Vienna" and "Cascade" file viruses appear. In Russia, on the contrary, file viruses first appeared, and boot viruses appeared a year later. Time passed, viruses multiplied. All of them were somewhat similar to each other, climbed into memory, clung to files and sectors, periodically killed files, floppy disks and hard drives. One of the first "revelations" was the "Frodo.4096" virus - one of the first known stealth file viruses. This virus intercepted INT 21h and, when accessing infected files via DOS, changed the information in such a way that the file appeared before the user in an uninfected form. But it's a virus over MS-DOS. Less than a year later, electronic cockroaches crawled into the core of DOS (the invisible virus "Beast.512"). The idea of ​​invisibility continued to bear fruit further: in the summer of 1991, the Dir_P virus swept through computers like a bubonic plague. But it was quite simple to deal with the invisibles: I cleaned the RAM - and be calm, look for the bastard and treat him to health. But more trouble was delivered by self-encrypting viruses, which were sometimes found in regular collections. Indeed, to identify and remove them, it was necessary to write special subroutines and debug them. But no one paid attention to this then, until ... Until a new generation of viruses appeared, those that are called polymorphic viruses. These viruses take a different approach to invisibility: they encrypt (in most cases) and use commands in the decryptor that may not be repeated when infecting different files.

7. Classification of viruses

Currently, more than 5,000 software viruses are known, they can be classified according to the following criteria:

  • habitat;
  • the method of contamination of the environment;
  • impact;
  • features of the algorithm.

Depending on the habitat, viruses can be divided into:

  • network;
  • file;
  • boot;
  • file-boot.

Network viruses spread over various computer networks. File viruses are introduced mainly into executable modules, that is, into files with COM and EXE extensions. File viruses can also infect other types of files, but as a rule, they are written in such files, they never get control and, therefore, lose the ability to reproduce. Boot viruses infect the disk's boot sector (Boot sector) or the sector containing the boot program. system disk(Master Boot Record). File-boot viruses infect both files and boot sectors of disks. According to the mode of infection, viruses are divided into:

  • resident;
  • non-resident.

When a resident virus infects (infects) a computer, it leaves its resident part in RAM, which then intercepts the operating system's access to infected objects (files, disk boot sectors, etc.) and infiltrates them. Resident viruses reside in memory and remain active until the computer is turned off or restarted. Non-resident viruses do not infect computer memory and are active for a limited time. According to the degree of impact, viruses can be divided into the following types:

  • harmless, not interfering with the computer, but reducing the amount of free RAM and disk space, the actions of such viruses are manifested in any graphic or sound effects;
  • Dangerous viruses that can lead to various computer malfunctions are very dangerous, the impact of which can lead to loss of programs, destruction of data, and erasure of information in the system areas of the disk.

According to the features of the algorithms, the following groups of viruses are distinguished:

8. Prevention


In order not to expose your computer to viruses and ensure reliable storage of information on disks, you must follow the following rules:

  • equip your computer with up-to-date anti-virus programs, such as AntiViral Toolkit Pro, Doctor Web, and constantly renew their versions
  • Before reading information stored on other computers from diskettes, always check these diskettes for viruses by running your computer's anti-virus programs.
  • when transferring archived files to your computer, scan them immediately after unzipping them on your hard drive, limiting the scan area to newly recorded files only
  • periodically scan your computer's hard drives for viruses by running anti-virus programs to test files, memory, and system areas of disks from a write-protected floppy disk, after booting the operating system from a write-protected system diskette
  • always protect your floppy disks from writing when working on other computers, if they will not be written to information
  • be sure to make archival copies on diskettes of valuable information for you
  • do not leave floppy disks in the pocket of drive A when turning on or rebooting the operating system to prevent infection of the computer with boot viruses
  • use anti-virus programs for input control of all executable files received from computer networks
  • check e-mail even if the letter came from a well-known person (this is not due to the fact that he wants to harm you, but because he is a complete Lamer and his computer is infected).

You should also sometimes check autoload, tk. this is where boot viruses are usually thrown, but this method is very common and therefore the following folder should be checked in the registry:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

9. Antivirus programs.

To detect, remove and protect against computer viruses, several types have been developed. special programs, which allow you to detect and destroy viruses. Such programs are called antiviral . There are the following types of antivirus programs:

  • detector programs;
  • doctor programs or phages;
  • auditor programs; filter programs;
  • vaccine or immunization programs.

Detector programs search for a signature characteristic of a particular virus in RAM and in files and, if detected, issue a corresponding message. The disadvantage of such anti-virus programs is that they can only find viruses that are known to the developers of such programs.
Doctor programs or phages, as well as vaccine programs, not only find files infected with viruses, but also “treat” them, i.e. remove the body of the virus program from the file, returning the files to the initial state. At the beginning of their work, phages look for viruses in RAM, destroying them, and only then proceed to “treatment” of files. Among phages, polyphages are distinguished, i.e. doctor programs designed to find and destroy a large number of viruses. The most famous of them are: AVP, Aidstest, Scan, Norton AntiVirus, Doctor Web,kaspersky's avp program. Given that new viruses are constantly appearing, detection programs and doctor programs quickly become outdated, and regular updates are required. Auditor programs are among the most reliable means of protecting against viruses. Auditors remember the initial state of programs, directories and system areas of the disk when the computer is not infected with a virus, and then periodically or at the request of the user compare the current state with the original one. The detected changes are displayed on the monitor screen. As a rule, states are compared immediately after the operating system is loaded. When comparing, the file length, cyclic control code (file checksum), date and time of modification, and other parameters are checked. Auditor programs have sufficiently developed algorithms, detect viruses, and can even clean up changes to the version of the program being checked from changes made by the virus. Among the programs-auditors is the Adinf program widely used in Russia. Filter programs or watchdogs are small resident programs designed to detect suspicious computer activity that is characteristic of viruses. Such actions can be: attempts to correct files with COM, EXE extensions; changing file attributes; direct write to disk at an absolute address; writing to disk boot sectors; downloading the resident program. When any program tries to perform the specified actions, the "watchman" sends a message to the user and offers to prohibit or allow the corresponding action. Filter programs are very useful, as they are able to detect a virus at the earliest stage of its existence before reproduction. However, they do not "heal" files and disks. To destroy viruses, you need to use other programs, such as phages. Vaccines or immunizers are resident programs that prevent file infection. Vaccines are used if there are no doctor programs that "treat" this virus. Vaccination is possible only against known viruses. The vaccine modifies the program or disk in such a way that it does not affect their work, and the virus will perceive them as infected and therefore will not take root. Vaccine programs are currently of limited use. Timely detection of virus-infected files and disks, complete destruction of detected viruses on each computer helps to avoid the spread of a virus epidemic to other computers.
The main weapon in the fight against viruses are anti-virus programs. They allow not only to detect viruses, including viruses that use various methods disguise, but also remove them from the computer. The last operation can be quite complicated and take some time. There are several basic virus scanning methods that are used by antivirus programs.
It should be noted that the detector program can detect only those viruses that are known to it (that is, they are included in the anti-virus database of this program). For example program AVP Kaspersky capable of detecting 33,556 viruses as of February 10, 2000. Below is the dialog box of this antivirus program. Everything about it is comfortable and clear interface. The program is designed for the Windows "95 /" 98 / NT / 3.11 operating system, which allows it to work in parallel with other applications. Some programs such as Dr. Web , can use heuristic analysis to find modified viruses. The dialog box of Dr.Web anti-virus program is shown below. The program is written under the MS DOS operating system. However, it is impossible to develop such a program that could detect any previously unknown virus.

Most traditional method a virus scan is a scan. It consists in searching for signatures isolated from previously discovered viruses. Antivirus scanners that are able to remove detected viruses are usually called polyphages. The disadvantage of simple scanners is their inability to detect polymorphic viruses that completely change their code. To do this, it is necessary to use more complex search algorithms, including heuristic analysis of the programs being checked. In addition, scanners can only detect already known and previously studied viruses for which a signature has been determined. Therefore, scanner programs will not protect your computer from the penetration of new viruses, which, by the way, appear several times a day. As a result, scanners become obsolete as soon as a new version is released.

10. Conclusion.

A computer virus is a specially written program that can spontaneously attach to other programs, create copies of itself and inject them into files, computer system areas and computer networks in order to disrupt programs, corrupt files and directories, and create all kinds of interference in computer operation.
Currently, more than 50,000 software viruses are known, the number of which is constantly growing. There are cases when tutorials were created to help in writing viruses. The main types of viruses: boot, file, file-boot. The most dangerous type of viruses is polymorphic. From the history of computer virology, it is clear that any original computer development forces the creators of antiviruses to adapt to new technologies, constantly improve antivirus programs. The reasons for the appearance and spread of viruses are hidden on the one hand in human psychology, on the other hand, with the lack of protection in the operating system. The main ways for viruses to penetrate are removable drives and computer networks. To prevent this from happening, take precautions. Also, several types of special programs called anti-virus programs have been developed to detect, remove and protect against computer viruses.
But some properties of viruses puzzle even experts. Until quite recently, it was hard to imagine that a virus could survive a cold reboot or spread through document files. Under such conditions, it is impossible not to attach importance to at least the initial anti-virus education of users. Despite the seriousness of the problem, no virus is capable of causing as much harm as a novice computer user.

11. Materials used:

1. Textbook "Informatics", A.P. Alekseev, Moscow "Solon-r", 2002.
2. Benefit " Microsoft Office”, E.M. Berliner, Moscow ABF, 1997.
3. Materials from the Internet.
4. Levin A. Self-instruction manual for working on a computer M: "KNOWLEDGE" 2000.

Preview:

To enjoy preview presentations, create a Google account (account) and sign in:

The massive spread of viruses, the severity of the consequences of their impact on the resources of the CS necessitated the development and use of special anti-virus tools and methods for their application. Antivirus tools are used to solve the following tasks:

  • - detection of viruses in the CS;
  • - blocking the work of virus programs;
  • - elimination of the consequences of exposure to viruses.

It is desirable to detect viruses at the stage of their

introduction, or at least before the start of the destructive functions of viruses. It is necessary to take revenge that there are no antivirus tools that guarantee the detection of all possible viruses.

If a virus is detected, it is necessary to immediately stop the operation of the virus program in order to minimize the damage from its impact on the system.

Elimination of the consequences of exposure to viruses is carried out in two directions:

  • - removal of viruses;
  • - recovery (if necessary) of files, memory areas.

The system recovery technology depends on the type of virus, as well as on the time of detection of the virus in relation to the onset of harmful actions. Recovery of information without the use of duplicate information may be impracticable if the viruses, during their introduction, do not store the information in place of which they are placed in memory, and also if the harmful actions have already begun, and they involve changes in information.

To combat viruses, software and hardware-software tools are used, which are used in a certain sequence and combination, forming methods for combating viruses, which are divided into methods for detecting and removing viruses.

Virus detection methods include:

  • - scanning;
  • - detection of changes;
  • - zvristichesky analysis;
  • - use of resident watchmen;
  • - vaccination programs;
  • - hardware-software protection against viruses.

Scanning- one of the most simple methods detection

viruses. Scanning is carried out by a scanner program that scans files in search of the identification part of the virus - the signature. The program detects the presence of already known viruses, with the exception of polymorphic viruses that use encryption of the virus body, changing the signature each time. Scanner programs can store not signatures of known viruses, but their checksums. Scanning programs can often remove detected viruses. Such programs are called polyphages.

The scanning method is applicable to detect viruses whose signatures are already isolated and permanent. To use the method effectively, it is necessary to regularly update information about new viruses.

The most famous scanner program in Russia is Dmitry Lozinsky's Aid-stest.

The change detection method is based on the use of rvisor programs. These programs detect and remember the characteristics of all areas on disks that normally contain viruses. During the periodic execution of programs-rvisors, the stored characteristics are compared with the characteristics obtained by monitoring disk areas. Based on the results of the audit, the program will issue information about the alleged presence of viruses.

Usually, auditor programs store in special files images of the master boot record, boot sectors of logical disks, the characteristics of all controlled files, directories and numbers of defective clusters, the amount of installed RAM, the number of disks connected to the computer and their parameters.

The main advantage of the method is the ability to detect viruses of all types, as well as new unknown viruses. Perfect programs-auditors detect even "stealth" viruses. For example, the Adinf auditor program developed by D.Yu. Bridged, works with the disk directly by sector through the BIOS. This does not allow "stealth" viruses to use the ability to intercept interrupts and "stand" to control the memory area that the virus needs.

This method also has disadvantages. With the help of audit programs, it is impossible to detect a virus in files that enter the system already infected. Viruses will be detected only after they multiply in the system.

Inspection programs are not suitable for detecting macro virus infections because documents and tables change very frequently.

Heuristic analysis relatively recently began to be used to detect viruses. Like the change detection method, this method allows you to detect unknown viruses, but does not require the preliminary collection, processing and storage of information on the file system.

The essence of heuristic analysis is to check the possible habitats of viruses and identify commands (groups of commands) in them that are characteristic of viruses. Such commands can be commands for creating resident modules in RAM, commands for direct access to disks, bypassing the OS. Heuristic analyzers when detecting "suspicious" commands in files or boot sectors give a message about a possible infection. After receiving such messages, it is necessary to carefully check the supposedly infected files and boot sectors with all available anti-virus tools. A heuristic analyzer is available, for example, in the Doctor Web anti-virus program.

Usage Method resident watchmen is based on the use of programs that are constantly in the main computer and monitor all the actions of other programs. The technological process of using resident watchdogs is carried out in the following sequence: if any program performs suspicious actions (applying to write to boot sectors, placing resident modules in the RAM, attempts to intercept interrupts, etc.), the resident watchdog will issue a message to the user. The guard program can load other anti-virus programs for execution to check "suspicious" programs, as well as to control all files coming from outside (from removable drives, on the network).

A significant disadvantage this method there is a significant percentage of false alarms, which interferes with the user's work, causes irritation and a desire to abandon the use of resident watchdogs. An example of a resident watchdog is the Vsafe program included with MS DOS.

Under vaccination programs refers to the creation of a special module to control its integrity. A checksum is usually used as a characteristic of the integrity of a file. When a vaccinated file is infected, the control module detects a change in the checksum and informs the user about it. The method allows you to detect all viruses, including unknown ones, with the exception of "stealth" viruses.

Blocking the work of virus programs is carried out by using hardware and software anti-virus tools. Currently, special controllers and their software are used to protect PCs. The controller is installed in the expansion slot and has access to a common bus. This allows it to control all access to the disk system. The controller software remembers the areas on the disks, the change of which in normal modes work is not allowed. Thus, you can set protection against changing the master boot record, boot sectors, configuration files, executable files, etc.

When performing prohibited actions by any program, the controller will issue a corresponding message to the user and block the operation of the PC.

Hardware and software antivirus tools have a number of advantages over software ones:

  • - work constantly;
  • - detect all viruses, regardless of their mechanism of action;
  • - block unauthorized actions resulting from the operation of a virus or an unskilled user.

There is only one drawback of these tools - dependence on PC hardware. Changing the latter leads to the need to replace the controller.

The Sheriff complex can serve as an example of an aggressive-software protection against viruses.

In the process of removing the consequences of a virus infection, viruses are removed, as well as the restoration of files and memory areas in which the virus was located. There are two methods for removing the consequences of exposure to viruses with antivirus programs.

The first method involves restoring the system after exposure to known viruses. The developer of a phage program that removes a virus must know the structure of the virus and its distribution characteristics in the environment.

The second method allows you to recover files and boot sectors infected with unknown viruses. To restore files, the recovery program must proactively create and store information about the files obtained under virus-free conditions. Having information about an uninfected file and using information about general principles work of viruses, file recovery is carried out. If the virus has subjected the file to irreversible changes, then recovery is possible only using a backup copy or from the distribution kit. In their absence, there is only one way out - to destroy the file and restore it manually.

If a antivirus program can't restore home boot record or boot sectors, you can try to do it manually. In case of failure, you should format the disk and install it in the OS.

There are viruses that, getting into the computer, become part of its OS. If you simply remove such a virus, the system becomes inoperable.

One such virus is the One Half virus. When the computer boots up, the virus gradually encrypts HDD. When accessing already encrypted sectors, the resident One Half virus intercepts calls and decrypts the information. Removing the virus will make it impossible to use the encrypted part of the disk. When removing such a virus, you must first decrypt the information on the disk. To do this, you need to know the mechanism of action of the virus.

Computer virus— a type of malicious software that can create copies of itself and infiltrate the code of other programs, system memory areas, boot sectors, and also distribute its copies over various communication channels.

As a rule, the purpose of a virus is to disrupt the operation of hardware and software systems: deleting files, rendering data hosting structures unusable, blocking the work of users or rendering computer hardware systems unusable, etc. Even if the author of the virus has not programmed harmful effects, the virus can lead to computer failures due to errors, unaccounted for subtleties of interaction with the operating system and other programs. In addition, viruses, as a rule, take up space on storage media and consume some other system resources.

In everyday life, "viruses" refers to all malware, although in fact this is only one type of it.

A computer virus was named after biological viruses for a similar propagation mechanism. Apparently, the first use of the word "virus" in relation to the program was used by Gregory Benford (Gregory Benford) in the fantasy story "The Scarred Man", published in Venture magazine in May 1970.

The term "computer virus" was subsequently "discovered" and rediscovered more than once. Thus, the variable in the PERVADE (1975) subroutine, whose value determined whether the ANIMAL program would be distributed on disk, was called VIRUS. Also, Joe Dellinger called his programs a virus, and this is probably what was first correctly labeled as a virus.

Malicious software can form chains: for example, using an exploit (1), a downloader (2) is deployed on the victim’s computer, which installs a worm from the Internet

Story

The foundations of the theory of self-reproducing mechanisms were laid by John von Neumann, an American of Hungarian origin, who in 1951 proposed a method for creating such mechanisms. Working examples of such programs have been known since 1961.

The first known viruses are Virus 1,2,3 and Elk Cloner for the Apple II PC, which appeared in 1981. In the winter of 1984, the first anti-virus utilities appeared - CHK4BOMB and BOMBSQAD by Andy Hopkins (Eng. Andy Hopkins). In early 1985, Guy Wong Gee Wong) wrote the DPROTECT program - the first resident antivirus.

The first virus epidemics date back to 1986-1989: Brain.A (distributed in the boot sectors of floppy disks, caused the largest epidemic), Jerusalem(manifested on Friday May 13, 1988, destroying programs when they were launched), the Morris worm (over 6200 computers, most networks were out of order for up to five days), DATACRIME (about 100 thousand infected PCs in the Netherlands alone).

At the same time, the main classes of binary viruses took shape: network worms (Morris worm, 1987), Trojan horses (AIDS, 1989), polymorphic viruses (Chameleon, 1990), stealth viruses (Frodo, Whale, 2nd half of 1990).

At the same time, organized movements of both pro- and anti-virus orientation are taking shape: in 1990, a specialized BBS Virus Exchange, Mark Ludwig’s “Little Black Book on Computer Viruses” appeared, the first commercial antivirus Symantec Norton AntiVirus.

In 1992, the first virus constructor for the PC, VCL, appeared (constructors existed for the Amiga before), as well as ready-made polymorphic modules (MtE, DAME and TPE) and encryption modules for embedding in new viruses.

Over the next few years, stealth and polymorphic technologies were finally perfected (SMEG.Pathogen, SMEG.Queeg, OneHalf, 1994; NightFall, Nostradamus, Nutcracker, 1995), as well as the most unusual ways of penetrating the system and infecting files (Dir II - 1991, PMBS, Shadowgard, Cruncher - 1993). In addition, viruses have appeared that infect object files (Shifter, 1994) and program source code (SrcVir, 1994). With the spread of the Microsoft Office suite, macro viruses have proliferated (Concept, 1995).

In 1996, the first virus for Windows 95 appeared - Win95.Boza, and in December of the same year - the first resident virus for it - Win95.Punch.

With the spread of networks and the Internet, file viruses are increasingly focused on them as the main channel of work.

The discovery of numerous vulnerabilities in Windows and other common software has opened the way for exploit worms. In 2004, epidemics of unprecedented magnitude cause MsBlast (according to Microsoft data- more than 16 million systems), Sasser and Mydoom (estimated damages of 500 million and 4 billion dollars, respectively.

At first, based on Trojans, and with the development of p2p network technologies - and independently - the most modern type of virus - botnet worms - is gaining momentum (Rustock, 2006, about 150 thousand bots; Conficker, 2008-2009, more than 7 million bots ; Kraken, 2009, about 500 thousand bots). Viruses, among other malicious software, are finally formalized as a means of cybercrime.

Types of viruses

Now there are many varieties of viruses that differ in the main method of distribution and functionality. If viruses were originally distributed on floppy disks and other media, now viruses that spread via the Internet dominate. The functionality of viruses, which they adopt from other types of programs, is also growing.

Through the Internet, local networks and removable media.

Viruses spread by copying their body and ensuring its subsequent execution: embedding themselves in the executable code of other programs, replacing other programs, registering themselves in autorun, and more. A virus or its carrier can be not only programs containing machine code, but also any information containing automatically executable commands - for example, batch files and Microsoft Word and Excel documents containing macros. In addition, to penetrate a computer, a virus can use vulnerabilities in popular software (for example, Adobe Flash, Internet Explorer, Outlook), for which distributors embed it in ordinary data (pictures, texts, etc.) along with an exploit that exploits the vulnerability.

Distribution channels

  • . Diskettes. The most common channel of infection in the 1980-1990s. It is now practically non-existent due to the emergence of more common and efficient channels and the lack of floppy drives on many modern computers.
  • . Flash drives (flash drives). Currently, USB flash drives replace floppy disks and repeat their fate - a large number of viruses spread through removable drives, including digital cameras, digital camcorders, portable digital players, and since the 2000s, mobile phones, especially smartphones, have played an increasingly important role (mobile viruses have appeared). The use of this channel was previously mainly due to the ability to create on the drive special file autorun.inf, in which you can specify the program to run Windows Explorer when opening such a drive. In Windows 7, the ability to autorun files from portable media has been disabled.
  • . Email. Usually, viruses in e-mails are disguised as harmless attachments: pictures, documents, music, links to websites. Some emails may actually only contain links, that is, the emails themselves may not contain malicious code, but if you open such a link, you can get to a specially created website containing virus code. Many mail viruses Once on the user's computer, they then use the address book from installed email clients such as Outlook to send themselves further.
  • . Instant messaging systems. It is also common here to send links to supposedly photos, music, or programs that are actually viruses via ICQ and other instant messaging programs.
  • . Web pages. It is also possible to infect via the Internet due to the presence on the pages of the World Wide Web of various "active" content: scripts, ActiveX-component. In this case, vulnerabilities in the software installed on the user's computer or vulnerabilities in the software of the site owner are used (which is more dangerous, since respectable sites with a large flow of visitors are exposed to infection), and unsuspecting users, having accessed such a site, risk infecting their computer .
  • . Internet and local networks (worms). Worms are a type of virus that infiltrate a victim computer without user intervention. Worms use so-called "holes" (vulnerabilities) in operating system software to infiltrate a computer. . Vulnerabilities are errors and flaws in software that allow remote download and execution of machine code, as a result of which a worm enters the operating system and, as a rule, begins to infect other computers through local network or the Internet. Attackers use infected user computers to send spam or for DDoS attacks.

Signs of infection

  • . automatic opening of windows with unfamiliar content when the computer starts;
  • . blocking access to the official websites of anti-virus companies, or to websites that provide services to "cure" computers from malware;
  • . the appearance of new unknown processes in the output of the task manager (for example, the "Processes" window of the Windows task manager);
  • . the appearance in the branches of the registry responsible for autorun, new entries;
  • . prohibition on changing computer settings in the administrator account;
  • . inability to run the executable file (an error message is displayed);
  • . the appearance of pop-up windows or system messages with unusual text, including those containing unknown web addresses and names;
  • . restarting the computer during the start of any program;
  • . accidental and / or random shutdown of the computer;
  • . random program crashes.
  • . giving unforeseen sound signals;
  • . unexpected opening and closing of the CD-ROM tray;
  • . arbitrary launch of any programs on the computer;
  • . the appearance of warnings about a spontaneous attempt by any computer program to access the Internet.

With the manifestation of the described symptoms, with a high degree of probability, it can be assumed that the computer is infected with a virus. In addition, there are characteristic signs of virus infection through email:

  • . friends or acquaintances receive messages from you that you did not send;
  • . in mailbox there are a large number of messages without a return address and a header.

It should be noted that such signs are not always caused by the presence of viruses, sometimes they may be the result of other reasons. For example, in the case of mail, infected messages may be sent with your return address but not from your computer.

Available indirect signs of computer infection a:

  • . frequent freezes and crashes in the computer;
  • . slow computer operation when starting programs;
  • . inability to download operating system;
  • . disappearance of files and directories or distortion of their contents;
  • . frequent access to the hard disk (the light on the system unit often flashes);
  • . The Internet browser behaves unexpectedly (for example, the program window cannot be closed).

In 90% of cases, the presence of indirect signs is caused by a failure in hardware or software. Despite the fact that such symptoms are unlikely to indicate an infection, if they appear, it is recommended that you perform a full scan of your computer with an anti-virus program installed on it.

However, it should be borne in mind that despite the absence of symptoms, the computer may be infected with malware.

Life is a struggle

Absolute protection against malware does not exist: no one is immune from “zero-day exploits” like Sasser or Conficker. But with the help of some measures, you can significantly reduce the risk of malware infection. The following are the main and most effective measures to improve security:

  • . use operating systems that do not allow you to change important files without the knowledge of the user;
  • . install updates in a timely manner;
    • if there is a mode automatic update, enable it;
    • for proprietary software: use licensed copies. Updates for binaries sometimes conflict with crackers;
  • . in addition to anti-virus products that use signature methods for detecting malware, use software that provides proactive protection against threats (the need to use proactive protection is due to the fact that signature anti-virus does not notice new threats that have not yet been included in anti-virus databases). However, its use requires a lot of experience and knowledge from the user;
  • . permanently work on a personal computer exclusively under the rights of a user, not an administrator, which will prevent most malicious programs from being installed on a personal computer and changing system settings. But this will not protect personal data from malicious ( Trojan-Clicker, Trojan-DDoS, Trojan-Downloader, ransomware [encrypting files], spyware) and potentially unwanted programs (Adware, Hoax ) that have access to user files to which a limited account has permission to write and read (for example, the home directory - subdirectories /home in GNU/Linux, Documents and settings in Windows XP, Users folder in Windows 7,8,8.1,10), to any folders that allow writing and reading files, or the user interface (as user programs do to take screenshots or change keyboard layouts);
  • . restrict physical access to the computer by unauthorized persons;
  • . use external media only from trusted sources on a working computer;
  • . Don `t open computer files, received from unreliable sources, on a working computer;
  • . use a firewall (hardware or software) that controls access to the Internet from personal computer based on policies set by the user himself;
  • . use a second computer (not for work) to run programs from unreliable sources that do not contain valuable information of interest to third parties;
  • . back up important information to external media and disconnect them from the computer (malicious software can encrypt or otherwise corrupt the files it finds).

Some precautions should be followed, in particular:

  1. . Do not work under privileged accounts unless absolutely necessary. ( Account administrator on Windows)
  2. . Do not run unfamiliar programs from dubious sources.
  3. . Try to block the possibility of unauthorized modification of system files.
  4. . Disable potentially dangerous system functionality (for example, autorun media in MS Windows, hiding files, their extensions, etc.).
  5. . Do not go to suspicious sites, pay attention to the address in the address bar of the browser.
  6. . Use only trusted distributions.
  7. . Constantly make backup copies of important data, preferably on media that is not erased (for example, BD-R) and have a system image with all the settings for quick deployment.
  8. . Perform regular updates of frequently used programs, especially those that provide system security.

Antivirus

Kaspersky Anti-Virus- This program is designed for ordinary users and very easy to use for advanced users. Maximum Independent Testing Lab gave them a very high rating. This antivirus program has a user-friendly interface and covers all stages of online and offline protection for a computer or laptop. Hourly database update if there is an internet connection.

Norton Antivirusis one of the oldest and most popular antivirus programs for computer security. Them latest version allows you to display wireless home network and guarantees secure network WiFi connections in real time. They provide daily virus database updates, but very poor support for P2P File Sharing and Startup computer registry protection.

AVG is one of the oldest and widely used security antivirus programs. They offer a convenient and understandable user interface for ordinary users, where in advance users can use their prepared functions. This allows you to implement multi-protection in search engines.

McAfee is one of the first antivirus programs that was introduced in the early period. They have 2 layers of system protection like ScriptStopper and WormStopper but they have poor P2P support sharing files, Instant Messenger (chat) and Startup registry scanning.

Dr. Web ( Doctor Web ) is a common name for a family of software anti-virus software for various platforms (Windows, OS X, Linux, mobile platforms) and a line of software and hardware solutions (Dr.Web Office Shield), as well as solutions for ensuring the security of all corporate network nodes (Dr.Web Enterprise Suite). Developed by Doctor Web.

The products provide protection against viruses, Trojans, spyware, adware, worms, rootkits, hacker utilities, joke programs, and unknown threats using a variety of real-time and preventive protection technologies.

ESET NOD32 is an anti-virus package produced by the Slovak company ESET. The first version was released at the end of 1987. The name was originally deciphered as "Nemocnica na Okraji Disku" ("Hospital on the edge of the disk", a paraphrase of the title of the then popular television series in Czechoslovakia "Hospital on the outskirts of the city").

NOD32 is a complex antivirus solution for real-time protection. ESET NOD32 provides protection against viruses as well as other threats, including Trojans, worms, spyware, adware, phishing attacks. ESET NOD32 uses ThreatSense, a patented technology designed to detect new emerging threats in real time by analyzing running programs for malicious code, which allows you to prevent the actions of malware authors.

Microsoft Security Essentials (MSE)free package anti-virus applications from Microsoft, designed to combat various viruses, spyware, rootkits and Trojans. This software only works on computers where the a copy of Windows Vista, Windows 7) validated. Antivirus Microsoft Security Essentials came to replace Windows Live OneCare (commercial antivirus program from Microsoft) /

False antiviruses or as it is also called - false antiviruses, today they are one of the methods of Internet fraud that are actively gaining popularity. Its essence is to force the user to pay money for a program that supposedly removes very dangerous viruses from the computer and protects the user's PC from various threats in the future. And everything would be fine if the program that was offered to buy would not be a "dummy". In the West, this kind of software is called Rogue Anti-Virus (or rogueware) - false software.

A fake antivirus is a program that masquerades as a real antivirus. At the same time, having paid money for it, the user, at best, receives an absolutely useless utility, at worst, a real real virus or trojan that steals credit card data and other things from him. confidential information. By installing a fake antirus on a PC, you are essentially voluntarily infecting your computer.

Typical representatives of false antiviruses are known under the names: Online Antivirus XP-Vista 2009, XP Antivirus 2009, Vista Antivirus 2008, Doctor Antivirus, Virus Remover 2009, Personal Antivirus, Malware Doctor and others.