
- •Is limited to a few words. However, the large amount of memory
- •If the computer divides the screen into a large number of
- •Ver, having to use special paper adds to the running costs and is
- •Impact printers by mechanical contact between print head and
- •It should include: a classifying sentence
- •If it is stored on rom chips,it comes into operation as soon as
- •Information.
- •Various editing facilities are also available. After the
- •Very closely,and I've found that purchasers' needs seem always to
- •3 Adjectives with two syllables may be like 1 or 2 above in that
- •Is printing - the software assumes that one letter or number has
- •Information on the screen and one to scan the keyboard for input.
- •In my opinion, there is no single `best` online service. The
- •In the 1980s, at least 100,000 laNs were set up in laborato-
- •Infected four copies of command.Com , the detonator is triggered.
Infected four copies of command.Com , the detonator is triggered.
The detonator in Lehigh is a simple one. It erases a vital part
of your hard disk, making the files on that part of the disk no
longer accessible. You grumble and set about rebuilding your
work, unware that Lehigh is waiting to infect other unsuspecting
computers if you boot from one of those four infected floppies.
Don`t worry too much about viruses. You may never see one.
There are just a few ways to become infected that you should be
aware of. The sources seem to be service people, pirated games,
putting floppies in publicity available PCs without write-protect
tabs, commercial software (rarely), and software distributed over
computer bulletin board systems (also quite rarely, despite media
misinformation).
Many viruses have spread through pirated - illegally copied
or broken - games. This is easy to avoid. Pay for your games, fa-
ir and square.
If you use a shared PC or a PC that has public access, such
as one in a college PC lab or a library, be very careful about
putting floppies into that PC`s drives without a write-protect
tab. Carry a virus-checking program and scan the PC before let-
- 95 -
ting it write data onto floppies.
Despite the low incidence of actual viruses, it can`t hurt
to run a virus checking program now and then. There are actually
two kinds of antivirus programs: virus shields, which detect vi-
ruses as they are infecting your PC, and virus scanners, which
detect viruses once they`ve infected you.
Viruses are something to worry about, but not a lot. A litt-
le common sense and the occasional virus scan will keep you vi-
rus-free.
Remember these four points:
* Niruses can`t infect a data or text file.
* Before runnung an antivirus program, but sure to cold-boot
from a write-protected floppy.
* Don`t boot from floppies except reliable DOS disks or your
original production disks.
* Stay away from pirated software.
Vocabulary
fair and square - honestly
it can`t hurt - it`s probably a good idea
Task 4
Decide whether the following statements are true (T) or fal-
se (F) in relation to the information in the text. If you feel a
statement is false, change it to make it true.
1 Viruses cannot be spread through a computer network, only via
floppies transported from computer to computer.
2 The virus will spread as soon as you put the infected floppy in
your PC.
3 The infector works by interfering in some way with the normal
use of your computer.
4 The detonator in Lehigh works by altering what you see on your
screen.
5 Most viruses spread through pirated games.
6 You should run an antivirus program every time you use your
computer.
- 96 -
7 There are not very many viruses in circulation.
8 Virus shields are more effective than virus scanners.
Task 5
These are answers to questions about the text. Write the qu-
estions.
1 Two, one that infects and one that does the damage.
2 By interfering in some way with the normal use of the computer.
3 After it has infected four copies of COMMAND.COM.
4 Every time you access a hard disk subdirectory or a floppy
disk containing COMMAND.COM.
5 Yes, by using your common sense and by occasionally scanning
for them.
Task 6
Look back in the text and find words or phrases with a simi-
lar meaning to:
1 reproduces
2 infect
3 changing
4 immediately
5 complain
Find words or phrases that have an opposite meaning to:
6 reducing
7 removed
8 records
9 ignorant
10 frequently
Computer security
Security breach blamed on `hacker`
12 year-old
hacks into Hacker causes
- 97 -
bank`s database chaos in city hospital
Computer fraud on the increase
Task 7
In pairs, try to answer these questions:
1 Who or what is a `hacker`?
2 How many ways can you think of to make the data in a computer
secure?
Who Knows What Evil Lurks In The Darkest Corner Of Your PC ?
The combined threat of viruses wreaking havoc on your PC and
probing meddlers gaining access to sensitive data can strike lear
into the hearts of even the most mild-mannered PC managers. Re-
lax... XTree Company has the ultimate in PC protection. AllSafe
teams superior virus prevention with access control and security
reporting.
And while most anti-virus products simply scan for known vi-
rus signatures,AllSafe actually looks for the signs of viruses
attemping to replicate. Once a virus is spotted,AllSafe isolates
it,preventing the virus from infecting your PC. IIf the virus is
known,AllSafe quickly removes it. Even if the virus is unk-
nown,AllSafe studies it and leams its signature immediately,let-
ting you automatically update the virus signature database. Then
you can use AllSafe to scan other disks or systems right away be-
fore an infection can spread,without waiting for a new signature
from the software publisher. So,if you use a standalone PC,fear
not! It's over for the evil virus.
Just as scary as the viruses are those characters that at-
tempt to invade your computer files without autorization. AllSa-
fe's flexible password options let you share or limit access to
as much of your hard disk as you wish. AllSafe keeps out the evil
invaders!
When you need a complete solution - protection against both
viruses and unauthorized entry - choose AllSafe. And like all
XTree Company products,they're easy to install and use. For more
- 98 -
information or to find out where you can buy AllSafe, call one of
our distributors:
Softsel UK(081) 568-8866 P&P(0706) 217-744
Ingram Micro UK(0908) 260-160 Frontline (0256) 27890
The flowchart on the following page represents the steps inb
the process by which AllSafe removes viruses from PCs. Using the
information in the advertisement,match each step with the corres-
ponding letter in the flowchart.
1 Virus signature database is updated. a
2 Is virus known? b
3 All Safe scans other disks or systems in order
to prevent further infection immediately. c
4 AllSafe searches for indications that virsuses
are attempting to copy themselves. d
5 AllSafe identifies and isolates the virus. e
6 AllSafe eliminates the known virus. f
7 AllSafe analyses the virus and learns its
signature straight away. g
Task 9
Find words or phrases in the text which mean:
1 wickedness,badness,danger
2 hides(while waiting to attack)
3 causing a lot of damage
4 people who interfere without authorization
5 terrify, make very afraid
6 combines
7 identified,recognized
8 frightening
9 choices
10 attackers
Task 10
Discuss the following questions:
- 99 -
1 What technique does the advertisement use to persuade pe-
ople to buy the product?
2 Do you think the advertisement is succwssful?Give reasons
for your opinion.
3 What other techniques could be used to sell this kind of
software?
Task 11
Design an advertisement for a PC protection package. Your
advertisement should mention all the features listed below,but
you may others. Choose a name,and decide on the best way to pre-
sent your product.
Features
Password protection - system manager controls what each user
is permitted to do
File encryption - plain text messages are converted into
cipher (code)so that only authorized recipients can read them
Keyboard lock - screen is cleared and keyboard is locked af-
ter pre-set period of inactivity
Task 12
Read this news report and discuss the questions that follow.
NSA CONSULTANT'S SON IS COMPUTER SABOTEUR
'Worm' came from graduate student
A court heard today how a Cornell University graduate stu-
dent,Robert T.Morris Jr(25)0,infected a host of government and
educational computer centres with a computer virus, known as a
'worm',which literally brought all computational activity to a
halt in over 6,000 installations. Morris,the son of a prominent
National Security Agency computer consultant,was sentenced for
his offences yesterday. As punishment,he was required to spend no
time in prison but,instead , serve three years ' probation,cont-
ribute 400 hours of community service, and to pay a $10,000 fine
along with associated court probation costs.
- 100 -
1 How serious do you think Robert Morris's crime was?
2 Do you think the punishment was
a too severe?
b about right?
c not severe enough?
3 Do you know of any similar incidents of computer hacking?
WORD-PLAY
Task 13
The words and phrases below are taken from this unit. In pa-
irs or groups,decide if they have a "protective" or a "destructi-
ve" meaning as they are used in the unit, then put them under the
correct heading.
detonator infector erase pirated
infect write-protect tab worm virus scanner
hacker password smart card shield
signature cipher keyboard lock access control
protective destructive
----------- -------------
----------- -------------
----------- ------------
----------- ------------
----------- ------------
----------- ------------
----------- ------------
----------- ------------
How many other ways can you think of to classify them?
Unit 11
Puzzle
1 A computer virus ....... itself so that it can spread from com-
puter to computer.
- 101 -
2 The term used for the part which performs the virus`s main da-
maging work.
3 A computer being inhabited by a virus is called ........ .
4 The term used for a notch on a floppy disk which may be covered
to prevent the disk being written to ......... .
5 What are the 2 kends of antivirus programs .......... .
6 To ......... from infecting your PC special protective software
is used.
7 Flexible ........ let you limit access to your disks.
8 To ....... means to reload the operating system.
9 An entirely self-replicating virus which is not hardware depen-
dent is called a ........ .
10 A program that defects viruses ........ .