Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
English for Students of programming.doc
Скачиваний:
3
Добавлен:
09.11.2019
Размер:
545.28 Кб
Скачать

Intended Viruses

They look like viruses at a glance, but not quite so; they are unable to propagate because of errors. For example, a virus, «forgetting» to place a jump command to its own code to the top of file it infects, or places a jump to incorrect address, or sets the erratic address of the intercepted interrupt (which in most cases hangs the computer) etc.

The main reason of the appearance of intended viruses is incompetent re-compilation of the already existing virus, either because of insufficient knowledge of programming language, or because of not knowing of all the technical subtleties of operating system.

Virus Construction Sets

A virus construction set is an utility program, intended for creating computer viruses. They allow generating of source code of the viruses, object modules and / or infected files themselves.

Some construction sets (VLC, NRLG) have standard windowed interface, allowing menu selection of virus type, target objects (COM and/or EXE), presence or absence of self encrypting, debugging counter measures, internal text strings, etc. Other construction sets (PS-MPC, G2) don’t have an interface and read information about the type of virus from configuration file.

Polymorphic Generators

Polymorphic generators, like virus construction sets, are not viruses in the full sense of the word, because their algorithm does not contain propagation functions, that is opening, closing and writing files, reading and writing sectors etc. The main function of programs such kind is encrypting virus body and generating the corresponding decryptor routine.

Polymorphic generators are usually distributed by their authors without restrictions in the form of an archive file. In any generator archive the main file is an object module, containing this generator.

Read the text, try to understand it and identify the basic forms of «harmful programs».

Программа курса

занятия

Тема

Количество

часов

Занятие 1, 2

Programming

4

Занятие 3

Machine Language

4

Занятие 4

Computer Languages

4

Занятие 5

Compiling Programs

4

Занятие 6

A Short Description of Basic

4

Занятие 7

Virtual Pascal

4

Занятие 8

A Brief History of the Java Lang-e

4

Занятие 9

Delphi

4

Занятие 10

History of C++

4

Занятие 11

What is a Database?

4

Занятие 12

XML Basics

4

Занятие 13

Network Configuration

4

Занятие 14

Compression

4

Занятие 15

Cryptography

4

Занятие 16

«Domania» Rules the World Wide Web

4

1

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]