linkedin post 2019-03-28 05:47:52

Uncategorized
"INTRUSIVE VIRUSES operate by overwriting some or all of the original host code with viral code. The replacement might be selective, as in replacing a subroutine with the virus, or inserting a new interrupt vector and routine. The replacement may also be extensive, as when large portions of the host program are completely replaced by the viral code." https://lnkd.in/eCG7b3z View in LinkedIn
Read More

linkedin post 2019-03-26 05:30:11

Uncategorized
"LIVING ORGANISMS are very complicated aggregations of elementary parts, and by any reasonable theory of probability or thermodynamics highly improbable. That they should occur in the world at all is a miracle of the first magnitude; the only thing which removes, or mitigates, this miracle is that they reproduce themselves. Therefore, if by any peculiar accident there should ever be one of them, from there on the rules of probability do not apply, and there will be many of them, at least if the milieu is reasonable. (John von Neumann, Theory of Self-Reproducing Automata). https://lnkd.in/dvTG5_v View in LinkedIn
Read More

linkedin post 2019-03-28 05:45:39

Uncategorized
ADD-ON VIRUS. "Most viruses are add-on viruses. They function by appending their code to the host code, and/or by relocating the host code and inserting their own code to the beginning. The add-on virus then alters the startup information of the program, executing the viral code before the code for the main program." https://lnkd.in/eCG7b3z View in LinkedIn
Read More

linkedin post 2019-03-25 06:36:45

Uncategorized
COMPUTING MOLECULES. "Paul Rothemund showed chemical processes could perform not just complex, but universal computation: a combination of DNA strands and restriction enzymes could, in principle, simulate a Turing machine. Thus, the simplest kinds of chemistry can, in theory, perform any computation.” https://lnkd.in/dhc7k7H View in LinkedIn
Read More

linkedin post 2019-03-28 05:42:06

Uncategorized
"COMPANION VIRUS, is not really a virus at all, but a form of trojan horse that uses the execution path mechanism to execute in place of a normal program. Unlike all other viral forms, it does not alter any existing code in any fashion: companion viruses create new executable files with a name similar to an existing program, and chosen so that they are normally executed prior to the “real” program." https://lnkd.in/eCG7b3z View in LinkedIn
Read More

linkedin post 2019-03-27 05:35:53

Uncategorized
VIROID. "True viruses have two major components: one that handles the spread of the virus, and a “payload” or “manipulation” task. The payload task may not be present (has null effect), or it may await a set of predetermined circumstances before triggering." https://lnkd.in/eCG7b3z View in LinkedIn
Read More

linkedin post 2019-03-27 05:31:25

Uncategorized
WORMS VERSUS VIRUSES. "Worms are another form of software that is often referred to as a computer virus. Unlike viruses, worms are programs that can run independently and travel from machine to machine across network connections; worms may have portions of themselves running on many different machines. Worms do not change other programs, although they may carry other code that does, such as a true virus." https://lnkd.in/eCG7b3z View in LinkedIn
Read More

linkedin post 2019-03-27 05:26:45

Uncategorized
WORM TRACKS. "The computer 'worm' is so-called because of the way in which 'rogue' computer code was originally detected. Printouts of computer memory locations would show random 'wormhole' patterns, much like that of the patterns on worm-eaten wood. The term eventually became shortened and used to describe viruses that could 'worm' or propagate across networks and the Internet, leaving copies of themselves as they travelled." https://lnkd.in/dhKz_EK View in LinkedIn
Read More

linkedin post 2019-03-27 05:24:24

Uncategorized
"A WORM is a piece of code that can make fully functional copies of itself and travel through a computer network and/or across the Internet through a number of means. A worm does not attach themselves to other programs like traditional viruses, but creates copies of itself, which in turn create even more copies." https://lnkd.in/dhKz_EK View in LinkedIn
Read More