Wednesday, February 24, 2010

Computer virus.

A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer
The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan is a program that appears harmless but hides malicious functions. Worms and Trojans, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious and go unnoticed.

History

The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s Creeper was an experimental self-replicating program written by Bob Thomas at BBN Technologies in 1971.Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The Reaper program was created to delete Creeper.
A program called "Rother J" was the first computer virus to appear "in the wild" — that is, outside the single computer or lab where it was created. Written in 1981 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk. This virus, created as a practical joke when Skrenta was still in high school, was injected in a game on a floppy disk. On its 50th use the Elk Cloner virus would be activated, infecting the computer and displaying a short poem beginning "Elk Cloner: The program with a personality."
The first PC virus in the wild was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi Brothers in Lahore, Pakistan, reportedly to deter piracy of the software they had written However, analysts have claimed that the Ashar virus, a variant of Brain, possibly predated it based on code within the virus.[original research?]
Before computer networks became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of the personal computer, many users regularly exchanged information and programs on floppies. Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector, ensuring that they would be run when the user booted the computer from the disk, usually inadvertently. PCs of the era would attempt to boot first from a floppy if one had been left in the drive. Until floppy disks fell out of use, this was the most successful infection strategy and boot sector viruses were the most common in the wild for many years.
Traditional computer viruses emerged in the 1980s, driven by the spread of personal computers and the resultant increase in BBS, modem use, and software sharing. Bulletin board-driven software sharing contributed directly to the spread of Trojan horse programs, and viruses were written to infect popularly traded software. Shareware and bootleg software were equally common vectors for viruses on BBS's.[citation needed] Within the "pirate scene" of hobbyists trading illicit copies of retail software, traders in a hurry to obtain the latest applications were easy targets for viruses.[original research?]
Macro viruses have become common since the mid-1990s. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel and spread throughout Microsoft Office by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most could also spread to Macintosh computers. Although most of these viruses did not have the ability to send infected e-mail, those viruses which did took advantage of the Microsoft Outlook COM interface.[citation needed]
Some old versions of Microsoft Word allow macros to replicate themselves with additional blank lines. If two macro viruses simultaneously infect a document, the combination of the two, if also self-replicating, can appear as a "mating" of the two and would likely be detected as a virus unique from the "parents"
A virus may also send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend (a trusted source) follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating.
Viruses that spread using cross-site scripting were first reported in 2002, and were academically demonstrated in 2005] There have been multiple instances of the cross-site scripting viruses in the wild, exploiting websites such as MySpace and Yahoo.

Infection strategies

Infection strategies

In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs. If a user attempts to launch an infected program, the virus' code may be executed simultaneously. Viruses can be divided into two types based on their behavior when they are executed. Nonresident viruses immediately search for other hosts that can be infected, infect those targets, and finally transfer control to the application program they infected. Resident viruses do not search for hosts when they are started. Instead, a resident virus loads itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed by other programs or the operating system itself.

[edit] Nonresident viruses

Nonresident viruses can be thought of as consisting of a finder module and a replication module. The finder module is responsible for finding new files to infect. For each new executable file the finder module encounters, it calls the replication module to infect that file.

Resident viruses

Resident viruses contain a replication module that is similar to the one that is employed by nonresident viruses. This module, however, is not called by a finder module. The virus loads the replication module into memory when it is executed instead and ensures that this module is executed each time the operating system is called to perform a certain operation. The replication module can be called, for example, each time the operating system executes a file. In this case the virus infects every suitable program that is executed on the computer.
Resident viruses are sometimes subdivided into a category of fast infectors and a category of slow infectors. Fast infectors are designed to infect as many files as possible. A fast infector, for instance, can infect every potential host file that is accessed. This poses a special problem when using anti-virus software, since a virus scanner will access every potential host file on a computer when it performs a system-wide scan. If the virus scanner fails to notice that such a virus is present in memory the virus can "piggy-back" on the virus scanner and in this way infect all files that are scanned. Fast infectors rely on their fast infection rate to spread. The disadvantage of this method is that infecting many files may make detection more likely, because the virus may slow down a computer or perform many suspicious actions that can be noticed by anti-virus software. Slow infectors, on the other hand, are designed to infect hosts infrequently. Some slow infectors, for instance, only infect files when they are copied. Slow infectors are designed to avoid detection by limiting their actions: they are less likely to slow down a computer noticeably and will, at most, infrequently trigger anti-virus software that detects suspicious behavior by programs. The slow infector approach, however, does not seem very successful.

Vectors and hosts

Viruses have targeted various types of transmission media or hosts. This list is not exhaustive:
PDFs, like HTML, may link to malicious code.[citation needed]PDFs can also be infected with malicious code.
In operating systems that use file extensions to determine program associations (such as Microsoft Windows), the extensions may be hidden from the user by default. This makes it possible to create a file that is of a different type than it appears to the user. For example, an executable may be created named "picture.png.exe", in which the user sees only "picture.png" and therefore assumes that this file is an image and most likely is safe.
An additional method is to generate the virus code from parts of existing operating system files by using the CRC16/CRC32 data. The initial code can be quite small (tens of bytes) and unpack a fairly large virus. This is analogous to a biological "prion" in the way it works but is vulnerable to signature based detection. This attack has not yet been seen "in the wild".

Methods to avoid detection

In order to avoid detection by users, some viruses employ different kinds of deception. Some old viruses, especially on the MS-DOS platform, make sure that the "last modified" date of a host file stays the same when the file is infected by the virus. This approach does not fool anti-virus software, however, especially those which maintain and date Cyclic redundancy checks on file changes.
Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files. These are called cavity viruses. For example, the CIH virus, or Chernobyl Virus, infects Portable Executable files. Because those files have many empty gaps, the virus, which was 1 KB in length, did not add to the size of the file.
Some viruses try to avoid detection by killing the tasks associated with antivirus software before it can detect them.
As computers and operating systems grow larger and more complex, old hiding techniques need to be updated or replaced. Defending a computer against viruses may demand that a file system migrate towards detailed and explicit permission for every kind of file access.

]A virus needs to infect hosts in order to spread further. In some cases, it might be a bad idea to infect a host program. For example, many anti-virus programs perform an integrity check of their own code. Infecting such programs will therefore increase the likelihood that the virus is detected. For this reason, some viruses are programmed not to infect programs that are known to be part of anti-virus software. Another type of host that viruses sometimes avoid are bait files. Bait files (or goat files) are files that are specially created by anti-virus software, or by anti-virus professionals themselves, to be infected by a virus. These files can be created for various reasons, all of which are related to the detection of the virus:

  • Anti-virus professionals can use bait files to take a sample of a virus (i.e. a copy of a program file that is infected by the virus). It is more practical to store and exchange a small, infected bait file, than to exchange a large application program that has been infected by the virus.
  • Anti-virus professionals can use bait files to study the behavior of a virus and evaluate detection methods. This is especially useful when the virus is polymorphic. In this case, the virus can be made to infect a large number of bait files. The infected files can be used to test whether a virus scanner detects all versions of the virus.
  • Some anti-virus software employs bait files that are accessed regularly. When these files are modified, the anti-virus software warns the user that a virus is probably active on the system.
Since bait files are used to detect the virus, or to make detection possible, a virus can benefit from not infecting them. Viruses typically do this by avoiding suspicious programs, such as small program files or programs that contain certain patterns of 'garbage instructions'.
A related strategy to make baiting difficult is sparse infection. Sometimes, sparse infectors do not infect a host file that would be a suitable candidate for infection in other circumstances. For example, a virus can decide on a random basis whether to infect a file or not, or a virus can only infect host files on particular days of the week.

Stealth

Some viruses try to trick antivirus software by intercepting its requests to the operating system. A virus can hide itself by intercepting the antivirus software’s request to read the file and passing the request to the virus, instead of the OS. The virus can then return an uninfected version of the file to the antivirus software, so that it seems that the file is "clean". Modern antivirus software employs various techniques to counter stealth mechanisms of viruses. The only completely reliable method to avoid stealth is to boot from a medium that is known to be clean.

Self-modification

Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for so-called virus signatures. A signature is a characteristic byte-pattern that is part of a certain virus or family of viruses. If a virus scanner finds such a pattern in a file, it notifies the user that the file is infected. The user can then delete, or (in some cases) "clean" or "heal" the infected file. Some viruses employ techniques that make detection by means of signatures difficult but probably not impossible. These viruses modify their code on each infection. That is, each infected file contains a different variant of the virus.

Encryption with a variable key

A more advanced method is the use of simple encryption to encipher the virus. In this case, the virus consists of a small decrypting module and an encrypted copy of the virus code. If the virus is encrypted with a different key for each infected file, the only part of the virus that remains constant is the decrypting module, which would (for example) be appended to the end. In this case, a virus scanner cannot directly detect the virus using signatures, but it can still detect the decrypting module, which still makes indirect detection of the virus possible. Since these would be symmetric keys, stored on the infected host, it is in fact entirely possible to decrypt the final virus, but this is probably not required, since self-modifying code is such a rarity that it may be reason for virus scanners to at least flag the file as suspicious.
An old, but compact, encryption involves XORing each byte in a virus with a constant, so that the exclusive-or operation had only to be repeated for decryption. It is suspicious for a code to modify itself, so the code to do the encryption/decryption may be part of the signature in many virus definitions.

Polymorphic code

Polymorphic code was the first technique that posed a serious threat to virus scanners. Just like regular encrypted viruses, a polymorphic virus infects files with an encrypted copy of itself, which is decoded by a decryption module. In the case of polymorphic viruses, however, this decryption module is also modified on each infection. A well-written polymorphic virus therefore has no parts which remain identical between infections, making it very difficult to detect directly using signatures. Antivirus software can detect it by decrypting the viruses using an emulator, or by statistical pattern analysis of the encrypted virus body. To enable polymorphic code, the virus has to have a polymorphic engine (also called mutating engine or mutation engine) somewhere in its encrypted body. See Polymorphic code for technical detail on how such engines operate.
Some viruses employ polymorphic code in a way that constrains the mutation rate of the virus significantly. For example, a virus can be programmed to mutate only slightly over time, or it can be programmed to refrain from mutating when it infects a file on a computer that already contains copies of the virus. The advantage of using such slow polymorphic code is that it makes it more difficult for antivirus professionals to obtain representative samples of the virus, because bait files that are infected in one run will typically contain identical or similar samples of the virus. This will make it more likely that the detection by the virus scanner will be unreliable, and that some instances of the virus may be able to avoid detection.

Metamorphic code

To avoid being detected by emulation, some viruses rewrite themselves completely each time they are to infect new executables. Viruses that utilize this technique are said to be metamorphic. To enable metamorphism, a metamorphic engine is needed. A metamorphic virus is usually very large and complex. For example, W32/Simile consisted of over 14000 lines of Assembly language code, 90% of which is part of the metamorphic engine.

Vulnerability and countermeasures

The vulnerability of operating systems to viruses

Just as genetic diversity in a population decreases the chance of a single disease wiping out a population, the diversity of software systems on a network similarly limits the destructive potential of viruses.
This became a particular concern in the 1990s, when Microsoft gained market dominance in desktop operating systems and office suites. The users of Microsoft software (especially networking software such as Microsoft Outlook and Internet Explorer) are especially vulnerable to the spread of viruses. Microsoft software is targeted by virus writers due to their desktop dominance, and is often criticized for including many errors and holes for virus writers to exploit. Integrated and non-integrated Microsoft applications (such as Microsoft Office) and applications with scripting languages with access to the file system (for example Visual Basic Script (VBS), and applications with networking features) are also particularly vulnerable.
Although Windows is by far the most popular operating system for virus writers, some viruses also exist on other platforms. Any operating system that allows third-party programs to run can theoretically run viruses. Some operating systems are less secure than others. Unix-based OS's (and NTFS-aware applications on Windows NT based platforms) only allow their users to run executables within their own protected memory space.
An Internet based research revealed that there were cases when people willingly pressed a particular button to download a virus. Security analyst Didier Stevens ran a half year advertising campaign on Google AdWords which said "Is your PC virus-free? Get it infected here!". The result was 409 clicks
As of 2006, there are relatively few security exploits targeting Mac OS X (with a Unix-based file system and kernel). The number of viruses for the older Apple operating systems, known as Mac OS Classic, varies greatly from source to source, with Apple stating that there are only four known viruses, and independent sources stating there are as many as 63 viruses. Many Mac OS Classic viruses targeted the HyperCard authoring environment. Virus vulnerability between Macs and Windows is a chief selling point, one that Apple uses in their Get a Mac advertising In January 2009, Symantec announced discovery of a trojan that targets Macs. This discovery did not gain much coverage until April 2009.
While Linux, and Unix in general, has always natively blocked normal users from having access to make changes to the operating system environment, Windows users are generally not. This difference has continued partly due to the widespread use of administrator accounts in contemporary versions like XP. In 1997, when a virus for Linux was released – known as "Bliss" – leading antivirus vendors issued warnings that Unix-like systems could fall prey to viruses just like Windows.The Bliss virus may be considered characteristic of viruses – as opposed to worms – on Unix systems. Bliss requires that the user run it explicitly (so it is a trojan), and it can only infect programs that the user has the access to modify. Unlike Windows users, most Unix users do not log in as an administrator user except to install or configure software; as a result, even if a user ran the virus, it could not harm their operating system. The Bliss virus never became widespread, and remains chiefly a research curiosity. Its creator later posted the source code to Usenet, allowing researchers to see how it worked.

The role of software development

Because software is often designed with security features to prevent unauthorized use of system resources, many viruses must exploit software bugs in a system or application to spread. Software development strategies that produce large numbers of bugs will generally also produce potential exploits.

Anti-virus software and other preventive measures

Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. There are two common methods that an anti-virus software application uses to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. This works by examining the content of the computer's memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives), and comparing those files against a database of known virus "signatures". The disadvantage of this detection method is that users are only protected from viruses that pre-date their last virus definition update. The second method is to use a heuristic algorithm to find viruses based on common behaviors. This method has the ability to detect viruses that anti-virus security firms have yet to create a signature for.
Some anti-virus programs are able to scan opened files in addition to sent and received e-mails 'on the fly' in a similar manner. This practice is known as "on-access scanning." Anti-virus software does not change the underlying capability of host software to transmit viruses. Users must update their software regularly to patch security holes. Anti-virus software also needs to be regularly updated in order to prevent the latest threats.
One may also minimize the damage done by viruses by making regular backups of data (and the operating systems) on different media, that are either kept unconnected to the system (most of the time), read-only or not accessible for other reasons, such as using different file systems. This way, if data is lost through a virus, one can start again using the backup (which should preferably be recent).
If a backup session on optical media like CD and DVD is closed, it becomes read-only and can no longer be affected by a virus (so long as a virus or infected file was not copied onto the CD/DVD). Likewise, an operating system on a bootable CD can be used to start the computer if the installed operating systems become unusable. Backups on removable media must be carefully inspected before restoration. The Gammima virus, for example, propagates via removable flash drives.

] Recovery methods

Once a computer has been compromised by a virus, it is usually unsafe to continue using the same computer without completely reinstalling the operating system. However, there are a number of recovery options that exist after a computer has a virus. These actions depend on severity of the type of virus.

Virus removal

One possibility on Windows Me, Windows XP, Windows Vista and Windows 7 is a tool known as System Restore, which restores the registry and critical system files to a previous checkpoint. Often a virus will cause a system to hang, and a subsequent hard reboot will render a system restore point from the same day corrupt. Restore points from previous days should work provided the virus is not designed to corrupt the restore files or also exists in previous restore points Some viruses, however, disable system restore and other important tools such as Task Manager and Command Prompt. An example of a virus that does this is CiaDoor. However, a CiaDoor can be routed, if the user turns on their computer, opens in safe mode and then tries to open the necessary tools such as System Restore.
Administrators have the option to disable such tools from limited users for various reasons (for example, to reduce potential damage from and the spread of viruses). The virus modifies the registry to do the same, except, when the Administrator is controlling the computer, it blocks all users from accessing the tools. When an infected tool activates, it gives the message "Task Manager has been disabled by your administrator.", even if the user trying to open the program is the administrator.[citation needed]
Users running a Microsoft operating system can access Microsoft's website to run a free scan, provided they have their 20-digit registration number.

Operating system reinstallation

Reinstalling the operating system is another approach to virus removal. It involves simply reformatting the computer's hard drive and installing the OS from its original media, or restoring the partition with a clean backup image.
This method has the benefits of being simple to do, being faster than running multiple antivirus scans, and is guaranteed to remove any malware. Downsides include having to reinstall all other software, reconfiguring, restoring user preferences. User data can be backed up by booting off of a Live CD or putting the hard drive into another computer and booting from the other computer's operating system.
Care must be taken when restoring anything from an infected system to avoid transferring the virus to the new computer along with the restored data


 


 



COMPUTER VIRUSES..

 Virus hoax

A computer virus hoax is a message warning the recipient of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipient to forward it to everyone they know.

Identification

Most hoaxes are sensational in nature and easily identified by the fact that they indicate that the virus will do nearly impossible things, like blow up the recipient's computer and set it on fire, or less sensationally, delete everything on the user's computer. They often include announcements claimed to be from reputable organizations such as Microsoft, IBM, or news sources such as CNN and include emotive language and encouragement to forward the message. These sources are quoted in order to add credibility to the hoax.
Virus hoaxes are usually harmless and accomplish nothing more than annoying people who identify it as a hoax and waste the time of people who forward the message. Nevertheless, a number of hoaxes have warned users that vital system files are viruses and encourage the user to delete the file, possibly damaging the system. Examples of this type include the jdbgmgr.exe virus hoax and the SULFNBK.EXE hoax.
Some consider virus hoaxes and other chain e-mails to be a computer worm in and of themselves. They replicate by exploiting users' ignorance or emotional responses.
Hoaxes are not to be confused with computer pranks. Computer pranks are programs that perform unwanted and annoying actions on a computer, such as randomly moving the mouse.

Action

Anti-virus specialists agree that recipients should delete virus hoaxes when they receive them, instead of forwarding them.
McAfee says:We are advising users who receive the email to delete it and DO NOT pass it on as this is how an email HOAX propagates

List of computer virus hoaxes

Name Alias(es) Origin Author Description
AIDS (none) Unknown Unknown Not to be confused with AIDS (computer virus) or AIDS (trojan horse), this hoax is about a non-existent virus that is purportedly distributed via electronic mail messages that have "OPEN: VERY COOL! :)" as their subjects.
Antichrist (none) Monmouth(uk) Dylan Nicholas This is a hoax that warned about a supposed virus discovered by Microsoft and McAfee named "Antichrist", telling the user that it is installed via an e-mail with the subject line: "SURPRISE?!!!!!!!!!!" after which it destroys the zeroth sector of the hard disk, rendering it unusable.
Budweiser Frogs BUDSAVER.EXE Unknown Unknown Supposedly would erase the user's hard drive and steal the user's screen name and password.
Goodtimes virus (none) Unknown Unknown Warnings about a computer virus named "Good Times" began being passed around among Internet users in 1994. The Goodtimes virus was supposedly transmitted via an email bearing the subject header "Good Times" or "Goodtimes," hence the virus's name, and the warning recommended deleting any such email unread. The virus described in the warnings did not exist, but the warnings themselves, were, in effect, virus-like.
Invitation attachment (computer virus hoax) (Allright now/I'm just sayin) Michiana Shores, Long Beach, Jamestown Manor, Michigan City (IN), Schaumburg (IL) Jim Flanagan The invitation virus hoax involved an e-mail spam in 2006 that advised computer users to delete an email, with any type of attachment that stated "invitation" because it was a computer virus. This is also known as the Olympic Torch virus hoax (see below).
Jdbgmgr.exe (bear.a) Unknown Unknown The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).
Life is beautiful Life is wonderful Unknown Supposedly, a hacker with the alias "Life owner" or "Dono da vida" The hoax was spread through the Internet around January 2001 in Brazil. It told of a virus attached to an e-mail, which was spread around the Internet. The attached file was supposedly called "Life is beautiful.pps" or "La vita è bella.pps".
NVISION DESIGN, INC. games ("Frogapult," "Elfbowl") Sometimes included their other game "Y2KGame" Unknown Unknown Programs were actual, legitimate computer games; author claimed that they were viruses which would "wipe out" the user's hard drive on Christmas Day.
Olympic Torch Postcard or Postcard from Hallmark Unknown Unknown Olympic Torch is a computer virus hoax sent out by e-mail. The hoax e-mails first appeared in February 2006. The "virus" referred to by the e-mail does not actually exist. The hoax e-mail warns recipients of a recent outbreak of "Olympic Torch" viruses, contained in e-mails titled "Invitation", which erase the hard disk of the user's computer when opened. The hoax email further purports the virus to be acknowledged by such reputable sources as CNN, McAfee and Microsoft as one of the most dangerous viruses yet reported. Of course this email, which was started in February 2006, is safe to delete when you want.
SULFNBK.EXE Warning none Unknown Unknown SULFNBK.EXE (short for Setup Utility for Long File Name Backup) is an internal component of the Microsoft Windows operating system (in Windows 98 and Windows Me) for restoring long file names. The component became famous in the early 2000s as the subject of an e-mail hoax. The hoax claimed that SULFNBK.EXE was a virus, and contained instructions to locate and delete the file. While the instructions worked, they were needless and (in some rare cases, for example, when the long file names are damaged and need to be restored) can cause disruptions, as SULFNBK.EXE is not a virus, but instead an operating system component.
Guts to Say Jesus Wobbler, California, among many others Unknown Unknown Warns about a virus that is a modified version of Norton UtilitiesMicrosoft Windows and Macintosh computers.[citation needed] modified by a "very sick individual" which works on both

 Parodies

The virus hoax has become part of the culture of the twenty-first century and the gullibility of novice computer users convinced to delete files on the basis of hoaxes has been parodied in several popular jokes and songs.
One such parody is "Weird Al" Yankovic's song "Virus Alert" from the album Straight Outta Lynwood. The song makes fun of the exaggerated claims that are made in virus hoaxes, such as legally changing your name.
Another parody of virus hoaxes is the honor system virus which has been cirulated under the name AmishIrish Computer Virus, the Syrian Computer Virus, the Norwegian Computer Virus, Newfie Virus, the Unix Computer Virus, the Mac OS 9 virus, Discount virus and many others. This joke email claims to be authored by the Amish or other similar low-technology population who have no computers, programming skills or electricity to create viruses and thus ask you to delete your own hard drive contents manually after forwarding the message to your friends. Computer Virus, manual virus, the Blond Computer Virus, the
The Tuxissa virus is another parody of the virus hoax, based on the concept of the Melissa virus, but with its aim of installing Linux on the victim's computer without the owner's permission. The story says that it was spread via e-mail, contained in a message titled "Important Message About Windows Security". It was supposed to first spread the virus to other computers, then download a stripped-down version of Slackware and uncompress it onto the hard disk. The Windows Registry is finally deleted and the boot options changed. Then the virus removes itself when it reboots the computer at the end, with the user facing the Linux login prompt and all his Windows security problems solved for him.

 


 


 

 



Tuesday, February 23, 2010

FEAR..

Fear is an emotional response to a perceived threat. It is a basic survival mechanism occurring in response to a specific stimulus, such as pain or the threat of danger. Some psychologistsJohn B. Watson, Robert Plutchik, and Paul Ekman have suggested that fear is one of a small set of basic or innate emotions. This set also includes such emotions as joy, sadness, and anger. Fear should be distinguished from the related emotional state of anxiety, which typically occurs without any external threat. Additionally, fear is related to the specific behaviors of escape and avoidance, whereas anxiety is the result of threats which are perceived to be uncontrollable or unavoidable.[1] Worth noting is that fear almost always relates to future events, such as worsening of a situation, or continuation of a situation that is unacceptable. Fear could also be an instant reaction, to something presently happening. such as

Etymology

The Old English term fear meant not the emotion engendered by a calamity or disaster, but rather the event itself. The first recorded usage of the term "fear" with the sense of the “emotion of fear” is found in a medieval work written in Middle English, composed circa 1290. The most probable explanation for the change in the meaning of the word "fear" is the existence in Old English of the related verb frighten, which meant “to terrify, take by surprise
A vivid description of fear was provided by Charles Darwin in his book, The Expression of the Emotions in Man and Animals:
Fear is often preceded by astonishment, and is so far akin to it, that both lead to the senses of sight and hearing being instantly aroused. In both cases the eyes and mouth are widely opened, and the eyebrows raised. The frightened man at first stands like a statue motionless and breathless, or crouches down as if instinctively to escape observation. The heart beats quickly and violently, so that it palpitates or knocks against the ribs... That the skin is much affected under the sense of great fear, we see in the marvelous manner in which perspiration immediately exudes from it... The hairs also on the skin stand erect; and the superficial muscles shiver. In connection with the disturbed action of the heart, the breathing is hurried. The salivary glands act imperfectly; the mouth becomes dry, and is often opened and shut
The facial expression of fear includes the widening of the eyes (out of anticipation for what will happen next); the pupils dilate (to take in more light); the upper lip rises, the brows draw together, and the lips stretch horizontally. The physiological effects of fear can be better understood from the perspective of the sympathetic nervous responses (fight-or-flight), as compared to the parasympathetic response, which is a more relaxed state. Muscles used for physical movement are tightened and primed with oxygen, in preparation for a physical fight-or-flight response. Perspiration occurs due to blood being shunted from body's viscera to the peripheral parts of the body. Blood that is shunted from the viscera to the rest of the body will transfer, along with oxygen and nutrients, heat, prompting perspiration to cool the body. When the stimulus is shocking or abrupt, a common reaction is to cover (or otherwise protect) vulnerable parts of the anatomy, particularly the face and head. When a fear stimulus occurs unexpectedly, the victim of the fear response could possibly jump or give a small start. The person's heart-rate and heartbeat may quicken.

Varieties

Fear can be described with different terms in relation to the degree of fear that is experienced. It varies from mild caution to extreme phobia and paranoia. Fear is related to a number of additional cognitive and emotional states including worry, anxiety, terror, horror, panic, and dread. Experiences of fear can remain long after exposure in the unconscious mind, where they may then manifest as nightmares, or, in an even stronger form, night terrors. Fear may also be experienced within a larger group or social network, and may be compounded by social influence and become mass hysteria. Some pathologies related to fear (defined by persistent and irrational fears) can include different types of anxiety disorder which are very common, and also other more severe illnesses like the extreme phase of bipolar disorder and some kinds of schizophrenia.
The experience of distrust can be explained as a feeling of mild fear or caution, usually in response to an unfamiliar or potentially dangerous person. Distrust may occur as a feeling of warning towards someone or something that is questionable or unknown. For example, one may distrust a stranger who acts in a way that is perceived as odd or unusual. Likewise, one may distrust the safety of a rusty old bridge across a 100-foot drop. Distrust may serve as an adaptive, early warning signal for situations that could lead to greater fear and danger. Reassurance can usually disolve a fear like this e.g. repeatedly doing something to gain trust in it.
Terror is an acute and pronounced form of fear. It is an overwhelming sense of immediate personal danger. It can also be caused by perceiving the object of a phobia. Terror may overwhelm a person to the point of making irrational choices and atypical behavior. Paranoia is a term used to describe a psychosis of fear. It is experienced as long-standing feelings and perceptions of being persecuted. Paranoia is an extreme emotional state combined with cognitions or, more specifically, delusions that one is in danger. This degree of fear may indicate that a person has changed his or her normal behavior in extreme or maladaptive ways.

Thrill of Fear

Fear is usually perceived as a negative emotion--something to be afraid of or feared in itself. What keeps fear from being something enjoyable, may be the inability to have any control. When fear comes upon us out of the blue we have little or no awareness of it. We can assume how we might react in certain situations but until the situation is upon us we may find that we react completely differently. There are definitely many thrill seekers out there who thrive on being petrified. This can be seen in extreme sports or the adrenaline rush of a roller-coaster ride at a theme park. There are many types of fear but they are nearly all related to the known outcomes of the cause.

Common fears

According to surveys, some of the most commonly feared objects are spiders, snakes, heights, water, enclosed spaces, tunnels and bridges, social rejection, failure, and public speaking. In an innovative test of what people fear the most, Bill Tancer analyzed the most frequent online search queries that involved the phrase, "fear of...". This follows the assumption that people tend to seek information on the issues that concern them the most. His top ten list of fears consisted of flying, heights, clowns, intimacy, death, rejection, people, snakes, success, and driving
Another common fear can be of pain, or of someone damaging a person. Fear of pain in a plausible situation brings flinching, or cringing. Some people turn this into a game, where one throws a punch at the other, then hits them if they flinch. This is not a great idea, as flinching is a bodily reaction to danger and is a very sensitive feature, and must be treated as such.
In a 2005 Gallup poll (U.S.A.), a national sample of adolescents between the ages of 13 and 15 were asked what they feared the most. The question was open ended and participants were able to say whatever they wanted. The most frequently cited fear (mentioned by 8% of the teens) was terrorism. The top ten fears were, in order: terrorist attacks, spiders, death, being a failure, war, heights, criminal or gang violence, being alone, the future, and nuclear war

Neurobiology

The amygdala is a key brain structure in the neurobiology of fear. It is involved in the processing of negative emotions (such as fear and anger). Researchers have observed hyperactivity in the amygdala when patients who were shown threatening faces or confronted with frightening situations. Patients with a more severe social phobia showed a correlation with increased response in the amygdala. Studies have also shown that subjects exposed to images of frightened faces, or faces of people from another race[citation needed], exhibit increased activity in the amygdala.
The fear response generated by the amygdala can be mitigated by another brain region known as the rostral anterior cingulate cortex, located in the frontal lobe. In a 2006 study at Columbia University, researchers observed that test subjects experienced less activity in the amygdala when they consciously perceived fearful stimuli than when they unconsciously perceived fearful stimuli. In the former case, they discovered the rostral anterior cingulate cortex activates to dampen activity in amygdala, granting the subjects a degree of emotional control
The role of the amygdala in the processing of fear-related stimuli has been questioned by research upon those in which it is bilateral damaged. Even in the absence of their amygdala, they still react rapidly to fearful faces.[8]
Suppression of amygdala activity can also be achieved by pathogens. Rats infected with the toxoplasmosis parasite become less fearful of cats, sometimes even seeking out their urine-marked areas. This behavior often leads to them being eaten by cats. The parasite then reproduces within the body of the cat. There is evidence that the parasite concentrates itself in the amygdala of infected rats

 

Fear and death

Psychologists have addressed the hypothesis that fear of death motivates religious commitment, and that it may be alleviated by assurances about an afterlife. Empirical research on this topic has been equivocal.[citation needed] According to Kahoe and Dunn, people who are most firm in their faith and attend religious services weekly are the least afraid of dying. People who hold a loose religious faith are the most anxious, and people who are not religious are intermediate in their fear of death. A survey of people in various Christian denominations showed a positive correlation between fear of death and dogmatic adherence to religious doctrine. In other words, Christian fundamentalism and other strict interpretations of the Bible are associated with greater fear of death. Furthermore, some religious orientations were more effective than others in allaying that fear
In another study, data from a sample of white, Christian men and women were used to test the hypothesis that traditional, church-centered religiousness and de-institutionalized spiritual seeking are distinct ways of approaching fear of death in old age. Both religiousness and spirituality were related to positive psychosocial functioning, but only church-centered religiousness protected subjects against the fear of death.fear of death is also known as death anxiety. This may be a more accurate label because, like other anxieties, the emotional state in question is long lasting and not typically linked to a specific stimulus. The analysis of fear of death, death anxiety, and concerns over mortality is an important feature of existentialism and terror management theory

 


 


 


Success


Social status

In sociology or anthropology, social status is the honor or prestigesocietysocial position). 

Social status, the position or rank of a person or group within the society, can be determined two ways. One can earn their social status by their own achievements, which is known as achieved status. Alternatively, one can be placed in the stratification system by their inherited position, which is called ascribed status.

Status in different societies

Status refers to the relative rank that an individual holds; this includes attendant rights, duties, and lifestyle, in a social hierarchy based upon honor or prestige. Status has two different types that come along with it: achieved, and ascribed. The word status refers to social stratification on a vertical scale.
In modern societies, occupation is usually thought of as the main determinant of status, but other memberships or affiliations (such as ethnic group, religion, gender, voluntary associations, fandom, hobby) can have an influence. The importance of social status can be seen in the peer status hierarchy of geeks, athletes, cheerleaders, nerds, and weirdos in American high schools.[1][2]Achieved status is when people are placed in the stratification structure based on their individual merits or achievements. This status can be achieved through education, occupation, and marital status. Their place within the stratification structure is determined by society's bar which often judges them on success, success being financial, academic, political and so on. People who achieve a high hierarchical social status often display the following qualities: confidence, generosity, intelligence, mental and emotional stability, and happiness.[3] America most commonly uses this form of status with jobs. The higher you are in rank the better off you are and the more control you have over your co-workers.
In pre-modern societies, status differentiation is widely varied. In some cases it can be quite rigid and class based, such as with the Indian caste system. In other cases, status exists without class and/or informally, as is true with some Hunter-Gatherer societies such as the Khoisan, and some Indigenous Australian societies. In these cases, status is limited to specific personal relationships. For example, a Khoisan man is expected to take his wife's mother quite seriously (a non-joking relationship), although the mother-in-law has no special "status" over anyone except her son-in-law—and only then in specific contexts. All societies have a form of social status.
Status is an important idea in social stratification. Max Weber distinguishes status from social class[citation needed], though some contemporary empirical sociologists add the two ideas to create socioeconomic status or SES, usually operationalised as a simple index of income, education and occupational prestige.

Inborn and acquired status

 

Based on inborn characteristics, such as gender, are called ascribed statuses, while statuses that individuals gained through their own efforts are called achieved statuses. Specific behaviors are associated with social stigmas which can affect status.
Ascribed Status is when one's position is inherited through family. Monarchy is a widely-recognized use of this method, to keep the rulers in one family. This usually occurs at birth without any reference as to how that person may turn out to be a good or bad leader

Social mobility and social status

Status can be changed through a process of Social Mobility. Social mobility is change of position within the stratification system. A move in status can be upward (upward mobility), or downward (downward mobility). Social mobility allows a person to move to another social status other than the one he or she was born in. Social mobility is more frequent in societies where achievement rather than ascription is the primary basis for social status.
Social mobility is especially prominent in the United States in recent years with an ever-increasing number of women entering into the workplace as well as a steady increase in the number of full-time college students. This increased education as well as the massive increase in multiple household incomes has greatly contributed to the rise in social mobility obtained by so many today. With this upward mobility; however, comes the philosophy of "Keeping up with the Joneses" that so many Americans obtain. Although this sounds good on the surface, it actually poses a problem because millions of Americans are in credit card debt due to conspicuous consumption and purchasing goods that they do not have the money to pay for.

Social stratification

Social stratification describes the way in which people are placed with society. It is associated with the ability of individuals to live up to some set of ideals or principles regarded as important by the society or some social group within it. The members of a social group interact mainly within their own group and to a lesser degree with those of higher or lower status.
Groups:
  • Wealth and Income (most common): Ties between persons with the same personal income
  • Gender: Ties between persons of the same sex and sexuality
  • Political Status: Ties between persons of the same political views/status
  • Religion: Ties between persons of the same religion
  • Ethnicity/Race: Ties between persons of the same ethnic/racial group
  • Social Class: Ties between persons born into the same group