INTRODUCTION:
Now that the Internet has become such a common and popular rendezvous, virus-writers and programmers have stronger incentives than ever before to create new viruses that demolish files and wreak havoc on the computers that they infect. Why do people choose to do this one would ask? Because they simply can and will: typically, virus-inventors have nothing else better to do with their mundane existences so they try to make others’ lives equally as miserable by programming new and more malicious viruses to cause headaches in the people whose computers they penetrate. As a result, counter-measures have been developed over the years in the hopes of eradicating these widespread viruses once and for all. This is why the invention of anti-virus protection programs or software, such as avast!, has been such an extraordinary breakthrough in the path to eliminating new-found computer malware.
BACKGROUND:
In the 1800s, most of the written computer viruses were “limited to self-reproduction and [therefore] had no specific damage routine built into the code” (“Antivirus Software,” 2010). That all changed, however, when virus-writers became more and more familiar with the manipulation of viruses that led to data-mutation and destruction of the infected-computers. Eventually, this had called for a creation and development of protective software that will protect home-users’ computers from being completely destroyed by these viruses.
While there have been “competing claims for the innovator of the first anti-virus product,” Bernd Fix was the first person documented to have publicly removed a computer virus in 1987 (“Antivirus Software”). This was soon followed by a plethora of networks and people, such as John McAfee and Eugene Kaspersky---who have both found future respective anti-virus programs, who began to create anti-virus software in the late 1980s. In 1988, “a mailing list named VIRUS-L, [which had also included McAfee and Kaspersky,] was initiated on the BITNET/EARN network” to analyze the newly-found viruses and how to possibly detect and eliminate them (“Antivirus Software”). From then onward, the topic of different types of viruses, detection tools, and eradication methods has achieved notable popularity due to the considerable amount of damages that the viruses have left behind in their wake.
Before broadband connections came to use, viruses were generally spread by infected floppy disks so older anti-virus programs just had to check “executable files and the boot sectors of floppy and hard disks” (“Antivirus Software”) for the presence of computer viruses. As widespread broadband Internet achieved notoriety, however, viruses began to disperse throughout the entire Internet, causing anti-virus programs to dig through individual files and not just floppy and hard disks to discover viruses. This led to the creation of many different types of anti-virus software that have specialties in either “virus-specific” or “virus non-specific” areas (Hruska, 1992, p. 91).
DESCRIPTION OF ANTI-VIRUS PROGRAMS:
Nowadays, many of the anti-virus software on the markets contain so many functions that it’s much easier to just break them into two categories, virus-specific and virus non-specific, to classify the advantages and disadvantages of each. But because the anti-virus programs are so complex and perform a great deal of different actions now, each category is further-divided into four subcategories to detail just what actions the program specializes in. The four subcategories contained in virus-specific anti-virus programs are “scanning, monitoring, ‘inoculation,’ and disinfection software,” while the other four contained in virus non-specific programs are “check-summing, monitoring, integrity, and virus-removal software” (Hruska, p.87).
Basically, anti-virus programs undertake three main responsibilities: they are used to “detect, identify, and remove viruses” (Polk et al., 1995, p. 6) and with the division of labor, which are the four subcategories mentioned above, anti-virus programs are able to perform tasks much quicker and more effective than before. Unfortunately, there are always pros and cons to each method, which are the virus-specific and non virus-specific software techniques in dealing with computer malware, which include viruses, worms, adware, spyware, and Trojan horses.
PROS AND CONS:
Although both virus-specific and non virus-specific software are very useful in eliminating and treating computer viruses, it’s proven that using virus non-specific check-summing software works better because it “conveniently allows [the] everyday checking of system integrity, [ensuring that computers are] secure against any present or future viruses” (Hruska, p. 95). Check-summing software is also the only known method used to detect all present and future viruses with absolute certainty: this aspect alone makes it an “inherently desirable” program to use as a long-term anti-virus strategy in organizations (Hruska, p. 89).
In retrospect, that’s not to say that virus-specific scanning software aren’t useful as well because it all depends on the context: there have been many situations where virus-specific software were better but they do have their limitations too. For instance, a huge limitation of virus-specific software is its vulnerability against false negative issues, which is mainly due to the difficult task of frequently updating itself. Conversely, false negatives can also easily occur in the software with the help of new viruses that “specifically target against particular [anti-virus] products” (Hruska, p. 95).
In contrast with scanning and check-summing software, monitoring software isn’t recommended by professionals because they can’t fully protect the computer against all types of viruses and can sometimes trick the user into a “false sense of security” (Hruska, p. 95). The general concept also applies to virus-disinfection and inoculation software. Thus, when choosing the optimal anti-virus software that will work the best for oneself really depends on what the anti-virus program offers in its product description based on all of the criteria mentioned above.
BENEFITS:
Considering the unlimited amount of demolition that a virus can trigger upon permeation into a computer or network system, an anti-virus software really does generate a bountiful of benefits. To comprehend just how threatening a virus is, one would have to hear what Cohen (1992) has to say in Managing Computer Viruses: he claims that “computer viruses represent a ‘widespread and immediate threat to current systems and network’ [because they] are easy to develop and implement; they can be designed to leave few if any traces, can overcome modern security policies for multi-level usage,” (Louw & Duffy, p. 27) and can spread incredibly quickly throughout the system.
By understanding the virulent force of these destructive viruses, one will have a better appreciation for the invention and development of anti-virus protection programs. Some of their benefits include the maintenance of PC security, with its firewall and pop-up block options; thwarting viruses’ attempts to cause damage to one’s computer with its system scans and monitoring options; insulating one from e-mail threats and spam with its scanning attachments and downloads option; ensuring the safety of one’s data and files with scans and updates; and last, but certainly not least, it saves one from the extra costs associated with calling a technician to fix one’s virus-ridden computer when the anti-virus software just does it automatically everyday. With so many potential benefits provided by anti-virus programs, buying, installing, or downloading one is a must in today’s networking world.
FURTHER RESEARCH:
Interestingly enough, free anti-virus programs work just as well as paid anti-virus programs, which is validated by Rubenking’s (2010) assertion that “Norton Internet Security 2010 and Panda Internet Security 2010 work in just the same way” when comparing the techniques that avast! Free Antivirus 5.0 and the two previous anti-virus software use to block suspicious activity from entering one’s firewall (p. 1). Furthermore, avast! Free Antivirus 5.0 now offers a “ ‘heuristics engine’” that detects malware that many anti-virus programs can’t even discover in addition to its many new added features, such as “scheduled and automatic scanning of files received through” instant-messaging (IM), e-mails, chats, and other various applications (Taylor, 2010, p. 16).
Downloading and installation of avast! Free Antivirus 5.0 is especially simple, fast, and easy, full-systems scans don’t noticeably slow PCs down, and as an added perk, avast! moves “infected files into a quarantine area called the “‘virus chest’” (Taylor ). What’s so incredible about avast!’s free antivirus version is that it also lets its users know when their computers have been updated by using a sound system: whenever avast! automatically updates itself, it will say things like “‘Virus database has been updated”’ its (Rubenking, 2010, p.1). For those who prefer silence, avast! also has chime and no sound options so that its users’ preferences can be fulfilled. With the evaluation of avast! above, one could really consider using it as an alternative to other pricier and equally effective anti-virus software, such as McAfee or Norton.
CONCLUSION:
Due to the threatening nature of viruses, Trojan horses, worms, adware, malware, and spyware, it’s really necessary that one has taken the precautions to prevent severe damage inflicted by various forms of computer viruses by installing an anti-virus protection program. As the world turns to more Internet-sharing, connectivity, open systems, broadbands, open systems, and the “standardization of operating systems and interfaces,” (Louw & Duffy, 1992, p. 27-8) it’s almost impossible to safeguard one’s computer without an anti-virus software of some sort. Hackers and virus-writers are also not going to stop developing and creating more malicious viruses in the future as more powerful viral mechanisms become publicly known, which makes anti-virus software one of the best inventions ever made in the information technology world.
References:
Antivirus Software. (2010). In Wikipedia: The Free Encyclopedia online. Retrieved
This work describes the historical background, what, and how an anti-virus software works. It goes into an in-depth description of heuristics, effectives, identification tools, and methods that anti-virus software use to detect, control, and eradicate harmful computer viruses. It basically briefly covers all of the topics that encompass and associate with anti-virus software.
This source is trustworthy because it’s a well-known online encyclopedia that many people have referenced to in their works of studies. The facts presented in this source are also listed in the reference section of Wikipedia that will lead one directly to the original source who’s work has been cited and referenced. This page is also regularly updated since its date is current and it shows that it was last modified on October 4, 2010 . In addition, the encyclopedia has provided many cited pictures illustrating and supporting the content of its paper that serve as evidence that the content is indeed factual and trustworthy.
Hruska, Jan. (1992). Computer Viruses And Anti-Virus Warfare. New York , NY : Ellis
Horwood Limited.
This book talks about the different types of computer viruses that can occur on IBM -PC/XT/AT/PS2 and other machines that run on PC-DOS. It then goes into an in-depth description of what a virus is, how it infects a computer, who writes one, what it consists of, how to prevent one from infecting one’s computer, and how effective anti-virus protection programs are. It basically breaks down, step-by-step, what a virus is composed of and how to effectively treat one.
This is a valid source because it’s a published source by a well-known company, which is Ellis Horwood Limited. Its author, Jan Hruska, is also a trusted figure since he’s the technical director of the company, SOPHOS Limited. In addition, this book is also published in five other cities aside from New York and they include: London , Toronto , Sydney , Tokyo , and Singapore , which are all big and well-known cities with the exception of the country, Singapore . As a result, this book will be very useful in writing a paper critiquing anti-virus programs based on its meticulous description of what a virus is.
Louw, E., & Duffy, N. (1992). Managing Computer Viruses. New York , NY : Oxford
University Press.
Louw and Duffy are trying to inform the public on how to manage computer viruses in this masterpiece. What is so unique and great about this book is that the authors aren’t technically-explaining concepts but rather, they use easy-to-understand diction that non-computer pros can also comprehend. They address a myriad of virus topics that range from management of viruses to approaches and methods that minimize the virus threats associated with a penetration.
The professionalism of the work and its publication validate the trustworthiness of the source. The authors are also graduates of the Graduate School of Business Administration from the University of the Witwatersrand . Their education levels also suggest that they are informed scholars who are professional and can publish a valid source of information. Their conceptual and informative approach to writing this book will help a lot of people---who aren’t well-versed with computers---that are trying to understand how to cope with a virus-outbreak on their computers.
Paul Taylor. (2010). Free and easy computer security. Financial Times, 16. Retrieved
This online article from the Proquest Library database praises the effectiveness and versatility of the anti-virus software, Avast. The article claims that not only is a version of Avast free, but it’s just as effective, if not more, as non-free anti-virus software. Now, Avast also contains a “heuristics engine,” which is “designed to detect malware that traditional anti-virus programs might not [even] pick up” (Taylor, 2010, p. 16). It then proceeds to highlight the new additions that Avast has incorporated within its software that updates computers to be fully-aware of the new malwares, worms. Trojan horses, spyware, and viruses that are on the rise.
This article proves to be a valid and trusted source because it’s retrieved from a well-known online database, which is Proquest Library. This article is also of one that is scholarly because it includes an abstract before beginning the content of its paper; usually only professionals and scientists include abstracts to briefly outline the content of their papers to enforce the validity of their works. The fact that it’s published in the Financial Times, Ltd., further proves that this source can be trusted because otherwise a major publisher wouldn’t even accept its submission. Its critique and evaluations on the effectiveness of Avast will help its readers decide which anti-virus protection programs to choose in the future.
Polk, W. T., Bassham III , L. E., Wack, J. P., & Carnhan, L. J. (1995). Anti-Virus Tools
And Techniques For Computer Systems. Park Ridge , NJ : Noyes Data Corporation.
Polk et al. discuss the seriousness of a virus-infection and its continual evolvement in Anti-Virus Tools And Techniques For Computer Systems. In conjunction with informing the public about the headaches associated with a virus-penetration, Polk et al. analyze a variety of tools and techniques that help solve the problem of viruses and how to eradicate and prevent one from infecting one’s information systems. This book proves to be especially helpful to computer technicians who are called to fix computers contaminated with a powerful virus.
Because it’s a published source from a prominent and valid corporation, which is the Noyes Data Corporation in this case, its readers can be rest-assured that the information retrieved from this book is indeed factual and citable. The book’s authors are also members of the National Institute of Standards and Technology which make them prominent figures that can be believed. The book also contains an extensive reference list that illustrates that its authors extracted information from other trusted sources to support their assertions and arguments, which further validates this source.
Rubenking, N. J. (2010). Avast! Internet Security 5.0. PC Magazine. Retrieved October
3, 2010, from http://www.pcmag.com/article2/0,2817,2358467,00.asp
In this article, Rubenking talks about the resourcefulness of Avast, version 5.0 and the addition features that the anti-virus software has added that will make computers safer and stronger from unwanted viral, worm, and malware attacks. Unlike all of the other sources, Rubenking meticulously points out to his readers that Avast, version 5.0 has replaced its male voice to a female one when announcing the status of the computer. Perhaps Rubenking’s article is the most useful when analyzing the pros and cons of Avast because he dedicates his article solely to critiquing Avast, which will make its many fans very happy. It will also help eliminate any doubts that its readers might have on choosing Avast as their anti-virus protection software.
Although websites are generally considered untrustworthy and dubious when people cite from them, this one is 100-percent valid because it has an author and it’s from PC Magazine, which is an established company. It also has a copyright company that ensures that the contents of the webpage are indeed factual and trustworthy and can’t be changed without the author’s sole permission. Its copyright company is Ziff Davis, Incorporated and it has a publishing date tagged along to the article that proves that its information is current and reliable. Therefore, this article would make a great reference to people’s papers when they want to write about Avast and its effectiveness.