errors and holes for virus writers to exploit. Citation needed Polymorphic code edit Polymorphic code was the first technique that posed a serious threat to virus scanners. Recovery strategies and methods edit One may reduce the damage done by viruses by making regular backups of data (and the operating systems) on different media, that are either kept unconnected to the system (most of the time, as in a hard drive read-only. A b John Aycock (19 September 2006). "Theory of Self-Reproducing Automata" (PDF). Trojan horse viruses are also legitimate programs that are advertised as something desirable, but are actually something that is undesirable. . 8 Creeper gained access via the arpanet and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. An example of a virus that does this is CiaDoor. Methods to avoid detection In order to avoid detection by users, some viruses employ different kinds of deception.
Often a virus will cause a system to "hang" or "freeze and a subsequent hard reboot will render a system restore point from the same day corrupted. This difference has continued partly due to the widespread use of administrator accounts in contemporary versions like. Computer viruses for dummies (in Danish). Isbn Burger, Ralf, 1991 Computer Viruses and Data Protection Ludwig, Mark, 1996 The Little Black Book of Computer Viruses Ludwig, Mark, 1995 The Giant Black Book of Computer Viruses Ludwig, Mark, 1993 Computer Viruses, Artificial Life and Evolution External links Template:Malware. 59 Some viruses can infect files without increasing their sizes or damaging the files. Michael Crichton (November 21, 1973).
Research paper method, Research paper on paranormal phenominia, Graft and corruption research paper,