You are on page 1of 6

Computer Virus: Practically Good But Ethically Bad

A Research Paper Presented to Atty. Etheldreda V. Ferrer Department of English Institute of Arts and Sciences Far Eastern University

In Partial Fulfilment of the Requirements for ENG 2 - Intermediate Communication Arts and Skills 1st Semester, A.Y. 2011-2012

by: Divine Grace J. Aguilan Michelle M. Cruz Christian Jurick D. Magdame Kenneth Marvin A. Mateo

Computer Virus: Practically Good But Ethically Bad

Computer viruses were considered a curiosity a few years ago. The first kind of virus was letters falling off from the displays. This led the users to call monitor technicians to ask for help. Computers then played the Yankee Doodle hymn. By that time, users already knew that it was caused by a virus and not by a problem on their hardware. Viruses then went to infect files and clone themselves. (www.virus-scan-software.com/virus-scan-help/answers/the-historyof-computer-viruses.shtml, Retrieved September 9, 2011) Computer viruses are software that performs functions that are normally non-beneficial to the machine and its user. It directs the computer to work against its user without its users approval. They are all alike in the sense that they are intended to corrupt basically all other software programs. (Personal Correspondence with Professor Edward Andaya and Professor Catherine Catamora, September 9, 2011) They can perform anything a computer software program can and perform it without the user knowing. Viruses can format disks copy, rename and delete files, copy themselves with altered configuration information, change file dates and attributes, and connect to other computers to upload and download files and so on. They conceal themselves in normal/host programs and execute themselves without alerting the user of what will be the outcome of the action. (Levin, 1990) A computer virus life starts when a skilful programmer produces it and attaches it to a certain program or application. (Shelly & Vermaat, 2010) It is very simple to make but very troublesome to look for. (Levin, 1990) They are usually within e-mails, databases and other programs which spread from networks, internet and operating systems. (OLeary & OLeary, 2010) They can transmit rapidly to any computer through a removal storage, downloaded file or e-mail attachment which have been corrupted by the virus itself. (Shelly & Vermaat, 2010;

Parsons & Oja, 2008; www.newton.dep.anl.gov/teachers/compvir.htm, Retrieved July 12, 2011) They destroy systems by incorporating duplicates of themselves into normal executable files. Professionally made viruses will not modify file date or time stamps. (Levin, 1990) Viruses put coded messages/virus markers in files throughout the primary infections to prevent reinfection of files. If unmarked files cannot be detected, they suppose that their hosts have been completely infected with viral codes. (Levin, 1990) The objective of this research paper is to know the advantages and disadvantages of computer viruses as well as its effects not only to the affected users but also to the programmers behind these computer viruses. Advantages One of these advantages to the users is being able to use software for free with the use of the crack method. This is done by breaking into the system/software of the computer. It is an alteration of software to get rid of the security methods: trial/demo version, serial number, CD checks and any other security method. A keygen (key generator) is an example of software for this method. It generates a serial number or a product key, or any other essential register information to activate a software application. (Personal Correspondence with Professor Edward Andaya, September 9, 2011; October 6, 2011; and Professor Catherine Catamora, September 9, 2011; http://www.ehow.com/list_7289694_keygen-pc-tools.html, Retrieved October 7, 2011) Another advantage is that it could test the performance of a computer and its capacity to such malfunctions. Machines are built with different architectures, and different technologies, this is a way to test if the newly developed hardware and withstand a new software (virus). (Personal Correspondence with Professor Catherine Catamora, September 9, 2011; October 3, 2011; computer.howstuffworks.com/virus.htm, Retrieved July 11, 2011)

It also tests the capability of anti-virus software to such new virus patterns. Virus patterns are stored on anti-virus software vaults. If an anti-virus already contains such pattern, it will be easy for it to detect and solve it. (Personal Correspondence with Professor Catherine Catamora, September 9, 2011; October 3, 2011) In addition, it gives income/work to people who develop such these anti-virus software. Without a virus, there will be no anti-virus software. If there are no new updates and new virus patterns, those companies or individuals will not have anything to work on and to make income with. (Personal Correspondence with Professor Catherine Catamora, September 9, 2011; October 3, 2011; www.technibble.com/why-do-people-create-computer-viruses/, Retrieved October 7, 2011) Also, it makes challenging avenues to new algorithms for new viruses. Computer related individuals and companies will gain knowledge after knowing the patterns and algorithms behind new viruses. Simultaneously, they will know how to prevent those after knowing how to remove them on their systems. (Personal Correspondence with Professor Catherine Catamora, September 9, 2011; October 3, 2011) Disadvantages On the other hand, one of the disadvantages to the makers of those programs which are hacked by a keygen or crack is that they generate less income since the user does not have to pay anymore to be able to use these programs. (Personal Correspondence with Professor Edward Andaya and Professor Catherine Catamora, September 9, 2011) It is also destructive both to hardware and software component of the computer's system. Virus overrides the system software that is currently installed in the computer and slows it down. They can crash the system and they can also make the hardware components

malfunction. (Personal Correspondence with Professor Catherine Catamora, September 9, 2011; October 3, 2011; computer.howstuffworks.com/virus.htm, Retrieved July 11, 2011) Another disadvantage is that the purchase of anti-virus software to protect the system costs high. When strong viruses infect a person's computer, the user has no choice but to reformat the computer and buy anti-virus software then install it to the computer to avoid being infected again in the future. (Personal Correspondence with Professor Catherine Catamora, September 9, 2011; October 3, 2011) In addition, it is propagating. More and more programmers tend to create a new virus pattern. These programmers want to produce more and more patterns to penetrate the antivirus software of a computer, thus, destructing it even with anti-virus software. (Personal Correspondence with Professor Catherine Catamora, September 9, 2011; October 3, 2011) Also, users tend to work lesser hours when computers bug down because of viruses.

Basically, they cannot concentrate on what they are supposed to because they might be being limited to what program they can run or they might also being distracted or prevented by the virus itself from preventing the task. (Personal Correspondence with Professor Catherine Catamora, September 9, 2011; October 3, 2011) This research hopes to build awareness on computer viruses. Production of computer viruses is not really a practical thing to do. Even though it has its positive effects like being able to test a computers performance and capacity to malfunctions, it is very destructive so the negative effects simply just outweighed the positive effect. That is also the same for the other positive effects. Simply put, there is no positive effect that does not have a negative effect. It is impossible however, to stop the production of these viruses since it is a source of income for those who make the anti-virus software. What users must do is to just be more careful when they are using theyre computer especially when they are accessing the internet. They should

be cautious of the websites that they are accessing. As much as possible, they should ignore suspicious websites in order to avoid virus infection. They should also be cautious on the things that are being inserted in to their computer such as a flash drive or a DVD since a computer can also be infected through these data storages. Most importantly, users must have anti-virus software since it can scan files, remove infections and protect against viruses. It is best to update it when possible so that it can have the latest virus pattern/algorithm/signature installed onto the software and will act accordingly when it detects a file to be a kind of malicious software based on its database.

References: Avakian, R. (n.d.) All about viruses. Retrieved July 12, 2011, from www.newton.dep.anl.gov/teachers/compvir.htm Brain, M. (n.d.) How computer viruses works. Retrieved July 11, 2011, from computer.howstuffworks.com/virus.htm Faucheux, M. (n.d.). Keygen pc tools. Retrieved October 7, 2011, from www.ehow.com/list_7289694_keygen-pc-tools.html Levin, R. (1990). The computer virus handbook. Berkeley, CA: Osborne McGraw-Hill Parsons, J.J. & Oja, D. (2008). Computer concepts - illustrated introductory, sixth edition, enhanced. Boston, MA: Thomson Course Technology Shelly, G. & Vermaat, M. (2010). Discovering computers 2010: living in a digital world, complete. Boston, MA: Thomson Course Technology The history of computer viruses. (n.d.) Retrived September 9, 2011, from www.virus-scansoftware.com/virus-scan-help/answers/the-history-of-computer-viruses.shtml Whitty, B. (n.d.) Why do people create computer viruses. Retrieved October 7, 2011, from www.technibble.com/why-do-people-create-computer-viruses

You might also like