Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

Integrity checking

Articles 1 - 4 of 4

Full-Text Articles in Computer and Systems Architecture

Methods Of Scanning Email Viruses - Applying Triz To Improve Anti-Virus Programs, Umakant Mishra May 2012

Methods Of Scanning Email Viruses - Applying Triz To Improve Anti-Virus Programs, Umakant Mishra

Umakant Mishra

An email virus makes use of the email technology and attaches itself to an email to transfer itself from one computer to another. Some email viruses create and send new emails using the address book of the victim computer. The email viruses are a matter of concern as they can spread very fast via emails to different geographical locations.

The conventional scanners are file based and not good for scanning emails as the emails can contain different types of files as attachments. Besides they cannot detect viruses until the emails are downloaded and opened by the recipient in order to …


Implementing Virus Scanning In Computer Networks, Umakant Mishra May 2012

Implementing Virus Scanning In Computer Networks, Umakant Mishra

Umakant Mishra

Some viruses exploit the features and capabilities of computer networks to spread, operate and damage network environments. For example, the virus may copy itself to other computers in the network or may increase network activities congesting the network traffic. The conventional anti-viruses are not efficient enough to detect and control viruses in a network environment. As they are file based they cannot scan the data while being downloaded from the server.

Most of the drawbacks of conventional scanning are taken care by a firewall-based virus scanning. But this method requires high-end machines to withstand the load of centralized scanning. There …


Improving Speed Of Virus Scanning- Applying Triz To Improve Anti-Virus Programs, Umakant Mishra Jan 2012

Improving Speed Of Virus Scanning- Applying Triz To Improve Anti-Virus Programs, Umakant Mishra

Umakant Mishra

As the number of viruses increases the amount of time to scan for those viruses also increase. This situation is worsened because of the increasing number of files typically stored in a computer system. Besides more complex tests are required to detect the modern day’s intelligent viruses. Thus a combination of all these factors makes a full virus scan very lingering and resource consuming. With thousands of types of viruses and gigabytes of storages, a typical virus scanning may take several hours. Because of this reason many users don’t like to virus scan their computers unless so required.

This article …


Detecting Boot Sector Viruses- Applying Triz To Improve Anti-Virus Programs, Umakant Mishra Jan 2012

Detecting Boot Sector Viruses- Applying Triz To Improve Anti-Virus Programs, Umakant Mishra

Umakant Mishra

The boot sector virus infects the boot record of the hard disk or floppy disks. It gets loaded onto the memory every time the computer is booted and remains resident in the memory till the computer is shut down. Once entered it alters the boot sector of the hard disk and remains in the hard disk permanently until the system is totally damaged and fails to boot.

While analyzing the problem from TRIZ prospective we try different possibilities to avoid boot sector viruses, such as, Can we do away with boot record? Can we avoid booting from floppies? Can we …