Abstract
An exposition of the nature, structure and mode of operation of computer viruses is hereby presented, with the assertion that computer viruses are best managed through a proactive measure using a cryptographically strong checksumming algorithm that generates a fingerprint for each executable stored on the system. Verification is then performed prior to running an executable file to ascertain that the system is in a ‘safe state’ since the last run. This ensures inoculation against all present and future viruses with absolute guarantee. Keywords: Executable-file, cryptographic-checksum, interrupt-vector, encryption, signature.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: advances in multidisciplinary & scientific research journal publication
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.