Get Help!

SaferPC.info

Beyond The Basics

Don't just stop reading because this gets a little more technical. This is the real meat and potatoes of the message, and if you skip it you're going to miss out on an understanding of computing that could be very useful to you later on.

It's not enough to say, "don't download any files" or "don't open attachments" - eventually you'll have to for one reason or another, and that wouldn't protect you from every virus threat, anyway.

Content vs. Files

You said viruses were "content" not files. What's the difference?

Since inter-computer communication became prevalent it has been necessary to send "data" from one computer to another without reliance on how that data is stored or formatted (file/database/ram) on either end. That data had to be capable of describing itself so that each end could know what they're transmitting. Usually this is done with what is called a "header". Headers are descriptive tags associated with a block of data - like a web page or email - that describes what it contains.

The actual content is just a number of bytes in a row that sometimes seemingly coincidentally can make words or pictures. When you visit a web page the actual response to you is a description of the data, which stores the actual "content" within itself in a form of envelope. That content is what may or may not contain a virus.

Certain headers can describe the nature of that content: "content-type" describes what exactly the content is supposed to represent. In some cases this is roughly equivalent to a file type. In other cases it is only a further obfuscation of the information.

When you receive content from another source - be it via email, web page or floppy disk - that content can only do what it was designed to do. An application of some type (sometimes the operating system) on your system *must* interpret that content. For some viruses the interpretation is simple - "script" content ("text/javascript", "text/vbscript", "text/scriptlet", "text/jscript", "text/perl") for example - some applications (like Outlook Express) are capable of interpreting this content directly, so they do.

If the content is malicious then it will execute as intended unless other security measures are employed. To make it even more promiscuous - many types of "content" are open formats. This means that someone could review the content implementations for flaws in design and exploit those flaws.

SaferPC © 2017 Powered by 12 Point Design
Professional Web Hosting and Design Services: 12 Point DesignAt Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling painReliable Answers - developer information, current news, human interest and legislative newsLocal Homeschool provides the most up-to-date support group listings in a geographical and searchable indexTwain Harte, CA - The closest you can get to Heaven on EarthSaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security
Google

AddThis Social Bookmark Button