Ways of spreading viruses
How are viruses and, in particular, the Win95.CIH virus spread? It is generally believed that the main path is the Internet. Other viruses cause a lot of controversy about the distribution paths (spread with games, via floppy disks, etc.). In fact, any viruses are highly democratic in their habitat. The main channel for spreading viruses is the channel through which the necessary information is transmitted most intensively. What is this information: games or necessary programs – the virus doesn’t care. Therefore, in the West, the main pathway for the spread of viruses is the Internet. We, apparently, have one of the main channels – these are numerous “pirated” CDs.
It makes no sense to provide statistics on the appearance of infected disks in the black market. Believe me, infected “pirate” drives are not uncommon. There are even unpleasant incidents. So, on one of last year’s “pirate” collections collected 4 latest anti-virus programs. Including AntiViral ToolKit PRO v.3.0.120 (AVP). This is the version that before most other well-known packages could detect the presence of the Win95.CIH virus. Nevertheless, on the same disk one of the useful programs is infected with the Win95.CIH virus. The channel for spreading viruses through CD-ROMs has another unpleasant feature. This is not only a distribution environment, but also a reliable storage environment for viruses!
I think that taught by bitter experience, we will now be more careful about protection against viruses (I repeat, not only protection against Win95.CIH). Nevertheless, there will always be a risk of “catching” a new virus that antivirus products will not “cope” with. Therefore, it is very important to imagine how, where and by what forces you can restore information on your hard drive. Moreover, the information on the hard disk may be lost due to reasons independent of the presence of viruses (erroneous file deletion or formatting of the disk, turning off the computer, or the network disappearing when the files were opened, etc.).
Let’s think together what needs to be done so that in case of an accident you can count on restoring information.