O'Reilly logo

Don't Spend a Dime: The Path to Low-Cost Computing by James Floyd Kelly

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Virus Protection

It's an unfortunate truth that your computer is always under attack from individuals who wish to damage your hardware, corrupt your software, and delete your files.

During the 1970s, the term hacker was a positive one, referring to someone who enjoyed tweaking and modifying hardware and software to do interesting (and legal) things. By the 1980s, however, the meaning of hacker changed to refer to someone who uses a computer's hardware and software to perform malicious activities.

Of all the methods used by these bad guys, none has been worse than the digital computer virus. Like a biological virus, a computer virus spreads through contact, can cause damage (but not always), and can be difficult to remove. The first known ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required