Order ready-to-submit essays. No Plagiarism Guarantee!
Note: All our papers are written from scratch by human writers to ensure authenticity and originality.
Royal Commission for Jubail and Yanbu
Verify your essay before you submit. Get an Official Turnitin Report for Just $8.99!
Check your paper with the same Turnitin report your professor uses. AI detection + similarity score without storing your work. Pay once, no subscription
Check My Assignment!Jubail University College
Department of Computer Science & Engineering
FX-ACA-002
Issue 0 Rev. 1
January 2, 2014
i
CS 425: Homework Assignment
Due: 27 March 2019
Written answers for each exercise should take up one page (single-spaced) or less. Feel free to be creative.
1) In November of 1988, the very first “Internet worm” appeared in the wild and made quite a splash. Do a little historical research on the web (Google is arguably a computer technician’s
single most important tool): Who released this first worm and why? How did it spread? What
did it do? How it was finally contained? Write an essay of one page or less.
2) Go to Start | Run and enter “cmd”. At the resulting command prompt enter the command “netstat –an”. What are you looking at? What does it mean? How might this information be
helpful if you suspect a computer may be infected with a worm?
3) Go to http://www.sysinternals.com and download a utility called Process Explorer. Run it on your computer and be amazed at all the things that are going on! Pick 3 or 4 running
processes that catch your eye and learn what they are (hint: Google is your friend). Provide
descriptions of these processes and their functions. Bonus points: Does Windows have a
built-in tool that will provide some of the same information as Process Explorer?
For MAC Apple computer, download xrg, go to https://alternativeto.net/software/xrg/
Discuss the same information.
4) Go to the Symmantec Security Response site at: http://securityresponse.symantec.com/ You should see a list of the latest virus threats. What are the names of the top five?
5) You can learn a lot about a virus just from its name. For example, many virus names begin with W32, such as in W32.Beagle.BT@mm. W32 indicates that a virus targets the Windows
machines or specifically the Windows 32 interface. Some viruses begin with VBS indicating
that they are a Visual Basic Script. Some viruses begin with Trojan indicating that they are a
Trojan Horse.
Choose one and discuss information about the systems affected, patches to prevent infection,
how wide spread infection has become, information about what kind of damage the virus
does, how it spreads and technical details about its operations? http://www.sysinternals.com/https://alternativeto.net/software/xrg/http://securityresponse.symantec.com/


