Abstract
In Chapter 4 we painted a bleak picture of the wide range of camouflage techniques and replication strategies adopted by PC viruses. In this chapter, methods to prevent, contain and recover from computer virus infection will be discussed. Together, these methods provide comprehensive protection from significant damage to vital programs and data from virus (and trojan horse) activity.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1992 Springer-Verlag London Limited
About this chapter
Cite this chapter
Ferbrache, D. (1992). Management of PC Viruses. In: A Pathology of Computer Viruses. Springer, London. https://doi.org/10.1007/978-1-4471-1774-2_5
Download citation
DOI: https://doi.org/10.1007/978-1-4471-1774-2_5
Publisher Name: Springer, London
Print ISBN: 978-3-540-19610-5
Online ISBN: 978-1-4471-1774-2
eBook Packages: Springer Book Archive