What is heuristic analysis of an antivirus program. What is a heuristic analyzer? Preparing for a virus attack


The article applies to Kaspersky Endpoint Security 10 for Windows:

  • Service Pack 2 Maintenance Release 4 (version 10.3.3.304);
  • Service Pack 2 Maintenance Release 3 (version 10.3.3.275);
  • Service Pack 2 Maintenance Release 2 (version 10.3.0.6294);
  • Service Pack 2 Maintenance Release 1 (version 10.3.0.6294);
  • Service Pack 2 (version 10.3.0.6294).

What is heuristic analysis

Heuristic analysis is a technology for detecting threats that cannot be identified using the current version of Kaspersky Lab databases. Allows you to find files that may contain an unknown virus or a new modification of a known virus.

Heuristic analyzer is a module that works based on heuristic analysis technology.

Static and Dynamic Analysis

Static analysis. The heuristic analyzer scans code for suspicious commands, such as searching for and changing executable files. If there are suspicious commands or fragments, the heuristic analyzer increases the “suspiciousness counter” of the program. If, after scanning the entire program code, the counter value exceeds the specified threshold, then the object is considered suspicious.

Dynamic analysis. The heuristic analyzer emulates the launch of a program in a virtual address space. If during the emulation process the heuristic analyzer detects suspicious actions, the object is recognized as malicious and its launch on the user’s computer is blocked.

Kaspersky Endpoint Security 10 for Windows uses static analysis in combination with dynamic analysis.

Which protection components use a heuristic analyzer?

  • File Anti-Virus. More details in the help.
  • Mail Anti-Virus. More details in the help.
  • Web Antivirus. More details in the help.
  • Monitoring program activity. More details in the help.
  • Verification tasks. More details in the help.

Full support

Release of databasesYes
SupportYes
Release of patchesYes

Latest version:

Commercial release date:

Latest version release:

What does status mean?

  • Release of databases

    Release of database updates necessary to ensure the protection of your computer/server/mobile device.

  • Support

    Providing technical support by phone and via a web form.

  • Release of patches

    Release of update packages for the program (to eliminate detected errors).

Kaspersky Endpoint Security 10 for Windows (for workstations and file servers)

  • Microsoft Windows Server 2012 R2 Foundation / Essentials / Standard / Datacenter x64.
  • Microsoft Windows Server 2012 Foundation / Essentials / Standard / Datacenter x64.
  • Microsoft Small Business Server 2011 Essentials / Standard x64.
  • Windows MultiPoint Server 2011 x64.
  • Microsoft Windows Server 2008 R2 Foundation / Standard / Enterprise / Datacenter x64 SP1.
  • Microsoft Windows Server 2008 Standard / Enterprise / Datacenter x64 SP2.
  • Microsoft Small Business Server 2008 Standard / Premium x64.

For other restrictions on server platform support, see the article.

  • VMWare ESXi 6.0.0 3620759.
  • Microsoft Hyper-V 3.0.
  • Citrix XenServer 7.0.
  • Citrix XenDesktop 7.13.

article.

  • Microsoft Windows Server 2008 R2 Standard / Enterprise x64 SP1.
  • Microsoft Windows Server 2008 Standard / Enterprise x64 SP2.

Limitations of server platform support

  • The ReFS file system is supported with limitations.
  • Server Core and Cluster Mode configurations are not supported.
  • Disk encryption (Kaspersky FDE) and file encryption on server platforms are not supported.

Supported virtual platforms

  • VMWare ESXi 6.0.0 3620759.
  • Microsoft Hyper-V 3.0.
  • Citrix XenServer 7.0.
  • Citrix XenDesktop 7.13.
  • Citrix Provisioning Services 7.13.

Features and limitations of virtual platform support

  • Full disk encryption (FDE) is not supported on Hyper-V virtual machines.
  • Full disk encryption (FDE) and file and folder encryption (FLE) are not supported on Citrix virtual platforms.
  • To maintain compatibility of Kaspersky Endpoint Security for Windows with Citrix PVS, you must install with the option enabled Ensure compatibility with Citrix PVS. You can enable the option in the installation wizard or through the /pCITRIXCOMPATIBILITY=1 command line option. In case of remote installation, you must edit the KUD file by adding the /pCITRIXCOMPATIBILITY=1 parameter to it.

For other features of virtual platform support, see the article.

Version 10.2.6.3733: Hardware and software requirements

General requirements

  • 1 GB RAM.

OS

  • Microsoft Windows 10 Pro / Enterprise x86 / x64.
    Microsoft Windows 8.1 Pro / Enterprise x86 / x64.
  • Microsoft Windows 8 Pro / Enterprise x86 / x64.
  • Microsoft Windows 7 Professional / Enterprise / Ultimate x86 / x64 SP1 and higher.
  • Microsoft Windows 7 Professional / Enterprise / Ultimate x86 / x64.
  • Microsoft Windows Server 2016 Standard / Essentials x64.
  • Microsoft Small Business Server 2011 Standard x64.

Supported virtual platforms

  • VMWare ESXi 5.5.0 2718055 Update 2.
  • Citrix XenServer 6.5.
  • Citrix XenDesktop 7.8.

Limitations of server platform support

  • The ReFS file system is supported with limitations.
  • Server Core and Cluster Mode configurations are not supported.
  • Disk encryption (Kaspersky FDE) and file encryption on server platforms are not supported.

Supported virtual platforms

  • Citrix XenServer 6.2.
  • Citrix XenDesktop 7.5.

Features and limitations of virtual platform support

Version 10.2.5.3201: Hardware and software requirements

For normal operation of Kaspersky Endpoint Security 10 for Windows, the computer must meet the following requirements:

General requirements

  • Intel Pentium processor 1 GHz or higher.
  • 1 GB RAM.
  • 2 GB of free hard disk space.

Software and hardware requirements for workstations

  • Microsoft Windows 10 Pro x86 / x64.
  • Microsoft Windows 10 Enterprise x86 / x64.
  • Microsoft Windows Vista x86 / x64 SP2 and higher.
  • Microsoft Windows XP Professional x86 SP3 and higher.
  • Microsoft Windows Server 2019 x64.
  • Microsoft Windows Server 2016 Standard / Essentials x64.
  • Microsoft Windows Server 2012 R2 Foundation / Standard / Essentials x64.
  • Microsoft Windows Server 2012 Foundation / Standard / Essentials x64.
  • Microsoft Small Business Server 2011 Standard x64.
  • Microsoft Windows MultiPoint Server 2011 x64.
  • Microsoft Small Business Server 2008 Standard/Premium x64.
  • Microsoft Windows Server 2008 R2 Foundation / Standard / Enterprise x64 SP1 and higher.
  • Microsoft Windows Server 2008 Foundation / Standard / Enterprise x86 / x64 SP2 and higher.
  • Microsoft Windows Server 2003 R2 Standard / Enterprise x86 / x64 SP2 and higher.
  • Microsoft Windows Server 2003 Standard / Enterprise x86 / x64 SP2.
  • Microsoft
  • Microsoft
  • Microsoft Windows Embedded Standard 7* x86 / x64 SP1.
  • Microsoft Windows Embedded POSReady 7* x86 / x64.

Features and limitations of embedded operating system support

  • Microsoft Windows Embedded 8.0 Standard x64 (Standard 8) or Microsoft Windows Embedded 8.1 Industry x64 (Industry 8.1) operating systems are recommended for use on devices with 2 GB or more of RAM.
  • File encryption (FLE) and hard disk encryption (FDE) are not supported on embedded operating systems.

Supported virtual platforms

  • VMWare ESXi 5.5.0 2718055 Update 2.
  • VMWare ESXi 5.5.0 3568722 Update 3b.
  • VMWare ESXi 5.5.0 2718055 Update 2.
  • Microsoft Hyper-V 3.0 (Windows Server 2012 R2).
  • Citrix XenServer 6.5.
  • Citrix XenDesktop 7.8.
  • Citrix Provisioning Server 7.8.

Limitations of server platform support

  • The ReFS file system is supported with limitations.
  • Server Core and Cluster Mode configurations are not supported.
  • Disk encryption (Kaspersky FDE) and file encryption on server platforms are not supported.

Microsoft Windows 8.1 support limitations

  • Windows 8 to 8.1 upgrade is not supported.
  • Limited ReFS file system support for iSwift/iChecker technology.
  • The function of hiding Kaspersky Endpoint Security 10 in the start menu is not supported.

Supported virtual platforms

  • VMWare ESXi 5.5.0 1623387 Update 1.
  • VMWare ESXi 5.5.0 2068190 Update 2.
  • Microsoft Hyper-V 3.0 (Windows Server 2012).
  • Citrix XenServer 6.2.
  • Citrix XenDesktop 7.5.
  • Citrix Provisioning Server 7.1.

Features and limitations of virtual platform support

  • To maintain compatibility of Kaspersky Endpoint Security with Citrix PVS, you must install with the “Ensure compatibility with Citrix PVS” option enabled. The option can be enabled in the installation wizard or through the command line parameter /pCITRIXCOMPATIBILITY=1. In case of remote installation, you need to edit the kud file by adding the /pCITRIXCOMPATIBILITY=1 parameter to it.
  • Installation on a computer running Microsoft Windows XP running on Citrix XenDesktop is not supported.
  • Creating images using Target Device from computers running Microsoft Windows XP and Microsoft Windows Vista with Kaspersky Endpoint Security 10 Service Pack 1 installed is not supported.

Version 10.2.4.674: Hardware and software requirements

For normal operation of Kaspersky Endpoint Security 10 for Windows, the computer must meet the following requirements:

General requirements

  • Intel Pentium processor 1 GHz or higher.
  • 2 GB of free hard disk space.
  • Microsoft Internet Explorer 7.0 and higher.
  • Microsoft Windows Installer 3.0 and higher.
  • Internet connection to activate the program, update databases and program modules.

Software and hardware requirements

  • Microsoft Windows 10 TH2 Pro version 1511 x86 / x64.
  • Microsoft Windows 10 TH2 Enterprise version 1511 x86 / x64.
  • Microsoft Windows 8.1 Pro x86 / x64.
  • Microsoft Windows 8.1 Enterprise x86 / x64.
  • Microsoft Windows 8 Pro x86 / x64.
  • Microsoft Windows 8 Enterprise x86 / x64.
  • Microsoft Windows 7 Professional x86 / x64 SP1 and higher.
  • Microsoft Windows 7 Enterprise / Ultimate x86 / x64 SP1 and higher.
  • Microsoft Windows 7 Professional x86 / x64.
  • Microsoft Windows 7 Enterprise / Ultimate x86 / x64.
  • Microsoft Windows Vista x86 / x64 SP2 and higher.
  • Microsoft Windows XP Professional x86 SP3 and higher.
  • Microsoft Windows Server 2012 R2 Standard / Essentials / Enterprise x64.
  • Microsoft Windows Server 2012 Foundation / Standard / Essentials x64.
  • Microsoft Small Business Server 2011 Standard / Essentials x64.
  • Microsoft Windows MultiPoint Server 2011 x64.
  • Microsoft Windows Server 2008 R2 Standard / Enterprise / Foundation x64 SP1 and higher.
  • Microsoft Windows Server 2008 R2 Standard / Enterprise / Foundation x64.
  • Microsoft Windows Server 2008 Standard / Enterprise x86 / x64 SP2 and higher.
  • Microsoft Small Business Server 2008 Standard/Premium x64.
  • Microsoft Windows Server 2003 R2 Standard / Enterprise x86 / x64 SP2 and higher.
  • Microsoft Windows Server 2003 Standard / Enterprise x86 / x64 SP2 and higher.
  • Microsoft Windows Embedded 8.0 Standard x64.
  • Microsoft Windows Embedded 8.1 Industry Pro x64.
  • Microsoft Windows Embedded Standard 7 x86/x64 SP1.
  • Microsoft Windows Embedded POSReady 7 x86/x64.

Features and limitations of embedded operating system support

  • Microsoft Windows Embedded 8.0 Standard x64 (Standard 8) or Microsoft Windows Embedded 8.1 Industry x64 (Industry 8.1) operating systems are recommended for use on devices with 2 GB or more of RAM.
  • File encryption (FLE) and hard disk encryption (FDE) are not supported on embedded operating systems.

Limitations of server platform support

  • The ReFS file system is supported with limitations.
  • Server Core and Cluster Mode configurations are not supported.
  • Disk encryption (Kaspersky FDE) and file encryption on server platforms are not supported.

Microsoft Windows 8.1 support limitations

  • Windows 8 to 8.1 upgrade is not supported.
  • Limited ReFS file system support for iSwift/iChecker technology.
  • The function of hiding Kaspersky Endpoint Security 10 in the start menu is not supported.

Supported virtual platforms

  • VMWare ESXi 5.5.0 1623387 Update 1.
  • VMWare ESXi 5.5.0 2068190 Update 2.
  • Microsoft Hyper-V 3.0 (Windows Server 2012).
  • Citrix XenServer 6.2.
  • Citrix XenDesktop 7.5.
  • Citrix Provisioning Server 7.1.

Features and limitations of virtual platform support

  • To maintain compatibility of Kaspersky Endpoint Security with Citrix PVS, you must install with the “Ensure compatibility with Citrix PVS” option enabled. The option can be enabled in the installation wizard or through the command line parameter /pCITRIXCOMPATIBILITY=1. In case of remote installation, you need to edit the kud file by adding the /pCITRIXCOMPATIBILITY=1 parameter to it.
  • Installation on a computer running Microsoft Windows XP running on Citrix XenDesktop is not supported.
  • Creating images using Target Device from computers running Microsoft Windows XP and Microsoft Windows Vista with Kaspersky Endpoint Security 10 Service Pack 1 installed is not supported.

Version 10.2.2.10535MR1: Hardware and software requirements

For normal operation of Kaspersky Endpoint Security 10 for Windows, the computer must meet the following requirements:

General requirements

  • Intel Pentium processor 1 GHz or higher.
  • 1 GB of free RAM.
  • 2 GB of free hard disk space.
  • Microsoft Internet Explorer 7.0 and higher.
  • Microsoft Windows Installer 3.0 and higher.
  • Internet connection to activate the program, update databases and program modules.

OS

  • Microsoft Windows 8.1 Pro x86 / x64.
  • Microsoft Windows 8.1 Enterprise x86 / x64.
  • Microsoft Windows 8 Pro x86 / x64.
  • Microsoft Windows 8 Enterprise x86 / x64.
  • Microsoft Windows 7 Professional x86 / x64 SP1 and higher.
  • Microsoft Windows 7 Enterprise / Ultimate x86 / x64 SP1 and higher.
  • Microsoft Windows 7 Professional x86 / x64.
  • Microsoft Windows 7 Enterprise / Ultimate x86 / x64.
  • Microsoft Windows Vista x86 / x64 SP2 and higher.
  • Microsoft Small Business Server 2011 Standard x64.
  • Microsoft Windows Server 2012 R2 Standard x64.
  • Microsoft Windows Server 2012 Foundation / Standard x64.
  • Windows Embedded 8.0 Standard x64.
  • Windows Embedded 8.1 Industry Pro x64.

Features and limitations of embedded operating system support

  • Microsoft Windows Embedded 8.0 Standard x64 (Standard 8) or Microsoft Windows Embedded 8.1 Industry x64 (Industry 8.1) operating systems are recommended for use on devices with 2 GB or more of RAM.
  • File encryption (FLE) and hard disk encryption (FDE) are not supported on embedded operating systems.

Limitations of server platform support

  • The ReFS file system is supported with limitations.
  • Server Core and Cluster Mode configurations are not supported.

Microsoft Windows 8.1 support limitations

  • Windows 8 to 8.1 upgrade is not supported.
  • Limited ReFS file system support for iSwift/iChecker technology.
  • The function of hiding Kaspersky Endpoint Security 10 in the start menu is not supported.

Supported virtual platforms

  • VMWare ESXi 5.5.0 1623387 Update 1.
  • VMWare ESXi 5.5.0 2068190 Update 2.
  • Microsoft Hyper-V 3.0 (Windows Server 2012).
  • Citrix XenServer 6.2.
  • Citrix XenDesktop 7.5.
  • Citrix Provisioning Server 7.1.

Features and limitations of virtual platform support

  • To maintain compatibility of Kaspersky Endpoint Security with Citrix PVS, you must install with the “Ensure compatibility with Citrix PVS” option enabled. The option can be enabled in the installation wizard or through the command line parameter /pCITRIXCOMPATIBILITY=1. In case of remote installation, you need to edit the kud file by adding the /pCITRIXCOMPATIBILITY=1 parameter to it.
  • Installation on a computer running Microsoft Windows XP running on Citrix XenDesktop is not supported.
  • Creating images using Target Device from computers running Microsoft Windows XP and Microsoft Windows Vista with Kaspersky Endpoint Security 10 Service Pack 1 installed is not supported.

Version 10.2.2.10535: Hardware and software requirements

For normal operation of Kaspersky Endpoint Security 10 for Windows, the computer must meet the following requirements:

General requirements

  • Intel Pentium processor 1 GHz or higher.
  • 1 GB of free RAM.
  • 2 GB of free hard disk space.
  • Microsoft Internet Explorer 7.0 and higher.
  • Microsoft Windows Installer 3.0 and higher.
  • Internet connection to activate the program, update databases and program modules.

OS

  • Microsoft Windows 8.1 Update Pro x86 / x64.
  • Microsoft Windows 8.1 Update Enterprise x86 / x64.
  • Microsoft Windows 8.1 Pro x86 / x64.
  • Microsoft Windows 8.1 Enterprise x86 / x64.
  • Microsoft Windows 8 Pro x86 / x64.
  • Microsoft Windows 8 Enterprise x86 / x64.
  • Microsoft Windows 7 Professional x86 / x64 SP1 and higher.
  • Microsoft Windows 7 Enterprise / Ultimate x86 / x64 SP1 and higher.
  • Microsoft Windows 7 Professional x86 / x64.
  • Microsoft Windows 7 Enterprise / Ultimate x86 / x64.
  • Microsoft Windows Vista x86 / x64 SP2 and higher.
  • Microsoft Small Business Server 2011 Essentials x64.
  • Microsoft Small Business Server 2011 Standard x64.
  • Microsoft Small Business Server 2008 Standard x64.
  • Microsoft Small Business Server 2008 Premium x64.
  • Microsoft Windows Server 2012 R2 Standard x64.
  • Microsoft Windows Server 2012 Foundation / Standard x64.
  • Microsoft Windows MultiPoint Server 2011 x64.
  • Microsoft Windows Server 2008 R2 Standard x64 SP1 and higher.
  • Microsoft Windows Server 2008 R2 Standard x64.
  • Microsoft Windows Server 2008 R2 Enterprise x64 SP1 and higher.
  • Microsoft Windows Server 2008 R2 Enterprise x64.
  • Microsoft Windows Server 2008 R2 Foundation x64 SP1 and higher.
  • Microsoft Windows Server 2008 R2 Foundation x64.
  • Microsoft Windows Server 2008 Standard x86 / x64 SP2 and higher.
  • Microsoft Windows Server 2008 Enterprise x86 / x64 SP2 and higher.
  • Microsoft Windows Server 2003 R2 Standard x86 / x64 SP2 and higher.
  • Microsoft Windows Server 2003 R2 Enterprise x86 / x64 SP2 and higher.
  • Microsoft Windows Server 2003 Standard x86/x64 SP2.
  • Microsoft Windows Server 2003 Enterprise x86 / x64 SP2 and higher.
  • Windows Embedded 8.0 Standard x64.
  • Windows Embedded 8.1 Industry Pro x64.
  • Windows Embedded Standard 7 with SP1 x86 / x64.
  • Windows Embedded POSReady 7 x86 / x64.

Features and limitations of embedded operating system support

  • Microsoft Windows Embedded 8.0 Standard x64 (Standard 8) or Microsoft Windows Embedded 8.1 Industry x64 (Industry 8.1) operating systems are recommended for use on devices with 2 GB or more of RAM.
  • File encryption (FLE) and hard disk encryption (FDE) are not supported on embedded operating systems.

Limitations of server platform support

  • The ReFS file system is supported with limitations.
  • Server Core and Cluster Mode configurations are not supported.

Microsoft Windows 8.1 support limitations

  • Windows 8 to 8.1 upgrade is not supported.
  • Limited ReFS file system support for iSwift/iChecker technology.
  • The function of hiding Kaspersky Endpoint Security 10 in the start menu is not supported.

Supported virtual platforms

  • VMWare ESXi 5.5.0 1623387 Update 1.
  • VMWare ESXi 5.5.0 2068190 Update 2.
  • Microsoft Hyper-V 3.0 (Windows Server 2012).
  • Citrix XenServer 6.2.
  • Citrix XenDesktop 7.5.
  • Citrix Provisioning Server 7.1.

Features and limitations of virtual platform support

  • To maintain compatibility of Kaspersky Endpoint Security with Citrix PVS, you must install with the “Ensure compatibility with Citrix PVS” option enabled. The option can be enabled in the installation wizard or through the command line parameter /pCITRIXCOMPATIBILITY=1. In case of remote installation, you need to edit the kud file by adding the /pCITRIXCOMPATIBILITY=1 parameter to it.
  • Installation on a computer running Microsoft Windows XP running on Citrix XenDesktop is not supported.
  • Creating images using Target Device from computers running Microsoft Windows XP and Microsoft Windows Vista with Kaspersky Endpoint Security 10 Service Pack 1 installed is not supported.

You may be using antivirus software without knowing how it works. However, nowadays there are a lot of antivirus programs, so you will have to choose one one way or another. In order for this choice to be as justified as possible and for the installed programs to provide the maximum degree of protection against viruses, it is necessary to study the techniques used by these programs.

There are several basic techniques for detecting and protecting against viruses. Antivirus programs can implement only certain techniques or combinations thereof.

· Scanning

Change detection

Heuristic analysis

Residential monitors

· Vaccination programs

· Hardware virus protection

In addition, most antivirus programs provide automatic recovery of infected programs and boot sectors.

Objects of infection

In the first chapter, we already talked about the different types of viruses and how they spread. Before we begin to consider antivirus tools, we list the areas of the computer’s file system that are susceptible to infection by viruses and that need to be scanned:

· Executable files of programs, drivers

· Master boot record and boot sectors

· Configuration files AUTOEXEC.BAT and CONFIG.SYS

· Documents in Microsoft Word for Windows word processor format

When a resident virus becomes active, it places its permanently running module in the computer's RAM. Therefore, antivirus programs must check RAM. Since viruses can use more than just standard memory, it is advisable to check the upper memory. For example, Doctor Web antivirus checks the first 1088 KB of RAM.

Scanning

The simplest method of searching for viruses is that the antivirus program sequentially scans the scanned files in search of signatures of known viruses. A signature is a unique sequence of bytes that belongs to a virus and is not found in other programs.

Determining the signature of a virus is quite a difficult task. The signature should not be contained in normal programs that are not infected with this virus. Otherwise, false positives are possible when a virus is detected in a completely normal, uninfected program.

Of course, scanner programs do not necessarily store signatures of all known viruses. They can, for example, store only signature checksums.

Antivirus scanner programs that can remove detected viruses are usually called polyphages. The most famous scanner program is Dmitry Lozinsky's Aidstest. Aidstest searches for viruses by their signatures. Therefore, it detects only the simplest polymorphic viruses.

In the first chapter we talked about the so-called encrypting and polymorphic viruses. Polymorphic viruses completely change their code when infecting a new program or boot sector. If you isolate two copies of the same polymorphic virus, they may not match in a single byte. As a consequence, it is impossible to determine the synature for such viruses. Therefore, simple antivirus scanner programs cannot detect polymorphic viruses.

Antivirus scanner programs can only detect already known viruses that have been previously studied and for which a signature has been determined. Thus, the use of scanner programs does not protect your computer from the penetration of new viruses.

To effectively use antivirus programs that implement the scanning method, it is necessary to constantly update them with the latest versions.

Heuristic analysis

Heuristic analysis is a relatively new method in virus detection. It allows you to detect previously unknown viruses without the need to first collect data about the file system, as required by the change detection method.

Anti-virus programs that implement the heuristic analysis method scan programs and boot sectors of disks and floppy disks, trying to detect code characteristic of viruses in them. For example, a heuristic analyzer can detect that the program being tested contains code that installs a resident module in memory.

The Doctor Web anti-virus program, which is part of the DialogScience AO kit, has a powerful heuristic analyzer that allows you to detect a large number of new viruses.

If the heuristic analyzer reports that a file or boot sector is possibly infected with a virus, you should take this with great attention. It is advisable to examine such files using the latest versions of anti-virus programs or send them for detailed study to DialogScience JSC.

The IBM AntiVirus kit includes a special module aimed at detecting viruses in boot sectors. This module uses patent-pending neural network technology from IBM heuristic analysis and allows you to determine whether the boot sector is infected with a virus.

Change Detection

When a virus infects a computer, it necessarily makes changes on the hard drive, for example, it adds its code to the executable file, adds a call to the virus program to the AUTOEXEC.BAT file, changes the boot sector, and creates a satellite file.

Antivirus programs can pre-remember the characteristics of all areas of the disk that are attacked by a virus, and then periodically check them (hence their name - audit programs). If a change is detected, then it is possible that the computer has been attacked by a virus.

Typically, audit programs store in special files images of the master boot record, boot sectors of logical disks, parameters of all monitored files, as well as information about the directory structure and numbers of bad disk clusters. Other characteristics of the computer can also be checked - the amount of installed RAM, the number of disks connected to the computer and their parameters.

Auditing programs can detect most viruses, even those that were previously unknown. As a rule, auditors cannot detect viruses that infect program files only when they are copied, since they do not know the file parameters that existed before copying.

However, it should be taken into account that not all changes are caused by the invasion of viruses. Thus, the boot record may change when the operating system version is updated, and some programs write data inside their executable file. Batch files change even more frequently; for example, the AUTOEXEC.BAT file usually changes during the installation of new software.

Audit programs will not help in the case when you have written a new file infected with a virus to your computer. True, if the virus infects other programs already taken into account by the auditor, it will be detected.

The simplest Microsoft Anti-Virus (MSAV) audit program is part of the MS-DOS operating system. Its main, and perhaps only, advantage is that you do not need to spend additional money on it.

Significantly more advanced control tools are provided by the Advanced Diskinfoscope (ADinf) audit program, which is part of the anti-virus kit of DialogScience JSC. We will look at these tools in more detail in the next section, but for now we will just note that together with ADinf you can use the ADinf Cure Module (ADinfExt). ADinf Cure Module uses previously collected information about files to restore them after being infected by unknown viruses.

Of course, not all viruses can be removed by ADinf Cure Module and other software based on monitoring and periodically checking the computer. For example, if a new virus encrypts a disk, as the OneHalf virus does, then deleting it without decrypting the disk will likely result in loss of information. Viruses of this type can be removed only after careful study by specialists and the inclusion of modules to combat them in regular polyphages - Aidstest or Doctor Web.

The anti-virus audit programs known to us at the time of writing are unsuitable for detecting viruses in document files, since they are inherently constantly changing. A number of programs stop working after the vaccine code is introduced into them. Therefore, scanner programs or heuristic analysis should be used to monitor them.

Residential monitors

There is also a whole class of anti-virus programs that are constantly located in the computer’s RAM and monitor all suspicious actions performed by other programs. Such programs are called resident monitors or watchmen.

The resident monitor will inform the user if any program attempts to change the boot sector of the hard drive or floppy disk executable file. The resident monitor will tell you that the program is trying to leave a resident module in RAM, etc.

Most resident monitors allow you to automatically check all launched programs for infection with known viruses, that is, they perform the functions of a scanner. Such a check will take some time and the program loading process will slow down, but you will be sure that known viruses will not be able to activate on your computer.

Unfortunately, residential monitors have many disadvantages that make this class of programs unsuitable for use.

Many programs, even those that do not contain viruses, can perform actions to which resident monitors respond. For example, a normal LABEL command modifies data in the boot sector and triggers the monitor.

Therefore, the user's work will be constantly interrupted by annoying antivirus messages. In addition, the user will have to decide each time whether this trigger is caused by a virus or not. As practice shows, sooner or later the user turns off the resident monitor.

Finally, the smallest disadvantage of resident monitors is that they must be constantly loaded into RAM and therefore reduce the amount of memory available to other programs.

The MS-DOS operating system already includes a resident anti-virus monitor, VSafe.

Vaccination programs

In order for a person to avoid certain diseases, he is vaccinated. There is a way to protect programs from viruses, in which a special control module is attached to the protected program to monitor its integrity. In this case, the program checksum or some other characteristics can be checked. When a virus infects a vaccinated file, the control module detects a change in the file's checksum and reports it to the user.

Alas, unlike human vaccinations, vaccinating programs in many cases does not save them from infection. Stealth viruses easily fool the vaccine. Infected files work as usual; the vaccine does not detect the infection. Therefore, we will not dwell on vaccines and will continue to consider other means of protection.

Hardware antivirus protection

Today, one of the most reliable ways to protect computers from virus attacks is hardware and software. They usually consist of a special controller that is inserted into one of the computer's expansion slots and software that controls the operation of this controller.

Due to the fact that the hardware protection controller is connected to the computer's system bus, it gains full control over all access to the computer's disk subsystem. Hardware protection software allows you to specify areas of the file system that cannot be modified. You can protect the master boot record, boot sectors, executables, configuration files, etc.

If the hardware and software complex detects that any program is trying to violate the installed protection, it can inform the user about this and block further operation of the computer.

The hardware level of control over the computer's disk subsystem does not allow viruses to disguise themselves. As soon as the virus manifests itself, it will be immediately detected. In this case, it is completely indifferent to how the virus works and what means it uses to access disks and floppy disks.

Hardware and software protection tools allow you not only to protect your computer from viruses, but also to promptly stop the operation of Trojan programs aimed at destroying the computer’s file system. In addition, hardware and software allow you to protect your computer from an unskilled user and attacker; they will not allow him to delete important information, format the disk, or change configuration files.

Currently, only the Sheriff hardware and software complex is mass-produced in Russia. It will reliably prevent infection of the computer and will allow the user to spend significantly less time on anti-virus monitoring of the computer using conventional software.

Much more hardware and software protection products are produced abroad, but their price is much higher than that of Sheriff and amounts to several hundred US dollars. Here are some names of such complexes:

Name of the complex

Manufacturer

JAS Technologies of the Americas

Leprechaum Software International

Digital Enterprises

Lynn Internati onal

Swabian Electronics Reutlingen

Telstar Electronics

Bugovics & Partner

In addition to performing its main function, computer hardware and software can provide various additional services. They can manage the differentiation of access rights of different users to computer resources - hard drives, floppy drives, etc.

Protection built into the computer's BIOS

Many companies that produce computer motherboards have begun to build into them the simplest means of virus protection. These tools allow you to monitor all access to the master boot record of hard drives, as well as to the boot sectors of disks and floppy disks. If any program tries to change the contents of boot sectors, protection is triggered and the user receives a corresponding warning. At the same time, he can allow this change or prohibit it.

However, such control cannot be called true control at the hardware level. The software module responsible for controlling access to boot sectors is located in the BIOS ROM and can be bypassed by viruses if they replace boot sectors by accessing directly the I/O ports of the hard drive and floppy drive controller.

There are viruses that try to disable BIOS antivirus control by modifying certain cells in the computer's non-volatile memory (CMOS memory).

Tchechen viruses .1912 and 1914

Very dangerous resident encrypted viruses. They try to find the text strings Megatrends and AWARD. If the search is successful, they assume that the computer has an AWARD or AMI BIOS installed, disable boot sector control and infect the master boot record of the hard disk. In about a month after infection, the virus deletes information from everything first hard drive

The simplest means of hardware protection is to disconnect from the computer all channels through which a virus can enter it. If the computer is not connected to a local network and does not have a modem installed, then it is enough to disconnect the floppy drives and the main channel for viruses to enter the computer will be blocked.

However, such a disconnect is not always possible. In most cases, the user needs access to disk drives or modems for normal operation. In addition, infected programs can enter the computer through a local network or CDs, and disabling them will significantly narrow the scope of the computer.

Virus removal methods

Finding a virus on your computer is only half the battle. Now it needs to be removed. In most cases, antivirus programs that detect a virus can remove it. There are two main techniques used by antivirus programs to remove viruses.

If you find a virus by checking executable files with the COM and EXE name extensions, you should check all other file types that contain executable code. First of all, these are files with the extension SYS, OVL, OVI, OVR, BIN, BAT, BIN, LIB, DRV, BAK, ZIP, ARJ, PAK, LZH, PIF, PGM, DLL, DOC

You can even check all the files on your computer's hard drives. Perhaps someone renamed the infected executable file by changing its extension. For example, the EDITOR.EXE file was renamed EDITOR.EX_. Such a file will not be scanned. If it is later renamed back, the virus will be able to become active again and spread on the computer.

The first, most common method involves the antivirus program removing an already known virus. In order for a virus to be properly removed, it is necessary that it be studied, an algorithm for its treatment must be developed, and this algorithm must be implemented in a new version of the antivirus.

The second method allows you to recover files and boot sectors infected with previously unknown viruses. To do this, the antivirus program must analyze all executable files in advance, before viruses appear, and save a lot of various information about them.

When the antivirus program is launched subsequently, it re-collects data about executable files and compares it with the data received previously. If inconsistencies are found, the file may be infected with a virus.

In this case, the antivirus tries to restore the infected file, using information about the principles of introducing viruses into files and information about this file obtained before it was infected.

Some viruses infect files and boot sectors, replacing part of the infected object with their code, that is, irreversibly destroying the infected object. Files and boot sectors infected with such viruses cannot be cured using the first method, but as a rule they can be recovered using the second method. If you cannot restore infected executable files using antivirus programs, you will have to restore them from the distribution or backup copy or simply delete them (if they are not needed).

The situation with the master boot record and boot sectors is somewhat more complicated. If the antivirus program is not able to restore them automatically, you will have to do it manually using the FDISK, SYS, FORMAT commands. Manual recovery of boot sectors will be described a little later, in the sixth chapter.

There is a whole group of viruses that, when they infect a computer, become part of its operating system. If you simply remove such a virus, for example by restoring an infected file from a floppy disk, the system may become partially or completely inoperable. Such viruses must be treated using the first method.

Examples of such viruses include the OneHalf boot viruses and the VolGU group of viruses.

As your computer boots, the OneHalf virus gradually encrypts the contents of your hard drive. If the virus is memory resident, it intercepts all access to the hard drive. If any program tries to read an already encrypted sector, the virus decrypts it. If you remove the OneHalf virus, the information on the encrypted part of your hard drive will become inaccessible.

The VolGU virus does not encrypt data, but it is no less dangerous than OneHalf. Each sector of the hard drive stores not only the data written to it, it also contains additional verification information. It represents the checksum of all bytes in the sector. This checksum is used to verify the integrity of information.

Typically, when a program accesses a computer's disk subsystem, only data is read and written, and the checksum is adjusted automatically. The VolGU virus intercepts calls from all programs to the hard drive and, when writing data to the disk, corrupts the sector checksums.

When the virus is active, it allows sectors with an incorrect checksum to be read. If you simply remove such a virus, then sectors with an incorrect checksum will not be read. The operating system will inform you of a hard disk read error (sector not found).

Preparing for a virus attack

Computer users should prepare in advance for a possible virus attack, and not wait until the last minute when a virus has already appeared. Thanks to this, you can quickly detect the virus and remove it.

What should such preparation consist of?

¨ Prepare a system floppy disk in advance. Install polyphage antivirus programs on it, for example Aidstest and Doctor Web

¨ Constantly update the versions of anti-virus programs recorded on the system floppy disk

¨ Periodically scan your computer using various antivirus tools. Monitor all changes to the disk using an audit program such as ADinf. Check new and changed files with the polyphage programs Aidstest and Doctor Web

¨ Check all floppy disks before use. To scan, use the latest versions of antivirus software

¨ Check all executable files written to the computer

¨ If you need a high level of virus protection, install a hardware protection controller on your computer, such as Sheriff. The combined use of a hardware controller and traditional antivirus tools will maximize the security of your system

Creating a system floppy disk

Typically, a computer has two floppy disk drives. One is for 5.25" floppy disks, and the second is for 3.5" floppy disks. The MS-DOS operating system, as well as the Windows, Windows 95, Windows NT and OS/2 operating systems name them A: and B:. Which drive is named A: and which is named B: depends on the computer hardware.

Typically, the user can change the drive names. To do this, you need to open the computer case and switch several connectors. If there is such a possibility, then this work should be entrusted to a technical specialist.

5.25-inch magnetic disk drives are gradually falling out of use, so new computers install only one floppy disk drive designed for 3.5-inch floppy disks. In this case, it is named A:, drive B: is missing.

You can boot your computer using the system floppy disk only from drive A:. Thus, to make a system floppy disk for your computer, you must take a floppy disk of the appropriate size.

There are many programs that allow you to prepare a system floppy disk. Such programs are included in all operating systems - MS-DOS, Windows 3.1, Windows 95 and OS/2, etc.

The simplest programs for preparing system floppy disks are the FORMAT or SYS commands, which are part of the MS-DOS and Windows 95 operating systems, and therefore we will describe them first.

Using the FORMAT Command

The FORMAT command formats a floppy disk and can write operating system files to it. When formatting floppy disks, FORMAT marks the tracks on the floppy disk and forms system areas - the boot sector, the file allocation table and the root directory.

When formatting a floppy disk, all information recorded on it is erased. Since FORMAT re-writes the boot sector to the floppy disk, if it was previously infected with a boot virus, the virus is removed. We can say that the FORMAT command performs the main function of an antivirus - it removes any viruses from the floppy disk.

When calling the FORMAT command, you can specify a large number of different parameters. You can find their description in the fourth volume of the “Personal Computer - Step by Step” series, which is called “What you should know about your computer.” In this book we will describe only a few of the most necessary parameters:

FORMAT drive:

For the drive parameter, you must specify the name of the drive that will format the floppy disk. The /S parameter means that after formatting the floppy disk, the main files of the operating system are transferred to it and the floppy disk becomes the system disk. To prepare a system floppy disk, be sure to specify this parameter.

As we said, the FORMAT command deletes all files written on it from a formatted floppy disk. Typically, FORMAT records hidden information on a floppy disk, allowing, if necessary, to restore files deleted from it.

To recover files deleted while formatting a floppy disk, use the UNFORMAT command

If you are confident that you won't have to restore them, you can speed up formatting the floppy disk by specifying the additional /U parameter. In this case, information about the deleted files is not saved and they cannot be restored.

You can greatly speed up the process of preparing a system floppy disk by specifying the optional /Q parameter to the FORMAT command. In this case, you quickly format the floppy disk:

Let us describe the process of preparing a system floppy disk in more detail. Enter the following command:

The screen will prompt you to insert the floppy disk into drive A: and press the key :

Insert new diskette for drive A:
and press ENTER when ready...

The formatting process will begin. The percentage of work completed will be displayed on the screen.

Formatting 1.2M
77 percent completed.

After formatting is completed, the main files of the operating system are written to the floppy disk. You can then enter the floppy disk label. The label must contain no more than eleven characters. After entering the label, press . If you do not want to assign a label to the floppy disk, press the straightaway:

Format complete.
System transferred

Volume label (11 characters, ENTER for none)?

Then various statistical information will appear on the screen: the total capacity of the floppy disk, the amount of space occupied by operating system files, the amount of available free space. If bad sectors are found on the floppy disk that are unusable, their total size in bytes is displayed. Below is the sector size in bytes, the number of free sectors on the floppy disk and its serial number:

1,213,952 bytes total disk space
198,656 bytes used by system
1,015,296 bytes available on disk

512 bytes in each allocation unit.
1,983 allocation units available on disk.

Volume Serial Number is 2C74-14D4

Format another (Y/N)?

At this point, the preparation of the system floppy disk can be considered complete. If you do not plan to create multiple system floppy disks at once, press . To create another system floppy disk, press and repeat the process we described again.

Using the SYS Command

If you have a free, blank, formatted floppy disk, the fastest way to make it a system disk is to use the SYS command. To do this, insert the floppy disk into your computer's drive and enter the following command:

SYS drive2:

The SYS command has one required parameter - drive2. This parameter must specify the name of the drive in which the system diskette is prepared. You should specify as a parameter drive2 name A: or B:.

Optional Parameters drive1 And path determine the location of system files on the disk. If you do not specify these options, the SYS command will take system files from the root directory of the current drive.

Writing anti-virus programs to a system floppy disk

The system floppy disk contains the main files of the MS-DOS operating system: IO.SYS, MSDOS.SYS, COMMAND.COM, DBLSPACE.BIN. If the system floppy disk was made in an operating system compatible with MS-DOS, for example IBM PC-DOS, then the names of these files may be different.

The IO.SYS and MSDOS.SYS files represent the core of the operating system. The COMMAND.COM file is commonly referred to as the command processor. This is the same program that displays the system prompt on the computer screen and executes operating system commands. The last file on the system floppy disk is DBLSPACE.BIN. It contains an operating system extension that provides access to the compacted disks of the DoubleSpace system.

The main operating system files - IO.SYS, MSDOS.SYS have the "hidden file" attribute and are not shown by the DIR command. To see them, add the /A parameter to the DIR command.

After you've made a system floppy disk, there's still a lot of free space left on it. The total volume occupied by the main files of the MS-DOS operating system - IO.SYS, MSDOS.SYS, COMMAND.COM, DBLSPACE.BIN is about 200 KB. Thus, if you used a high-density floppy disk, then you have more than a megabyte of free space at your disposal.

Write to the system floppy disk the software necessary to test and repair the damaged operating system. First of all, you need to write down anti-virus programs that scan for viruses and a program to check the integrity of the file system. It is useful to write down the FORMAT and FDISK commands - they may be needed to manually restore the system. For convenience, you can additionally write a shell, such as Norton Commander, and any text editor to the system floppy disk.

The following table lists programs that will help you get your computer back up and running. It is advisable to write them all to a system floppy disk. If they do not fit on one system floppy disk, prepare another floppy disk and write the remaining programs onto it.

Program

Purpose

Polyphage antivirus program. Allows you to detect and remove a large number of viruses. Polymorphic viruses that Aidstest cannot detect are detected by Doctor Web

A polyphage antivirus program that implements a heuristic virus search algorithm. Allows you to detect complex polymorphic viruses. You should use it together with Aidstest antivirus

ScanDisk or
Norton Disk Doctor

In many cases, the cause of computer malfunctions and strange behavior is not viruses, but a corrupted file system. ScanDisk and Norton Disk Doctor detect and automatically correct errors in the MS-DOS file system

A program for testing all computer subsystems. Allows you to detect hardware malfunctions

Norton Commander

Shell for the MS-DOS operating system. Makes working with the computer much easier. Contains a built-in text editor, file viewers in various formats

MS-DOS command. Designed for formatting computer hard and floppy disks

MS-DOS command. Designed to create and delete logical drives. The FDISK and FORMAT commands may be needed in case of complete destruction of information on the hard drive. Their use is described in the chapter “File system recovery”

Disc editor. Allows you to view and edit any information recorded on the disk, including system areas. Disk Editor allows you to edit the master boot sector, boot sectors, FAT allocation tables, directory structures and files

In some cases, special drivers or resident programs may be used to access computer hard drives. They must be written to a prepared system floppy disk. So that they are automatically connected when you boot the computer from the system floppy disk, create the CONFIG.SYS and AUTOEXEC.BAT files on it, writing in them the commands for loading the necessary drivers.

If you have a CD-ROM reader connected to your computer, write the software you need to use it to a system floppy disk. For MS-DOS, you need to write the reader driver and the MSCDEX program included with the operating system. Access to the reading device will allow you to quickly restore software recorded on CDs.

The Windows 95 operating system does not need the MSCDEX program, however, if the graphical shell of this system does not load, MSCDEX still needs to be connected

After you have fully prepared the system floppy disk and written all the necessary programs onto it, install write protection on it. To do this, on a 5.25" floppy disk, you need to seal the slot on the edge of the floppy disk, and on a 3.5" floppy disk, open the protection window. Write protection will ensure that you do not accidentally damage the contents of the floppy disk and that viruses will not be able to penetrate it. Since floppy disks sometimes fail, in this case it is best to have several identical system diskettes.

Booting from a system floppy disk

To boot your computer from a system floppy disk, you must set priority to boot the operating system from floppy disks. The operating system boot priority is determined in the CMOS memory. To change it, you must run the Setup program. You can learn more about the Setup program in the fourth volume of the “Personal Computer - Step by Step” series, which is called “What you should know about your computer.”

There are viruses that change the computer's boot priority. To do this, they change the data recorded in CMOS memory. Examples of such viruses are the Mammoth.6000 and ExeBug viruses. These viruses disable drives in CMOS memory, temporarily connecting them if any program wants to read or write information to the floppy disk. When a user tries to boot a computer from a floppy disk, the boot will be performed from the hard disk because the floppy drive is disabled. The virus will gain control and then boot the computer from the floppy disk.

At the same time, from the user’s point of view, everything looks as usual. He sees that the operating system is loading from a floppy disk, but by this time the virus is already in the RAM and controls the operation of the computer.

Therefore, immediately before loading MS-DOS from the system floppy, make sure that the contents of the CMOS memory are installed correctly. To do this, run the BIOS setup program and check the type of drives specified there, as well as the boot order of the computer.

Insert the system floppy disk into drive A: and restart the computer. If you suspect the presence of viruses, to restart you must turn off and turn on the computer's power or press the "Reset" button on the computer case. Some viruses track reboots using keystrokes and can remain in RAM even after such a boot from the system floppy disk.

After the initial testing of the computer, the operating system will begin loading from the floppy disk. The A: LED should light up. The boot process from a floppy disk is slightly slower than from a hard drive, so you will have to wait a bit. When the operating system loads, a corresponding message will appear on the screen.

The operating system will then ask you for the current date and time. The date and time are only requested if the system configuration file AUTOEXEC.BAT is not on the floppy disk (disk).

If you do not want to change the date and time, press the key twice . In this case, the date and time will remain unchanged, and the MS-DOS system prompt will appear on the screen:

You can create an empty AUTOEXEC.BAT file on the system floppy disk, then the date and time will not be requested and after loading the operating system, a system prompt will immediately appear on the screen.

Is it possible to prevent viruses from entering?

If you do not periodically carry out work to prevent and treat computers from viruses, the possibility of loss of stored information and destruction of the operating environment becomes more than real.

The negative consequences of your negligence can be different, depending on what virus gets into your computer. You may lose either some of the information from the files stored on your computer, or individual files, or even all the files on the disk. But the worst thing is if the virus makes small changes to data files, which may not be noticed at first, and then lead to errors in financial or scientific documents.

Work on the prevention and treatment of computers from viruses may include the following actions:

w Install software only from distribution kits

w Write-protect all your floppy disks and remove them only when necessary

w Limit the exchange of programs and floppy disks, check such programs and diskettes for viruses

w Periodically check your computer's RAM and disks for viruses using special anti-virus programs

w Back up user information

Don't meet strangers

No amount of security measures will help protect your computer from viruses unless you first scan all executable files written to it. Today, such a check is only possible with the help of polyphage antivirus programs.

The constant emergence of more and more new viruses requires the use of the latest versions of antivirus programs. It is desirable that they provide a search not only for known viruses, but also a heuristic analysis of scanned programs and boot sectors. It will allow you to detect files infected with new, unknown and unstudied viruses.

Unfortunately, anti-virus programs cannot provide a complete guarantee that the software being scanned is free of viruses, much less Trojans or logic bombs. By installing software of unknown origin on your computer, you always run a risk

In large organizations, it makes sense to dedicate a special computer to install questionable software, such as computer games. This computer should be isolated from other computers in the organization. First of all, it is necessary to disconnect it from the local network and prohibit users not only from copying programs from it, but also from writing files to it from their work diskettes, which are not previously write-protected.

When working with suspicious software, use monitor programs, such as the VSafe monitor included with MS-DOS. If the program is actually infected with a virus or contains a logic bomb, the monitor will report any unauthorized actions on its part. Unfortunately, monitor programs like VSafe can easily be deceived by viruses, so it is more reliable to use software and hardware protection tools.

The “DialogueScience” anti-virus kit includes the Sheriff software and hardware protection system. Among other things, it performs all the functions of monitor programs, but does it much better. Due to the fact that computer control is provided by a special protection controller at the hardware level, viruses will not be able to deceive Sheriff.

How to write-protect floppy disks

You can write protect your floppy disks. The protection works at the computer hardware level and cannot be disabled using software methods. Therefore, the virus will not be able to infect the boot sector and executable files written on a floppy disk with write protection installed.

All software distributions stored on floppy disks should be write-protected. Most software can be installed from write-protected floppy disks

If you try to write data to a write-protected floppy disk, the operating system will display a warning message on the computer screen. It can take different forms, depending on what tools are used to write to the floppy disk.

For example, if you use the COPY or XCOPY commands of the MS-DOS operating system and try to write a file to a protected floppy disk, then the following message will appear on the screen:

Write protect error reading drive A
Abort, Retry, Fail?

The user must answer what the operating system should do in this situation. You can choose three responses: Abort, Retry or Fail. To do this, just enter the first character of the selected branch from the keyboard: Abort - ,Retry- , Fail - . You can use both uppercase and lowercase letters.

Choosing Abort or Fail means that the operating system should abandon the attempt to write information to the floppy disk (Abort simply cancels the operation, and Fail indicates that it should return an error code to the program). If you need to perform a write operation, remove the write protection from the floppy disk and select Retry.

You must pay close attention to the message about an attempt to write to a protected floppy disk. Reading files from a floppy disk and running most programs from it should not cause writes to it. If you are sure that the floppy disk should not be written to, but it does, there is a good chance that your computer is infected with a virus.

Some viruses block the message about an attempt to violate write protection when they infect executable files or the boot sector of a floppy disk. This allows them to go undetected if the floppy disk is protected. However, you will achieve the desired result; the floppy disk will remain uninfected.

Virus Plague.2647

A harmless resident stealth virus. When opening infected files, it removes its code from them, and then infects again when the file is closed. When infecting files on floppy disks, it checks whether write protection is set. If protection is installed, the virus will not try to infect files on it. Contains the string "PLAGUE"

Write protection can be installed on floppy disks of any size - 3.5 inches and 5.25 inches. This is easiest to do on 3.5-inch floppy disks. You just need to close the small hole in the corner of the floppy disk with a special plastic cover, as shown in Fig. 2.1. Removing write protection is also easy: just open the protective hole.

Rice. 2.1. Write protection on 3.5" floppy disk

To protect a 5.25” floppy disk from writing, you need to seal the slot in the floppy disk envelope (Fig. 2.2). To do this, use a small rectangular piece of adhesive paper. Typically, such paper is sold along with floppy disks. As a last resort, you can use regular electrical tape. You can remove the write protection by removing the piece of paper you pasted.

It is often very difficult to remove and install protection on a 5.25” floppy disk; sooner or later you will get tired of it and a virus will be able to penetrate the floppy disk. Therefore, if possible, discard 5.25" floppy disks and replace them with more convenient 3.5" floppy disks.


Rice. 2.2. Write protection on 5.25" floppy disk

Choosing the correct boot order for your computer

The operating system can be loaded either from a hard drive or from a floppy disk. Typically, the computer boots from the hard drive, but if, when the computer is turned on or rebooted, a floppy disk is inserted into drive A: (accidentally or on purpose), the operating system will start loading from it. If the floppy disk is infected with a boot virus, it will take control and immediately try to infect the computer's hard drive.

Most computers allow you to specify the priority in which the operating system should boot. This order is set using the BIOS Setup program. You can read more about the BIOS Setup program in the “File system recovery” section.

To protect your computer from accidental infection by a boot virus, specify that the operating system should first boot from the C: drive, and only if it malfunctions, from the A: drive.

If you need to boot your computer from a floppy disk, make sure there are no viruses on it. To do this, first check it with several antivirus programs, such as Doctor Web and Aidstest.

It is best if you prepare a system floppy disk in advance, and to prevent it from being accidentally damaged, install write protection on it. It is useful to write computer diagnostic programs onto the system floppy disk - antivirus programs, programs for checking the integrity of the file system and the health of the computer hardware. We described how to create a system floppy disk in the “Creating a system floppy disk” section.

Unpopular measures

In organizations, strict protection measures related to cutting off channels of possible virus entry from computers can be very effective. This primarily applies to floppy drives. The drives can be physically disabled and removed from the computer, or they can be disabled only in the CMOS memory, and a password must be set in the BIOS Setup program.

Ideally, you should disconnect all disk drives, CD-ROM drives, modems, serial and parallel ports, and network adapters from the computer. Of course, this is unrealistic, but one should not completely abandon such an idea.

Backup

It is very important to organize a backup copy of information stored on your computer. Depending on the means at your disposal, you can perform a complete copy of your computer's hard drives or copy only the most important information that cannot be recovered in any other way.

Magnetic tapes are usually used for backup. Recording on them is carried out with special digital tape recorders called streamers. The volume of magnetic cassettes ranges from 200 MB to 4 GB. Recently, magneto-optical disk memory devices have become available. In terms of reliability and ease of use, they are significantly superior to magnetic tape. The volume of magneto-optical disks varies widely and ranges from tens of megabytes to several gigabytes.

If you have neither a streamer nor a magneto-optical disk at your disposal, then in many cases it is enough to use simple floppy disks. Of course, writing to floppy disks is the worst way to backup. Firstly, floppy disks have a very small capacity - a little more than one megabyte. Secondly, floppy disks are very unreliable. Sometimes it is not possible to read previously recorded information from them.

One backup is not enough. You should have multiple backups. Here's a small example. You are performing another copy and suddenly there is a power failure or a virus attack. The computer freezes, the data recorded on the computer and its copy are corrupted

When performing backups, you need to be extremely careful. Before copying, always check the integrity of the information being copied. Perform virus scans and file system scans. To do this, use the latest versions of antivirus software and programs like ScanDisk. If you do not follow this rule, then all backup copies will sooner or later be damaged.

In particularly critical cases, perform cyclic data copying. For example, update one copy every day, the second every week, the third every month.

Archiving files

If you use regular floppy disks for backup, then you should compress them with some kind of archiving program before writing files to them. Archive programs allow you to reduce the size of disk memory occupied by files. This occurs by eliminating the redundancy of information stored in compressed files.

Compressed files can take up significantly less disk space than their originals. Thus, text files prepared, for example, in the word processor Microsoft Word for Windows, are usually halved. Of course, it is impossible to work with such a file. Before work, it must be restored using the same archiving program.

Currently, the most popular archivers are ARJ, PKZIP, RAR. They all perform approximately the same functions and can be used to create backup copies of documents.

Data archiving issues are discussed in more detail in the tenth volume of the “System Programmer's Library” series, which is called “IBM PC/AT Computer, MS-DOS and Windows. Questions and answers". Now we will only give an example of using the ARJ archiver to prepare backup copies of files. The format for calling the ARJ archiver is quite complex:

ARJ<команда> [-<ключ> [-<ключ>...]] <имя архива>
[<имена файлов>...]

The first parameter is team - determines the operating mode of the archiver:

Archiver operating mode

Adding new files to the archive

Removing files from the archive

Extracting files from an archive

Viewing archive contents

Transferring files to the archive. The files are archived and then the original files are deleted from the disk

Recovering files along with the directory and subdirectory structure in which these files were located when archived

Recovering archive files. The structure of directories and subdirectories is not restored; all files from the archive are placed in one directory

Update files in the archive. Only changed and new files are written to the archive. Files that remain unchanged are not archived again. This saves a lot of time

One of the following commands may be followed by one or more optional additional parameters key. Additional parameters must be highlighted with a "-" symbol. Here is a table of the most important additional parameters and describe their purpose:

Additional parameter

Purpose

Protecting the created archive with a password

Used with the "a" or "m" commands to indicate that the archive should include files from the current directory and all its subdirectories

Creation and recovery of multi-volume archives located on several floppy disks. Each floppy disk contains one archive volume (file). There are several modifications to the -v parameter:

VV - issue a sound signal between processing of individual archive volumes;

VA - automatically determine the amount of free space on a floppy disk (the size of the next archive volume);

Vnnnnn - size of individual archive volumes, for example V20000 - create an archive from 20 KB volumes;

V360, V720, V1200, V1440 - create fixed size volumes of 360 KB, 720 KB, 1.2 MB, 1.44 MB

Recover files from a damaged archive. Use this option if restoring files from an archive was interrupted by a message to the archiver about violations in the structure of the archive file

X

The archiver will not ask the user for permission to perform various actions, for example, to create a new multi-volume archive file, create directories

The additional parameters are followed by the name of the archive file, followed by a list of names of files to be extracted, added or deleted. When specifying the names of these files, you can use the characters "?" And "*". If you do not specify a list of file_names, all files located in the current directory or archive will be assumed.

Archive programs are very convenient for creating backup copies on floppy disks. If the archive file does not fit on one floppy disk, the archiver allows you to create a multi-volume archive consisting of several files. To do this, you need to specify the additional parameter V. Individual files of a multi-volume archive can be written to several floppy disks.

The following command creates a multi-volume archive of all files located in the current directory and all its subdirectories, excluding files with the name TMP or the name extension BAK. Multi-volume archive files will be slightly larger than 1.44 MB in size. You can burn them onto 3-inch floppy disks.

ARJ A -R -X*.BAK -XTMP.* -V1440 !COLLAPS

The files of the created archive will have the name!COLLAPS and various extensions:

COLLAPS.ARJ
!COLLAPS.A01
!COLLAPS.A02
!COLLAPS.A03
....

You can restore files recorded in this multi-volume archive either by first copying them to your computer’s hard drive or directly from floppy disks. For example, to restore from floppy disks, use the following command:

ARJ X -V A:\!COLLAPS

After restoring the archive file, the user will be prompted to process the next archive file. Insert the following floppy disk into the drive and press the button .

Backing up documents in Windows 95

The Windows 95 operating system provides convenient tools for backing up individual documents and entire directories to floppy disks. To do this, just open the My Computer icon and go to the directory, the files from which need to be written to floppy disks.

Then move the mouse pointer to the icon of the file or directory that needs to be copied and click the right mouse button. A small menu will appear on the screen.


Rice. 2.3. Writing the Library directory to floppy disks

Select the Send To line from this menu, and then in the temporary menu that opens, specify the drive on which the copying will take place. In Figure 2.3 we showed how to copy the Library directory to 3.5-inch floppy disks.

Once you specify the drive, the copying process will begin. If one floppy disk is not enough to copy all the files in a directory, the operating system will ask you to insert another floppy disk.

Unfortunately, the upload method we demonstrated does not allow copying onto floppy disks files whose size exceeds the size of the floppy disk itself. Therefore, it is impossible to copy very large documents in this way.

Let's check for viruses

To scan new programs that you record on your computer, you must use the latest versions of polyphage antivirus programs. They will be able to detect any viruses known at the time the antivirus program was created. It is advisable that the antivirus software you use perform heuristic analysis of programs. Perhaps this will allow us to detect new, not yet known viruses.

The popularity of antivirus programs Aidstest and Doctor Web is so great that they are installed on almost every computer. Therefore, now we will check your computer using these programs and see if there are any viruses on it.

If you do not have the latest versions of antivirus software, use the programs that you have. Even though such a scan will be incomplete, it will still detect a large number of viruses.

Searching for viruses on your computer's hard drive

First, let's check all computer hard drives with Aidstest. Enter the following command at the DOS prompt.

Pay close attention to the messages generated by the program while scanning your computer. If a virus is detected, Aidstest will report it.

Many viruses that Aidstest does not detect can be caught by Doctor Web. In addition, Doctor Web allows you to perform heuristic analysis of programs and boot sectors. Therefore, repeat the scan using Doctor Web.

DRWEB * /CL /HI /AR /HA1 /RV /UP

Doctor Web Anti-Virus will scan all your computer's hard drives, and it will search for viruses not only directly in executable files, but also in archive files, as well as in compressed executable files. If viruses are detected, the program will display a corresponding message on the screen.

In all the examples given in this section, only a virus scan is performed; none of the detected viruses will be removed. To do this, you need to run the antivirus program one more time, booting from the system floppy disk.

Searching for viruses on floppy disks

All new floppy disks, as well as floppy disks that you have given to someone else, must be checked for virus infection. To do this, use polyphage antiviruses Aidstest and Doctor Web. Call first one and then another program sequentially. The following example shows how to test a floppy disk inserted into drive A:.

AIDSTEST A: /B
DRWEB A: /CL /AR /HA1 /UP /NM /OF

Viruses in archive files

To increase the amount of free space on your hard drive and floppy disks, many users archive rarely used files. For this purpose, special archiver programs can be used to reduce the size of files by eliminating redundancy of data recorded in the file. When the user again needs a file from the archive, he again uses the archiver program.

The files inside the archive are stored in a compressed form, eliminating the possibility of searching for a virus by their signatures. Therefore, if you archived an infected program, it may remain invisible to many antivirus programs.

Some antivirus programs, such as Doctor Web, allow you to scan files recorded inside archives. By checking archives, Doctor Web temporarily restores the files recorded in it and scans them sequentially.

If you find viruses on your computer, be sure to check all archive files, even if your anti-virus program cannot work with archives. Recover files yourself from all archives on the disk, and then scan them with your antivirus program

Typically, when several people work on one computer, they use various means of restricting access to hard drives. For example, Diskreet from the Norton Utilities package allows you to create multiple logical drives. Each user can only have access to some disks; the rest will be completely inaccessible to him.

ArjVirus virus

A harmless non-resident virus. Searches the current directory and its subdirectories for archive files created by the ARJ archiver program. The virus distinguishes archive files only by their extension - ARJ.

If an archive file is detected, the virus creates a file with a random name consisting of four characters from "A" to "V", with a COM extension. The virus writes 5 KB of its code into this file and at the end adds an arbitrary number of bytes to it.

The virus then calls the ARJ archiver program, believing that it is located in one of the directories listed in the PATH variable. To do this, use the command processor:

C:\COMMAND.COM /C ARJ A

The ArjFile parameter specifies the name of the archive file found by the virus. The ComFile parameter contains the name of the newly created virus executable file. This command adds a new executable virus file to the archive file detected by the virus. The original virus file is then deleted.

To prevent the user from seeing information on the screen that is usually displayed by the ARJ archiver program, the virus temporarily disables all output to the monitor screen.

The main idea of ​​the virus is that a user who has recovered files from an infected archive will find an unknown executable file in it and run it out of curiosity

It is necessary to scan for viruses on all disks. It is best if this is done by a user who has access to all disks on the computer. Otherwise, each user will have to check the disks available to him. If any user discovers that there is a virus on a disk accessible to him, he must inform all other computer users about this.

If you find a virus

The greatest value is your data recorded in the computer. These can be text documents, spreadsheet files, databases, program source codes, etc. Their cost can be many, many times greater than the cost of the computer itself and the software installed in it.

Any software destroyed by viruses can be restored from distributions or backup copies. But with data the situation is much worse. If data is not backed up consistently, it may be permanently lost.

Therefore, having discovered a virus, first of all you need to reboot from a blank floppy disk and copy your data from the computer’s hard drive to floppy disks, magnetic tapes or any other information storage devices. Only after this can you begin to treat your computer.

If a virus is detected, it may have already destroyed the information stored on the computer. Destructions can be of various types. Perhaps the data files will be completely destroyed and you will not even be able to read them, or perhaps they will be changed slightly and you will not be able to notice it right away.

Virus Rogue.1208

Dangerous resident virus. Destroys files with the DBF extension by writing the first byte "R" to them and performing an EXCLUSIVE OR logical operation with the number 13 on the rest of the file contents, up to the first character, which has code 13. Destroys CHKLIST ??? files. In the month when the sum of the year value and the month value is equal to 2000, the virus displays the text: “Now you got a real virus! I"m the ROGUE...!”

Try to find out exactly what virus got into your computer and what it does. You can obtain similar information from the virus descriptions that come with your antivirus programs. Virtually all antivirus programs have such lists. They can be made in the form of simple text files or in the form of special hypertext databases.

If you find a virus on your computer, it may have already spread, infecting other computers in your organization. They must be checked without fail. Many users today have computers at home. They may also become infected.

It is necessary to check all floppy disks that were used to work with infected computers. They may be infected with boot and file viruses. The virus can persist on them and then infect the computer again. Floppy disks infected with viruses must be disinfected or formatted.

How to treat a computer

After you have tried to copy all your data (documents, source texts, database files) from your computer, it’s time to start treating your computer and removing the viruses that have infected it. There are at least three options for you to remove viruses from your computer.

The simplest of them is to completely change all the software installed on the computer. You will have to reinstall the operating system and all other programs again. If a virus has infected the boot record, it can be updated by formatting the computer's logical drives using the FORMAT command. However, even formatting will not remove the virus from the master boot record of the hard drive. To do this, use the FDISK command with the undocumented /MBR parameter, and then create partitions and logical drives on the hard drive again.

Operations such as formatting a logical disk, deleting a partition or logical disk with the FDISK command completely destroy all files on this disk. Therefore, there is no need to delete files first.

After you have re-created partitions and logical drives on your hard drive and formatted them, you can begin installing the operating system and other programs. Complete installation of computer software takes a lot of time. To speed up this process, whenever possible, install software products from CDs rather than floppy disks.

You can make restoring your computer much easier if you back up all the information on your computer ahead of time. In this case, after creating and formatting the logical drives, you can restore the software from these backup copies. How this recovery occurs depends on the tools you use to create your backups.

The second option involves manually removing viruses and restoring damaged boot sectors and files. This method is the most complex and requires high qualifications. We will talk about manually restoring your computer a little later in the chapter “Manually restoring the operating system.”

And finally, the last option involves the use of special anti-virus programs. Antivirus programs will automatically detect and remove viruses, restoring the computer's functionality. Unfortunately, such recovery is not always possible, since a large category of viruses irreversibly damages programs and data recorded on computer disks. In this case, you must reinstall the software.

Now we will very briefly look at treating a computer with anti-virus polyphage programs Aidstest and Doctor Web. For more information about these and other programs that allow you to remove viruses from your computer, read the next chapter, which is called “The Best Tool.”

Treating your computer with antivirus programs

A number of resident viruses, located in the computer’s memory, prevent the successful treatment of infected programs and boot sectors. Therefore, it is advisable to perform treatment only after booting the computer from a virus-free system floppy disk. You must first write polyphage antivirus programs onto this floppy disk, for example Aidstest and Doctor Web.

The Aidstest program allows you to remove viruses it detects. To do this, run Aidstest with the /F parameter:

Some viruses cannot be detected and removed by Aidstest, so it must be used in conjunction with Doctor Web antivirus:

DRWEB * /CL /UP /CU

Aidstest and Doctor Web programs can treat not only hard drives, but also floppy disks. To do this, instead of the * parameter, which means working with all hard drives of the computer, you need to specify the name of the drive:

AIDSTEST A:/F
DRWEB A: /CL /UP /CU

Heuristic analysis (heuristic scanning)- a set of antivirus functions aimed at detecting malware unknown to virus databases. At the same time, this term also refers to one of the specific methods.

Almost all modern antivirus products use technology heuristic analysis program code. Heuristic analysis is often used in conjunction with signature scanning to search for complex encrypted and polymorphic viruses. The heuristic analysis technique makes it possible to detect previously unknown infections, however, treatment in such cases is almost always impossible. In this case, as a rule, additional updating of anti-virus databases is required to obtain the latest signatures and treatment algorithms, which may contain information about a previously unknown virus. Otherwise, the file is sent to antivirus analysts or antivirus program authors for examination.

Heuristic analysis technology

Heuristic scanning methods do not provide guaranteed protection against new computer viruses that are not in the signature set, which is due to the use of previously known viruses as the object of analysis, and knowledge about the mechanism of signature polymorphism as the rules of heuristic verification. At the same time, since this search method is based on empirical assumptions, false positives cannot be completely excluded.

In some cases, heuristic methods are extremely successful, for example, in the case of very short program parts in the boot sector: if the program writes to sector 1, track 0, side 0, this leads to a change in the drive partition. But apart from the fdisk auxiliary program, this command is not used anywhere else, and therefore, if it appears unexpectedly, we are talking about a boot virus.

In the process of heuristic analysis, the emulated program is checked by a code analyzer. For example, a program is infected with a polymorphic virus consisting of an encrypted body and a decryptor. The code emulator reads instructions into the antivirus buffer, parses them into instructions and executes them one instruction at a time, after which the code analyzer calculates the checksum and compares it with the one stored in the database. Emulation will continue until the part of the virus necessary to calculate the checksum is decrypted. If the signature matches, the program is defined.

Disadvantages of heuristic scanning

  • Excessive suspicion of the heuristic analyzer can cause false positives if the program contains fragments of code that perform actions and/or sequences, including those characteristic of some viruses. In particular, the unpacker in files packed with the PE packer (Win)Upack causes false positives for a number of antivirus tools that do not recognize this problem.
  • Availability of simple techniques for deceiving the heuristic analyzer. As a rule, before distributing a malicious program (virus), its developers examine existing common anti-virus products, using various methods to avoid its detection during heuristic scanning. For example, by modifying the code, using elements whose execution is not supported by the antivirus code emulator, using encryption of part of the code, etc.
  • Despite statements and advertising brochures from antivirus developers regarding the improvement of heuristic mechanisms, the effectiveness of heuristic scanning is far from expected.
  • Even with successful detection, treatment of an unknown virus is almost always impossible. As an exception, some products can treat viruses of the same type and a number of polymorphic, encrypted viruses that do not have a permanent viral body, but use a single implementation technique. In this case, there may be one entry in the virus database to treat tens or hundreds of viruses.

Scanning

Antivirus protection.

Antivirus programs have been and remain the main means of fighting viruses. You can use antivirus programs (antiviruses) without having any idea how they work. However, without understanding the principles of antivirus software, knowing the types of viruses, as well as how they spread, it is impossible to organize reliable computer protection. As a result, the computer may be infected even if antivirus software is installed on it.

Today, several fundamental techniques for detecting and protecting against viruses are used:

· scanning;

· heuristic analysis;

· use of anti-virus monitors;

· change detection;

· use of antiviruses built into the computer's BIOS.

In addition, almost all antivirus programs provide automatic recovery of infected programs and boot sectors. Of course, if possible.

The simplest method of searching for viruses is that the antivirus program sequentially scans the scanned files in search of signatures of known viruses. A signature is a unique sequence of bytes that belongs to a virus and is not found in other programs.

Antivirus scanner programs are able to find only already known and studied viruses for which a signature has been defined. The use of simple scanner programs does not protect your computer from the penetration of new viruses.

For encrypting and polymorphic viruses that can completely change their code when infecting a new program or boot sector, it is impossible to identify a signature. Therefore, simple antivirus scanner programs cannot detect polymorphic viruses.

Heuristic analysis allows you to detect previously unknown viruses, and for this you do not need to first collect data about the file system, as is required, for example, by the change detection method discussed below.

Anti-virus programs that implement the heuristic analysis method scan programs and boot sectors of disks and floppy disks, trying to detect code characteristic of viruses in them. A heuristic analyzer can detect, for example, that the program being tested installs a resident module in memory or writes data to the program's executable file.

Almost all modern antivirus programs implement their own heuristic analysis methods. In Fig. 1 we showed one of these programs - the McAffee VirusScan scanner, launched manually to scan the disk for anti-virus.

When an antivirus detects an infected file, it usually displays a message on the monitor screen and makes an entry in its own or system log. Depending on the settings, the antivirus may also send a message about the detected virus to the network administrator.

If possible, the antivirus disinfects the file, restoring its contents. Otherwise, the only option offered is to delete the infected file and then restore it from a backup copy (if, of course, you have one).

Page 1


Heuristic analysis allows you to identify unknown viruses, but does not require preliminary collection, processing and storage of information about the file system. Its essence lies in checking the possible habitats of viruses and identifying in them commands (groups of commands) characteristic of viruses. When suspicious commands are detected in files or boot sectors, a message is issued indicating a possible infection.

Heuristic analysis, like the forecasting methods discussed above, is based on the principles of inductive logic, since its central concept is the reliability of the hypothesis and the degree of its validity. Obviously, it is possible to increase the degree of validity of the heuristic hypothesis in relation to the forecast of the development of scientific and technological progress in any of its directions by taking into account the dynamics and trends in the development of scientific research in these areas of science when analyzing.

Using heuristic analysis, it is possible to establish for the selected process algorithm the most appropriate combinations of functional subgroups that are part of the corresponding functional groups: for example, technological and transport rotors, which do not require an upper plate for installation on the frame.

This concludes our heuristic analysis of stellar speckle interferometry.

The program provides the possibility of conducting heuristic analysis at three levels. In this case, files and system areas of disks are examined in order to detect unknown viruses using characteristic code sequences.

The second principle is a heuristic analysis of the significance of the factors taken into account, based on practical experience and intuition.

In 1998, a visual heuristic analysis system for numerical matrices, Visual HCA, was created under the guidance of prof. Repeatedly published reports at conferences in Mexico (China, Belgium) and articles in foreign and domestic journals. In 2000, an application system for visual monitoring of Mexico City pollution measurement data was developed using a visual heuristic analysis system.

The special heuristic analysis algorithm implemented in this anti-virus program also allows you to identify files infected with new types of viruses.

In a number of cases, such a scheme of ordered deterministic calculations, accompanied by a deep heuristic analysis, makes it possible to obtain sufficiently substantiated decisions and thereby complete the optimization of an adsorption plant with incomplete information. But sometimes the resulting solutions can differ significantly in their components. Then it is recommended to continue the optimization calculation according to the scheme outlined below.

Since we now already have an exact theory of game solutions, we are obliged, after this preliminary heuristic analysis, to give an exact analysis strictly based on mathematical theory.

It should be emphasized that a research group formed to solve a particular problem of organizational management must be able to use formal mathematical apparatus and have the ability to perform a purely heuristic analysis of real situations.

Maclaurin and that fission will occur when the growing ratio m reaches the critical value m 0 14 (see section. Two interesting results follow from this heuristic analysis. First, stars with M 0 8 MQ reach the main sequence and stop contracting before their core can undergo fission caused by rotation.


The solution to the problem of constructing a set of conflicting options is carried out using the optimal design software included in the software of the computer-aided design system. Further, using heuristic analysis algorithms, the computer first ranks and selects a finite number of the best AL design options, then diagnoses them or, conversely, first diagnoses, then makes a choice. The obtained results are output to the terminal devices so that the designer can make a final assessment.

When solving a two-criteria problem, one should strive to provide an extremum of a linear combination of criteria or find Pareto sets and make the final decision based on a heuristic analysis of these sets. Sometimes they do the following. A restriction is imposed on one of the criteria and the second criterion is achieved to take an extreme value.

The name of this group of methods comes from the famous Greek word “eureka!” attributed to Archimedes. - “found!”, expressing joy at his discovery. Heuristic methods are based on creative thinking and knowledge of specialists - experts, practical experience of business managers, their intuition, individual and collective judgments. Such methods are considered qualitative-logical, complementing formalized quantitative methods of analysis. The need for their use is due to the complexity and impossibility of clear mathematical modeling of many socio-economic processes (although many of these methods involve the use of mathematical procedures for processing initial information and the results of logical expert analysis).

All heuristic methods can be divided into expert methods and methods for activating creative thinking (sometimes called psychological).

Expert methods, relying on the knowledge, judgment and experience of specialists, they allow us to solve two groups of analytical problems:

  • 1) obtaining information about specific economic phenomena and their causes, about the requirements of key business stakeholders;
  • 2) assessing the characteristic manifestations of stable cause-and-effect relationships, forecasting the possible development of socio-economic processes and substantiating the most rational management decisions for a given situation.

The first group of problems is solved using questionnaires, surveys and interviews with employees of enterprises and representatives of other stakeholder groups of these enterprises. To solve the second group of problems, highly qualified professional experts are involved. In this case, both individual and collective methods of expert assessments can be used.

Individual methods involve the use of the opinions of selected expert specialists, formulated by each of them independently of each other and collected through interviews or questionnaires. The disadvantage of this approach is the known limited knowledge of individual specialists about all aspects of the problem under study, and the commitment of each of them to a specific position or scientific school.

More effective application collective methods, based on the involvement of groups of various experts - theorists and practitioners who are well aware of the essence of the problem, the specifics of related fields of knowledge and activities, having different points of view. The interaction of the involved specialists makes it possible to study the problem at hand from various angles. Among these methods, the most popular commission method(industrial meetings, conferences, seminars and round tables), allowing to develop a common position of the participants, taking into account all the circumstances under discussion. The disadvantage of this method is that the decisions made, due to the desire for compromise and psychological pressure from the most authoritative experts, do not necessarily reflect their best options proposed by individual commission members. This drawback is partly overcome by dividing the commission’s work into two stages:

  • ? general discussion of the problem and free expression of the opinions of the participants;
  • ? critical analysis of all proposals made and development of solutions.

To an even greater extent allows you to avoid the conformity of experts Delphi method, based on an anonymous correspondence survey of independent experts (often not even aware of each other’s existence) conducted in several rounds, followed by statistical processing of the results and the development of a final decision by a group of analysts who organized the survey.

Widely known collective notebook and idea bank methods, allowing you to gradually accumulate ideas and proposals put forward by independent experts, successful standard solutions, practical examples with the possibility of their systematization and evaluation.

Methods for activating creative thinking are aimed at creating psychological conditions that allow a person to generate new ideas and look for ways to solve various problems. Among similar methods of organizing the creative process when solving problems of economic analysis, the most widely used method is “brainstorming”.

"Brainstorm" is an effective method of group organization of analytical activity to solve any problems, based on the emancipation of the creative activity of its participants. It usually involves three stages. The first stage is a clear formulation of the problem that needs to be solved and the selection of creative team members. The composition of participants should not be large, but it should include not only specialists on this issue, but also other interested parties who are not related to subordination. The second stage is generating ideas to solve the problem. A feature of this stage is the creation of conditions for maximum free creativity in the complete absence of evaluations and any criticism of the proposals made. At the same time, even directions for searching for ideas and criteria for their evaluation are not specified. The main goal is the maximum number of proposals put forward and their possible combinations, all of them must be recorded. Even fantastic and seemingly absurd ideas are welcome. The duration of this stage should not exceed an hour and a half, since after this creative activity, as a rule, begins to subside. The third stage is the classification of the proposals made, the selection, evaluation and development of various combinations of the most promising ideas, carried out by the analysts who organized the “assault”.

A modification of the brainstorming method is synectics method. The term “synectics” itself means the use of combining various, often heterogeneous, seemingly incompatible elements into a single whole to solve creative problems. Synectics differs from classical “brainstorming” by organizing the group’s influence on the creative activity of its members, defining specific methods for generating ideas, allowing critical discussion and screening out put forward ideas directly at the stage of their generation. At the same time, the group should include not just professionals, but creative individuals who strive to compete and are ready to defend their positions, having various psycho-emotional characteristics (enthusiasts, conservatives, optimists, skeptics, etc.). Characteristic of synectics is the use of various verbal techniques for activating thinking: analogies (finding solutions based on the analysis of already solved similar problems in other areas, searching for solutions in science fiction, myths, fairy tales), inversion (searching for solutions “from the reverse”), empathy (identifying oneself with the analyzed object and understanding the problem based on one’s own feelings), idealization (research from the standpoint of obtaining an ideal result). It should be noted that for a synectic group of experts, preliminary preparation, mutual understanding and cohesion are very important, otherwise the growing criticality of the discussions may simply block the generation of new ideas.

Morphological method. This method is based on an assessment of the internal structure of the object under study and the corresponding decomposition of the problem under consideration into individual problems, the selection of possible solutions for each of these problems, their systematization and the synthesis of a general solution to the problem by combining particular solutions.

Theory of solving inventive problems(TRIZ). Initially, the purpose of TRIZ was to study the principles of development of technical systems and create practical methods for solving inventive problems based on identifying and eliminating contradictions in such systems to achieve an ideal final result. Now TRIZ has become a universal methodology for analyzing various problems in many areas, including economics. Activation of creative thinking is achieved by structuring analysis tasks and a certain sequence of their solution:

  • 1) what the system is intended for, what elements it consists of, what their functions are and how they interact;
  • 2) which connections of system elements and their functions are useful, which are useless, and which are harmful;
  • 3) which elements, functions and connections can be changed and which cannot be changed;
  • 4) what are the possible options for changing the elements of the system, their functions and connections;
  • 5) what changes provide improvement in the functioning of the system as a whole, and what changes cause contradictions in the system and weaken it;
  • 6) how to implement improving changes while simultaneously eliminating or minimizing emerging contradictions.

To stimulate creative activity and organize systematic independent work, expert analysts often resort to following unique rules. Rule 24 prescribes that the analyst must think about the problem being studied 24 hours a day. Rule 25 - To successfully solve the problem, it is necessary to put forward at least 25 ideas. Rule 26 - There are 26 letters in the English alphabet, and as a hint to yourself, you need to think about which letter the key word for solving the problem will begin with.

Heuristic methods of analysis

In your life, you have probably met a person who, first of all, struck you with the fact that he has an extremely developed imagination, original and unexpected judgments, ideas that are characteristic of highly developed intuitive thinking. We usually call such a person a creative person. And the ability to generate new ideas has every reason to be considered one of the most important signs of a creative personality.

Both at school and in higher and secondary specialized educational institutions, unfortunately, insufficient attention is paid to the development of intuition and the ability to generate new ideas. Teachers mainly pay attention to logical methods of solving problems, including in the process of solving creative problems.

Calculation methods operate only with quantitative information, the use of which in the analysis of control systems is very limited. For the analysis of economic activity, the use of heuristic methods aimed at obtaining qualitative characteristics of a business entity is of great importance. Heuristic methods are based mainly on the experience and intuition of specialists, their individual or collective judgments. Among the heuristic methods, one can distinguish evaluative and evaluative-search methods of analysis.

Heuristic methods are widely expounded in works on personnel management, management organization and organizational behavior.

The conditions that predetermine the need to use heuristic methods can be characterized as follows:

The qualitative nature of the initial information, described using economic and social parameters, the lack of sufficiently representative and reliable information on the characteristics of the research object;

Great uncertainty in the initial data for analysis;

Lack of a clear substantive description and mathematical formalization of the subject of assessment;

Lack of time and funds for research using formal models;

Lack of technical means with appropriate characteristics for analytical modeling;

The extreme nature of the situation being analyzed.

Heuristic methods of analysis represent a special group of techniques for collecting and processing information, based on the professional judgment of a group of specialists.

Classification of heuristic analysis methods

Heuristic evaluation methods

EVALUATION AND SEARCH METHODS

Commissions and conferences

Brainstorm

Collective notebook

Bank of ideas

Method of active sociological tested analysis and control

Business games

Functional and cost analysis.

Heuristic methods are often called creative methods, as they rely on the creative thinking of a group of people. The key to the reliability and validity of analysis conclusions using heuristic methods is the correct selection of experts. Depending on the goals and focus, the group of experts may be homogeneous or include representatives of different groups of related specialists, and sometimes simply interested persons. For example, when forming a group of experts to analyze technological developments, it includes technologists who can professionally evaluate the technical novelty of a solution, economists who evaluate its effectiveness, mechanics who can assess the possibility of implementing a new technology on the existing production base, and workers who implement the new technology. When assessing the quality of products and demand for them, the group of experts includes not only commodity experts, but also manufacturers and consumers of products. At the same time, when developing a technical solution at the first stage, only specialists of the relevant profile are included in the group of experts.

In practice, quite complex methods for forming a group of experts have developed:

According to formal criteria, when specialization, work experience, length of stay in one team are taken into account; this also includes psychological assessments of the individual according to the sociological service of the organization (if any), for example, the ability for creative thinking, constructive thinking, etc.;

Based on the self-assessment of the individual obtained during the survey, in this case the future expert himself evaluates his capabilities, including qualifications, analytical and constructive thinking, ability to adapt to certain situations, etc.; such selection of experts is supplemented by determining the level of self-esteem of the future expert - underestimated, overestimated or adequate, which is carried out with special

psychological selection of experts;

Based on the assessment of persons associated with the applicant, when the professional and personal qualities of a specialist are assessed by specialists of a similar profile, consumers of services, and employees implementing the expert’s decisions;

Using a random selection method (sampling), if many persons (for example, consumers of products and services) can act as experts.

Quite often, when analyzing the activities of an economic entity, the group of experts includes managers at different levels and employees. For example, this is how a group of experts is formed when choosing a production development strategy, changing the incentive system, reforming accounting and reporting systems, and restructuring organizational structures.

Thus, when selecting experts, both formal and psychological selection methods are widely used. In this regard, heuristic methods are often called psychological.

(Melyukhova Yana) 1) Typology method is based on the now popular positioning theory. The main idea of ​​this theory is the existence of a ready-made, uniform picture of standard situations and solutions for everyone. The analyst's task is to select a position that corresponds to the object of analysis according to certain parameters and obtain a standard solution proposed by the developers of the method. Practical applications of this theory are the matrices of ZKG, MacKenzie, etc. The technology for implementing the method includes the following stages:

Evaluation of the analyzed object according to certain specified parameters;

Positioning of the object in the typological scheme in accordance with the parameter values;

schema by the type of the object being analyzed.

When constructing a typological scheme, you can use two or more parameters. Parameters can reflect both simple and complex properties. An example of a complex property is the prospects of a market, characterized by size, growth rate, level of satisfaction of user needs, competition, price level, profitability and

etc. As can be seen from the above example, parameters can have both quantitative and qualitative assessments. Positioning of the analyzed object (objects) on the typological grid is possible in the form of one or another mark (points, circles, etc.).

If there are developments in specific areas, the use of typological grids allows you to determine the type of object being analyzed and use ready-made recommendations for its improvement. However, one must be extremely careful with the typology method. It must be borne in mind that universal “recipes” are quite tempting because they contrast with the solution of creative problems, but the benefits of applying the recommendations received are very limited. It is better to know how to identify and solve problems than to believe in ready-made recipes for success. According to the author, only in combination with other assessment techniques does the typology method make it possible to characterize the situation and find acceptable options for predictive management decisions.

(Olya Kiseleva) 2) Expert assessment method relies on identifying a generalized assessment by an expert group through statistical processing of individual, independent assessments made by experts. In this case, group members may be of equal value or have different ranks, which are taken into account when drawing the results of the examination.

When recruiting experts, you should be guided by the following requirements:

High level of general erudition, possession of special knowledge in the analyzed area;

Availability of certain practical and (or) research experience on the problem under consideration;

The ability to adequately assess development trends of the object under study;

Lack of bias and interest in a specific assessment result.

Favorable conditions for the work of experts are created as a result of preliminary instruction, training in research methods, and provision of additional information about the object of analysis.

(Olya Prilepa) 3) Expert commission method is based on identifying a single collective opinion by specially selected experts when discussing the problem posed and alternatives for its solution as a result of certain compromises.

When using the expert commission method, not only statistical processing of the results of the individual scoring of all experts is carried out, but also an exchange of opinions on the results of the examination and clarification of the assessments. The disadvantage of this procedure is the strong influence of authorities on the opinion of the majority of participants in the examination.

In contact with

Heuristic analysis

Almost all modern antivirus tools use the technology of heuristic analysis of program code. Heuristic analysis is often used in conjunction with signature scanning to search for complex encrypted and polymorphic viruses. The heuristic analysis technique makes it possible to detect previously unknown infections, however, treatment in such cases is almost always impossible. In this case, as a rule, additional updating of anti-virus databases is required to obtain the latest signatures and treatment algorithms, which may contain information about a previously unknown virus. Otherwise, the file is sent to antivirus analysts or antivirus program authors for examination.

Heuristic analysis technology

Heuristic scanning methods do not provide any guaranteed protection against new computer viruses that are not in the signature set, which is due to the use of previously known virus signatures as an object of analysis, and knowledge about the mechanism of signature polymorphism as the rules of heuristic verification. At the same time, this search method is based on empirical assumptions; false positives cannot be completely excluded.

In some cases, heuristic methods are extremely successful, for example, in the case of very short program parts in the boot sector: if the program writes to sector 1, track 0, side 0, then this leads to a change in the drive partition. But apart from the FDISK helper program, this command is not used anywhere else, and therefore, if it appears unexpectedly, we are talking about a boot virus.

In the process of heuristic analysis, the emulated program is checked by a code analyzer. For example, a program is infected with a polymorphic virus consisting of an encrypted body and a decryptor. The code emulator emulates the operation of this virus one instruction at a time, after which the code analyzer calculates the checksum and compares it with the one stored in the database. Emulation will continue until the part of the virus necessary to calculate the checksum is decrypted. If the signature matches, the program is identified.

Another common heuristic analysis method used by a large group of antiviruses is decompiling a suspicious program and analyzing its source code. The source code of the suspicious file is verified and compared with the source code of known viruses and samples of viral activity. If a certain percentage of the source code is identical to the code of a known virus or viral activity, the file is marked as suspicious and the user is notified.

Disadvantages of heuristic scanning

  • Excessive suspicion of the heuristic analyzer can cause false positives if the program contains fragments of code that perform actions and/or sequences, including those characteristic of some viruses. In particular, the unpacker in files packed with the PE packer (Win)Upack causes false positives for a number of anti-virus tools that de facto do not recognize this problem. Another problem with analyzers is false positives when checking completely harmless code.

For example, code compiled using Delphi 7 or Delphi 2007:

Program XDC; ($APPTYPE CONSOLE) uses SysUtils; begin if (paramstr (3) ="d" ) then begin FileSetReadOnly (paramstr (2 ) ,false ) ; DeleteFile(paramstr(2)); end ; end.

Causes false positives in antiviruses such as Panda (regardless of the compiler version), Webwasher GateWay (when compiling Delphi 2007), F-Secure (when compiling Delphi 7). As can be seen from the example, the program is absolutely safe and there are absolutely no signs of malicious code or virus functionality (all the functionality of the example: if the “d” key is specified as the third parameter, the program deletes the file specified in the second parameter).

  • Availability of simple techniques for deceiving the heuristic analyzer. As a rule, before distributing a malicious program (virus), its developers examine existing common anti-virus products, using various methods to avoid its detection during heuristic scanning. For example, by modifying the code, using elements whose execution is not supported by the antivirus code emulator, using encryption of part of the code, etc.

Despite statements and advertising brochures from antivirus developers regarding the improvement of heuristic mechanisms, the effectiveness of heuristic scanning is currently far from expected. Independent tests of heuristic analysis components show that the detection rate of new malware is no more than 40-50% of their number. (English)

  • Even with successful detection, treatment of an unknown virus is almost always impossible. As an exception, some products can treat viruses of the same type and a number of polymorphic, encrypted viruses that do not have a permanent viral body, but use a single implementation technique. In this case, to treat tens or hundreds of viruses, there may be one entry in the virus database, as is implemented, for example, in I. Danilov’s antivirus.

see also

Links

External links

Wikimedia Foundation. 2010.

See what “Heuristic analysis” is in other dictionaries:

    - (heuristics) an algorithm for solving a problem that does not have a strict justification, but nevertheless provides an acceptable solution to the problem in most practically significant cases. Contents 1 Definition 2 Application ... Wikipedia

    This term has other meanings, see Polymorphism. Computer virus polymorphism (Greek: πολυ many + Greek: μορφή form, appearance) is a special technique used by the authors of malicious software... ... Wikipedia

    The style of this article is non-encyclopedic or violates the norms of the Russian language. The article should be corrected according to the stylistic rules of Wikipedia... Wikipedia

    Proactive technologies are a set of technologies and methods used in antivirus software, the main purpose of which, in contrast to reactive (signature) technologies, is to prevent infection of the user’s system, and ... ... Wikipedia

    This article or section is a rough translation of an article in another language (see Checking translations). It could have been generated by a translator program or made by a person with little knowledge of the original language. You can help... Wikipedia

    Developer OS Windows XP/Vista License Website ... Wikipedia

    Screenshot of the program Type... Wikipedia

    OllyDbg ... Wikipedia

    This article should be Wikified. Please format it according to the article formatting rules. Some models of human behavior in the social sciences suggest that human behavior can be adequately described... Wikipedia

Changes in the conditions and objectives of the development of business entities, determined by modern economic situations and the challenges of the time, have a fundamental impact on the methods of justifying management decisions, the organization of management processes and methods for assessing the effectiveness of decisions.

Considering that “the method of economic analysis is understood as a dialectical way of approaching the study of economic processes in their formation and development,” changes in product life cycles, technological structures, types of business and the depth of the ongoing transformations require significant reform of the methods of economic analysis.

Considering the need to clearly define their competitive advantages and consolidate them for a long period, organizations pay special attention to development strategies, putting forward strategic guidelines (for example: developing leadership positions in the market, ensuring customer loyalty, increasing the social significance of the organization) that have clear qualitative characteristics. Their quantitative parameters are often very arbitrary and cannot be directly assessed.

Analysis and justification of trends in changes in these groups of indicators require a significant change even in such traditional methods of analysis as comparison, detailing, grouping, etc., but more often involve the use of other methods of analysis, often purely logical.

The development of methods of economic analysis was particularly influenced by the possibility of multiple solutions, each of which is irrational and sometimes impossible to calculate in detail. This determined the accelerated use of new accounting methods. So, for example, for long-term, strategic analysis, it is much more effective to use the marginal method of calculating costs, which, despite all its conventions, allows you to create an optimal range of products. Accounting and analysis of the full cost of individual types of products is carried out only for assortment items included in the production plan.

Since in the conditions of innovative development all stages of the reproduction cycle are significantly intensified, there is often a need to ensure the parallel implementation of its individual stages. Many authors focus on assessing the behavior of individual indicators at different stages of the reproduction cycle, highlighting leading indicators. This is typical, first of all, for management-oriented work in the formation of development indicator panels. However, this approach to classifying indicators is becoming more common.

To objectify the assessment of the organization’s development opportunities and determine its production, economic and financial potential, it is important to correspond the changes in indicators to the stages of the reproduction cycle: growth - during the recovery period; decrease or increase - during a recession; stability - during periods of stagnation, etc. In this regard, procyclical, countercyclical and acyclic indicators are distinguished, the dynamics of which are practically unrelated to the reproduction cycle.

The complication of classifications of the system of indicators involves the logical development and clarification of traditional methods of analysis.

Thus, when using the comparison method, comparison of basic financial and economic characteristics over a long period becomes increasingly important, as this makes it possible to identify cyclical fluctuations characteristic of different types of business processes. In horizontal analysis, a qualitative comparison of sources of raised financial resources and changes in individual groups of assets of the organization is used, i.e. a combination of horizontal and vertical analysis.

With the further development of economic analysis, it is important to classify indicators according to their role in making and justifying decisions of different classes and levels. In this regard, for each decision, a target indicator, factors determining its level, and, which is especially important for the objectivity of decisions made, the restrictions within which decisions are made are identified.

Deterministic methods of analysis, including factorial, still prevail, but at the same time they are actively supplemented by methods of lengthening and expanding characteristics, which is associated with the detailing of factor indicators taking into account their significance.

In factor analysis, it is necessary to identify connections between changes in factor indicators and the need for better use of existing resources or the introduction of new resources, and this requires additional funding. For this purpose, this group of indicators is divided into factors of extensive and intensive growth, which is especially important for assessing the financial strength of an organization and assessing its economic potential.

Thus, in modern conditions, the professional judgment of the analyst is increasingly important when setting problems and choosing methods of economic analysis.

Gradually, methods of logical heuristic analysis are increasingly being used, based on the professional judgment, experience and intuition of specialists, their individual or collective conclusions. Among them, we can distinguish evaluative and evaluation-search methods of analysis (Fig. 2.2)

Rice. 2.2.

Heuristic methods are widely used in personnel management, management organization and selection of organizational behavior.

Conditions that predetermine the need to use heuristic methods:

  • o the qualitative nature of the initial information, described using economic and social parameters, the lack of sufficiently representative and reliable information on the characteristics of the research object;
  • o high uncertainty of the initial data for analysis;
  • o lack of a clear substantive description and mathematical formalization of the subject of assessment;
  • o inappropriateness and lack of time and funds for research using formal models at the first stages of justifying management decisions;
  • o lack of technical means with appropriate characteristics for analytical modeling;
  • o extremity of the analyzed situation.

Heuristic methods of analysis represent a special group of techniques for collecting and processing information, based on the professional judgment of a group of specialists. They are often called creative.

The basis for the use of heuristic methods are expert assessments of the processes, operations, and results under consideration.

Expert analysis methods are methods for organizing work with expert specialists and processing their opinions. Solving many analytical problems requires having an independent opinion(s), i.e. attracting experts. Information received from experts cannot be considered ready for use; it must be processed and only then used to make management decisions.

When organizing the work of experts it is necessary:

  • - select qualified experts;
  • - interview experts and obtain information of interest to the analyst;
  • - determine methods for processing and interpreting information received from experts.

When selecting experts, one should take into account their competence and professional skills in the field of activity that is being studied, the ability for creative thinking, and the ability to work in a group (if several experts are involved).

When recruiting experts, it is advisable to be guided by the following requirements:

  • o high level of general erudition;
  • o possession of special knowledge in the analyzed area;
  • o the presence of certain practical and (or) research experience on the problem under consideration;
  • o the ability to adequately assess development trends of the object under study;
  • o lack of bias, interest in a specific assessment result.

In this case, group members may be of equal value or have different ranks, which are taken into account when drawing the results of the examination.

The expert commission method is based on the development of a single collective opinion by specially selected experts when discussing the problem posed and alternatives for its solution as a result of certain compromises.

When using the expert commission method, not only statistical processing of the results of the individual scoring of all experts is carried out, but also an exchange of opinions on the results of the examination and clarification of the assessments. The disadvantage is the strong influence of authorities on the opinion of the majority of examination participants.

Conclusions obtained from analysis based on heuristic methods have a logical basis and can take the form of: direct assessment (useful, harmful, acceptable, unacceptable); defining assumptions, i.e. selection of priority or most successful solutions (this can be identified through ranking of assumptions, their scoring, etc.); selection of specific events for competitive development. Quite often, the group of experts includes professional consultants - professionals in the field being analyzed.

Depending on the goals and focus, the group of experts may be homogeneous or include representatives of different groups of specialists, and sometimes simply interested persons. For example, when developing a technical solution at the first stage, only specialists of the relevant profile are included in the group of experts. When forming a group of experts to analyze technological developments, it includes: technologists who can professionally assess the technical novelty of the solution; economists assessing the effectiveness of a decision; mechanics who can evaluate the possibility of implementing new technology on the existing production base; workers are the implementers of new technology.

When assessing the quality of products and demand for them, the group of experts includes not only commodity experts, but also manufacturers and consumers of products.

In practice, quite complex ways of forming a group of experts have developed:

  • o according to formal criteria - taking into account the specialty, work experience, length of stay in the same team, as well as psychological assessments of the individual according to the sociological service of the organization (if any), for example, the ability to think creatively, constructive thinking, etc.;
  • o based on a person’s self-assessment obtained during a survey - the future expert himself assesses his capabilities, including qualifications, analytical and constructive thinking, ability to adapt to certain situations, etc. It is supplemented by a special psychological selection of experts to determine the level of their self-esteem - underestimated, overestimated or adequate;
  • o based on the assessment of persons associated with the applicant - the professional and personal qualities of the specialist are assessed by specialists of a similar profile, consumers of services, employees implementing the expert’s decisions;
  • o by random selection (sampling), if many persons (for example, consumers of products and services) can act as experts.

Quite often, when analyzing the activities of an economic entity, the group of experts includes managers of different levels and employees. For example, this is how a group of experts is formed when choosing a production development strategy, changing the incentive system, reforming accounting and reporting, and restructuring organizational structures.

Thus, when selecting experts, both formal and psychological methods are widely used, and heuristic methods are often called psychological.

When interviewing experts, individual and group methods can be used. During an individual survey, work with each expert is carried out separately, which allows the expert to express his opinion independently of others. During a group survey, experts work in groups, coordinate their opinions and develop a common expert conclusion based on a common position. Group methods are preferable from the point of view of increasing the reliability of the examination, but are more complex.

The information obtained during the expert survey must be processed by special or traditional methods of analysis, after which it can be used to make management decisions.

There are many ways to obtain expert assessments: Delphi methods, control questions, risk assessments, scenarios, business games, SWOT analysis, functional cost analysis (FCA), etc.

The Delphi method is a correspondence and anonymous survey of an expert group (5-10 people) in several rounds with the coordination of expert opinions. Each expert is given a specific task, for example, to determine the direction of development of the enterprise. Experts fill out questionnaires on the problem under study. Participants in the examination are informed of the results of each intermediate round of the survey in the form of averaged statistical values. When receiving answers from experts, different situations may arise:

  • a) all experts came to the same opinion;
  • b) expert opinion is divided.

In the first case, the expert opinion is accepted as the result of solving the problem, in the second, the examination process will continue.

The method of control questions is the search for an analytical solution using a specially prepared list (list) of leading questions. The advantage of this method is its simplicity and versatility. Test questions are compiled based on the experience of already solved problems, which ensures the effectiveness of the method.

The use of the security question method is implemented in several stages:

  • 1) a task is formulated, in solving which control questions will be used;
  • 2) a list of check questions is compiled that are most appropriate to the nature of the problem being solved, and each of them is considered in order to use the information contained in it to solve the problem;
  • 3) all ideas that can be used to solve the problem are considered;
  • 4) ideas are selected that can be used to solve the problem, and a program of activities is developed.

Typically, analysts use a table containing in each row a question (parameter) and answer options (parameter values) for a specific aspect of the analysis. When answering the questions posed, the analyst makes a note in the column corresponding to his conclusion. The table, as a rule, is constructed in such a way that the notes in the columns on the left show the weaknesses of the object of study, and on the right - the strengths or special capabilities. Regular use of such tables allows you to determine trends in changes in the subject of analysis over time and compare its position in relation to other objects of analysis.

Questionnaires significantly reduce the time required to conduct analysis and reduce the dependence of its results on the analyst’s skill level. When using this method, more correct results are obtained than with scoring, which is explained by the following circumstances. Instead of assigning points, the expert selects the statement that most clearly characterizes the object of assessment. The answers can be presented with quantitative data, for example, reflecting the employee’s age, or characterize the trend of change in some parameter (growth, decline), give an assessment (“excellent”, “satisfactory”, etc.).

Selection by comparison, as a rule, is more accurate than direct measurement, when in a specific situation each expert has his own concept of the optimal state of the estimated parameters.

Experience has shown that valid questionnaires cannot be created in the first place. Analysts need to be prepared for the fact that only after repeated surveys and careful analysis of assessment results and analytical documents will it be possible to create methods containing not only universal initial lists of dictionaries, but also highly specialized questionnaires for certain categories of workers with similar tasks that reflect the essence of relationships and activities of people.

The scenario method is a set of techniques and procedures for preparing and implementing any business decisions. The method is used primarily for expert forecasting. It is useful in choosing the goals of the organization and making forecasts when the organization is not satisfied with the current situation and there is a need to expand the business.

The scenario is developed by a group of organization specialists and contains a description of the sequence of steps leading to the predicted state of the organization, as well as factors and events that have a decisive influence on this process. The starting point for developing a scenario is an accurate assessment of the organization’s current situation, carried out on the basis of a retrospective analysis of activities. Such an assessment leads to an understanding of the dynamics of the influence of factors on production processes and which factors ensure the rise of activity and which ensure its decline. For uncontrollable development factors, special assessments must be made.

Stages of script development:

  • 1) determination of a system of indicators on the basis of which the development scenario of the organization will be formed;
  • 2) identifying the factors that determine the development of the organization;
  • 3) identification of development trends;
  • 4) development of alternative development scenarios and selection of the main development option.

Business games. The most common form of business game is the modeling of the analyzed processes and the future development of the predicted phenomenon in different versions and consideration of the data obtained. Business games are used both in the educational process and in production. Games that are held in groups of organizations are called organizational-activity games (organizational games). In a certain form, they include the ideology of Delphi methods and scenarios.

All participants in the game are divided into groups, each group is asked to write a scenario for the development of events in the organization. The group is led by an expert whose task is to ensure that group members do not deviate from the established task. The next day, a conference is held at which a representative of each group makes a presentation reflecting the group’s vision of developments in the organization. Members of other groups actively participate in the discussion of the report and try to convince others that their perspective is more concrete and convincing. At the end of the day, the game director and experts sum up the results of the conference and draw the team’s attention to the lack of consensus on the issues discussed. The groups disperse and prepare a new scenario. The next day, a conference is held again, at which new reports are heard. Experts must lead participants to achieve their goals together. When this manifests itself at conferences, e.g. Most of the reports express a unity of opinions; the game participants stop working in groups and, as a single team, develop a common scenario. As a result of the game, team unity occurs, which can serve as the basis for successful activities.

To ensure the accuracy of risk assessment, the maximum spread of their assessment is allowed, i.e. provides a more stringent approach to the consistency of expert opinion.

One of the most common heuristic methods is the analogy method, when a group of experts considers a possible method of resolving a problem or searches for the cause of the current situation, relying on the past experience of their own or similar business entities. In this case, experts think through their experience and the situations they have encountered, and, based on it, propose ways to solve the problem, finding out the reasons for the current situation and ways to eliminate them.

Naturally, in this case, the use of materials describing similar situations in different periods and at different objects is of great help. They can be obtained from periodicals, scientific literature, as well as from the minutes of meetings of the founders, board of directors, meetings of departments and specialized groups working in the organization. From this point of view, a bank of situations analyzed and summarized by specialized consulting firms is of significant interest. Such data banks have been created in many consulting firms around the world. It should be noted that the first steps in creating similar materials were taken in the 1980s. at consulting firms in the USSR. Currently, this work continues in the Association of Scientific Consultants of Russia and consulting firms.

In the case when experts receive materials from situations developing in other objects, their task is to select those that are similar in principle to the one being solved, i.e. The similarity of the object, situation, and goals pursued by the analysis is assessed. After such selection, the possibility of using experience in resolving the problem and the readiness of the facility to implement specific measures are determined: the state of the production and technical base, personnel qualifications, the availability of financial resources and the possibility of attracting them, the period for resolving the problem, etc.

The method of analogies allows only to determine the main directions of economic analysis and at the next stages requires a more in-depth analysis using quantitative methods. However, the preliminary use of such a method prevents an unjustifiably detailed analysis in a direction that does not reveal the main reasons for the current situation. The analogy method is often called synectic.

A group of methods that use assessment criteria include target assessment, web, typology and repertory grids.

Target assessment - assessment of objects of analysis according to certain criteria (components of the target system). When using it:

  • o criteria (components of the target system) for evaluating alternatives are selected;
  • o all decision options for each criterion are assigned a preference rank (ordinal number of acceptability);
  • o for each alternative, the total rank is calculated for all criteria;
  • o the options are ranked by total rank.

A method for multicriteria comparison of alternatives is the graphical quantitative-qualitative “spider web” method. It can be used in all cases where it is advisable to evaluate objects of analysis using a variety of quantitative and qualitative criteria. The main advantage of the method is the visualization of the analysis results, which is especially valuable when presenting research materials not to narrow specialists, but to managers.

Heuristic methods of analysis, which involve both the generation of options for analytical solutions and their evaluation, include: brainstorming (brainstorming), commissions and conferences, a bank of ideas, a collective notebook, active sociological tested analysis and control, functional-cost analysis, business games and etc.

The brainstorming method can be very effective for analyzing particularly complex situations. Brainstorming is the free generation of ideas expressed in a group of interested experts. As a rule, effective brainstorming is quite short (no more than an hour). Not only highly qualified specialists can take part in it, but also young people who can make unexpected, extraordinary proposals. However, in order for the brainstorming results to be actually used, it is important that the decision makers participate in it. In this case, having systematized the proposals of the participants, some of them can be immediately discarded as ideal, and the rest can be discussed in more detail with specialists of the relevant profile.

The selection of ideas is carried out gradually. At the first stage, none of them is discarded and, as a rule, no assessments are made at all. Then the ideas are assessed based on the level of elaboration, timing and cost of implementation, efficiency, etc. At the second stage of the analysis, one or more of the previously discussed methods for assessing and selecting solutions can be used. Brainstorming can be an integral part of analytical work, especially in forward-looking analysis.

Brainstorming is a way to find new solutions to a problem situation. It is based on the separation in time of the process of searching for ideas and their evaluation. It is a relatively quick and economical method of analysis designed to resolve difficulties and contradictions that management personnel have encountered or are likely to encounter in the near future, as well as to eliminate bottlenecks that are holding back the development of the management system. The method is effective in solving non-traditional strategic search problems. Brainstorming should be organized when the problem does not lend itself to a traditional solution. First of all, we are talking about structural policy, improving existing ways of working.

The method of commissions and conferences is the most common form of group work, during which ideas are freely put forward and criticized. It is based mainly on the habit of critical assessment of new and insufficiently substantiated ideas, acquired in the process of numerous meetings and discussions. The disadvantage of the method is that analysts in their judgments are initially focused on compromise, which increases the risk of obtaining distorted analysis results.

The collective notebook method ensures that team members put forward independent ideas and then evaluate the proposals. For this purpose, each team member receives a notebook that outlines the essence of the issue being analyzed and provides the necessary auxiliary and reference materials (for example, document flow diagrams, job descriptions, etc.).

For a predetermined time, they write down their analysis and suggestions in their notebooks, and finally evaluate their ideas, highlighting the best ones. The notebooks are handed over to the coordinator to prepare a summary note. Evaluation of group analytical alternatives is carried out by any of the previously discussed evaluation methods.

The collective notebook method is convenient in cases where it is impossible to organize long-term joint work or attract experienced consultants. To use the method, it is necessary to have creatively thinking, experienced specialists in the organization’s team.

This method of work, like a bank of ideas, involves accessing a card index or an automated database created in the process of practical activity. In these repositories, the most interesting examples of problem solving are collected and systematized. This includes both original and typical options with an assessment of their applicability. The method can be useful in solving search problems of current (more often) and strategic (less often) analysis.

The method of active sociological tested analysis and control (MASTAC) consists in the development and application of a manual containing specific recommendations for improving the activities of users of this material. The game-based team method of developing a manual involves several steps:

  • 1) the organizer announces a topic for developing recommendations based on the results of the analysis, for example: “Organizational structure of the enterprise”;
  • 2) each member of the expert group, within a predetermined time, formulates recommendations on the specified topic, trying to work them out stylistically accurately and clearly;
  • 3) each expert in turn names the number of his recommendation (first, second, etc.) and reads it out loud. The rest of the team gives a score to this recommendation. The point system can be arbitrary - from 7 to 10, but pre-established by the organizer. If the rating members of the group consider the recommendation to be extremely useful, they give it one of the highest points; if it is absurd, then they indicate zero points. Then the next developer reads his recommendation. And so on until all the differing advice is announced and evaluated. The organizer makes sure that everyone calls out their numbers and that the order is observed;
  • 4) the coordinator collects all the proposals of the group members, calculates the total score of each recommendation, distributes the proposals into rubrics, placing them within the rubrics in a sequence corresponding to the decreasing of the points received. Recommendations that receive a low number of points compared to other proposals are excluded from consideration.

SWOT analysis occupies a special place in heuristic methods. The name of the analysis consists of the first letters of the expressions: strength - strength, weakness - weakness, opportunity - opportunity, threats - risks and limitations.

This method, which is a special type of expert methods, has shown high efficiency in developing solutions in systems that are characterized by dynamism, controllability, dependence on internal and external factors, cyclicality, etc.

SWOT analysis is the determination of the strengths and weaknesses of an organization, as well as the opportunities and threats emanating from its market environment (external factors). These components mean:

  • o strengths - advantages of the organization;
  • o weaknesses - shortcomings of the organization;
  • o opportunities - external environmental factors, the use of which will create advantages for the organization in the market;
  • o threats - factors that could potentially worsen the organization's position in the market.

Carrying out a SWOT analysis comes down to filling out a matrix, the corresponding cells of which reflect the strengths and weaknesses of the organization, as well as market opportunities and threats (Fig. 2.3).

Stages of conducting a SWOT analysis:

  • 1) a group of enterprise specialists is selected who will act as experts when conducting a SWOT analysis, and a group leader is appointed;
  • 2) at a group meeting, a system of indicators is determined by which each component of the analysis will be assessed;
  • 3) questionnaires are prepared to evaluate selected indicators for each component of the analysis;
  • 4) a survey of experts is conducted and an assessment of each indicator is provided;
  • 5) ratings are ranked for each component of the analysis;
  • 6) based on the ranking, a development strategy for the organization is developed.

Rice. 2.3.

Filling out the matrix is ​​a complex process that requires highly qualified experts. This is because the same organizational performance indicator can be both a threat and an opportunity. But when the matrix is ​​completed and a consensus of expert opinion is expressed, the organization has sufficiently complete information about the situation in which it finds itself to determine its prospects.

To make the matrix more objective, when filling it out, it is necessary to characterize all aspects of the organization’s activities, including production, financial, marketing, organizational, and investment. With this approach, SWOT analysis will allow you to choose the optimal path for the development of the organization, avoid dangers and make the most efficient use of available resources.

As noted, in recent years, significant attention has been paid to the use of functional cost analysis (FCA) as a method for systematically studying the functions of an object (product, process, structure), aimed at minimizing costs at all stages of the life cycle while maintaining (increasing) the quality and usefulness of the object for consumers.

FSA produces the greatest results at the product development stage. But this type of analysis can also be used when the product has already been introduced to the market. This is due to the need to support the competitiveness of products, and at this stage, the use of FSA helps to improve its cost characteristics.

FSA is aimed at detecting, preventing, reducing or eliminating unnecessary costs. This is achieved through a comprehensive study of the functions performed by the facility and the costs required to carry them out. In this case, it is customary to highlight:

  • o main functions - ensure the operability of the object;
  • o auxiliary functions - contribute to the implementation of the main functions or complement them;
  • o unnecessary functions - do not contribute to the performance of basic functions, but, on the contrary, worsen the technical parameters or economic performance of the object.

Identification of functions requires high professional training of experts, knowledge of the essence of the object being studied and analysis techniques.

The work of experts is usually based on a checklist of questions.

When conducting FSA, it is customary to distinguish several stages: preparatory, informational, analytical, creative, research, recommendation and implementation.

At the first two stages, general preparation for conducting FSA is carried out: the object of analysis is clarified; a group of competent specialists is selected to solve the task; data about the object under study is collected and summarized.

At the next three stages, the object under study is detailed into functions, their classification and determination of the cost of each of them; the tasks of combining functions, eliminating unnecessary functions, reducing the cost of object elements and selecting the most realistic options in terms of their implementation are solved.

At the final two stages, all the necessary documentation for the selected option of the improved facility is prepared, its economic effect is determined and a report on the results of the FSA is drawn up.

The main thing when carrying out FSA is the analytical stage, at which the functions of the object (product) are studied in detail and the possibilities of reducing the costs of their implementation are analyzed by eliminating or rearranging (if possible) secondary and unnecessary functions.

Reducing costs as a result of conducting FSA can have a significant impact on profits at all stages of the organization's development. If we assume that as a result of the FSA, the costs of the product at the stage of its development were reduced, then it will enter the market with a lower cost.

Thus, the use of heuristic methods of analysis makes it possible to effectively conduct both current and strategic analysis in conditions of an unstable operating environment and high innovative development of organizations; give a balanced assessment of the property and financial condition of the organization and justify the prospects for its development.







2024 gtavrl.ru.