Computer Virus

Virus is one of the greatest fears among computer users. Designed by other users to remove these viruses and malware to other computers using. This process is repeated for them. After the construction of virus is distributed via downloads, e-mail software, pirates, and other P2P programs, where users can share data.

Rich Skrenta, a school student, wrote in 1982, before the virus to copy a disk or disk drive, monitor is transported to other computers. Floppy infection, are infected by other teams. IT Security malware, trojans and spyware is threatened. Users can configure the antivirus program can be stopped.

The contraction of the virus:Previously, most computer viruses to users sharing data via floppy disks are used to dealing with them.As the Internet gained popularity, the virus came under contract and email quotas and download P2P software.

Properties of virus:
The infected computer is possible only when files are copied. For residents of viruses in memory, the virus in memory as a floppy disk or a program, gives only the memory is full. Before you can use computers capable of a file is infected.

1. It can be polymorphic:
As the virus can change its code, the same version and therefore, are polymorphic.

2. Memory may or may not resident in memory:
When loaded into memory before and after the virus has infected a computer, a resident or not to continue to open each file in the virus when you run the virus code is not resident.

3. Stealth Virus:
Files on the computer gives stealth virus then spread rapidly to these attacks, allowing.

4. Take another virus virus:
Characteristics of the virus is more lethal. When the computer virus viruses infect primary viruses are taking a special section.

5. There are no outward signs of detection:
Changes to files such viruses, updates, etc, are able to hide

6. Virus even after formatting is:
Where the virus can infect some interested parties, even if the team goes away completely. Example of the CMOS battery.

Affected by how the virus files:

1. Capabilities such as virus attacks a file type of infection. COM,. SYS. Exe,. Bin, PIF. Or any other data files.
2. Increase the size of the file when the virus infected files.
3. Delete the files when you run the virus
4. Even when the virus can not remove the random data, corrupted files, which are capable of chance
5. Ability of the virus changed. Exe. With approximately.
6. Restart the virus, stable and even computer programs designed to deal with the unexpected.


A computer virus can do for you
The following are some possibilities that when your computer is infected with a virus that can experience. Mandatory, other reasons may also be that your computer is infected, if it relates to problems.

* Files are deleted.
* Increase disk access time.
* The program file or a different message.
* Increase the size of the file.
* Since the implementation of the system
* Change the volume label.
* Change the system time
* The long time to boot.
* View images.
* Several types of error messages


Virus Detection
Cleaning method proposed for viruses and a virus protection program. Moreover, a single computer can be a look at many aspects and can detect viruses, but setting the right path or a virus or malware is unclear.

Virus Myths
Here are some of the myths and misconceptions related to the virus: --

Put the file on a computer diskette, the infected would be nice. This downloads the file to disk, this virus can control the security is not guaranteed.

Label does not contain software viruses. This is always a very good antivirus software can not be covered with plastic. Although this problem rarely occurs is still likely.

Not infect a computer just to read email. Spread of virus is not true, but the world is one of the most common.

Use of the Internet, free of viruses. Unfortunately, this claim is true. Although the virus from the Internet through the main computer can still contract the virus from a disk or diskette.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

1 Response to "Computer Virus"

  1. Blogger says:
    November 30, 2016 at 11:52 AM

    I am using Kaspersky protection for a few years now, and I recommend this product to everyone.

Post a Comment