Describing computer virus and how its affects a computer

They lead to system crash, file corruption and data lost.

types of computer virus

The virus will eventually be activated by the "trigger" which states which event will execute the virus, such as a date, the presence of another program or file, the capacity of the disk exceeding some limit or the user taking a certain action e. The copy may not be identical to the propagating version; viruses often "morph" or change to evade detection by IT professionals and anti-virus software.

These patches are designed to fix flaws that could otherwise be exploited by cybercriminals.

Computer virus names

Norton Security Premium offers additional protection for even more devices, plus backup. Computer viruses never occur naturally. Step 2: Delete temporary files. Disable autorun to prevent viruses from propagating to any media connected to the system. Always verify the source and use caution when downloading or opening files, programs, and attachments. In contrast, a non-memory-resident virus or "non-resident virus" , when executed, scans the disk for targets, infects them, and then exits i. In late the encrypted, memory-resident stealth virus Win Unknown programs that start up when you turn on your computer. Stealing passwords or data, logging keystrokes, corrupting files, spamming your email contacts, and even taking over your machine are just some of the devastating and irritating things a virus can do.

When the victim's operating system is running, files on the external storage device can infect the system; rebooting the system will trigger the boot disk virus.

They accomplish this by overwriting unused areas of executable files. The "Jerusalem" virus, also known as the "Friday the 13th" virus, was discovered in and spread throughout Israel via floppy disks and email attachments.

A criminal may take control of your account or send emails in your name from another infected computer. The triggering phase can be caused by a variety of system events, including a count of the number of times that this copy of the virus has made copies of itself.

Viruses can be spread through email and text message attachments, Internet file downloads, and social media scam links. Viruses and worms may also be referred to as malware.

Effects of computer virus

Gunn under the title "Use of virus functions to provide a virtual APL interpreter under user control" in It may also prevent your device from coming back on. Other file infector viruses arrive as wholly contained programs or scripts sent as an attachment to an email note. A virus typically has a search routine, which locates new files or new disks for infection. Viruses that utilize this technique are said to be in metamorphic code. Most security software relies on virus signatures, or they employ heuristics. Overwrite viruses. When you listen to the news, you hear about many different forms of electronic infection.

For example, a virus might attach itself to a program such as a spreadsheet program. How to prevent computer viruses The following measures can help prevent a virus infection: Install current antivirus and antispyware software and keep it up to date.

Unusual activities like password changes.

Rated 7/10 based on 116 review
Download
What is a Computer Virus?