Home Uncategorized What is Computer Virus?

What is Computer Virus?

0
What is Computer Virus?
What is Computer Virus?

What is Computer Virus?

Computer Virus is created, designed by software developers to harm other computers locally or on a network of PC systems, infect other computers or steal your personal information and is a written program or set of programming codes. They have the ability to reproduce themselves naturally and infect other PCs. Viruses can cause serious damage to the computer system. Computer viruses can replicate themselves. When they come into contact, they can hide themselves and show aggressive attack.

Computer Virus behaves as specified in the code written in the program.. Its memory has the ability to replicate itself until it completely takes over your computer.. This type of attack continues until the computer freezes.. These types of attacks do nothing but harm your system. PC system critical programs, files and documents, for example .EXE .SYS .DLL .OCX .COM etc.. They damage, split, delete or rename system files such as. This attack also does not run your computer properly.. This is most dangerous if the virus is designed to steal your personal information.

Computer viruses can be classified into the following types:

  • System Virus
  • File Viruses
  • <

  • Boot Sector or Boot Registry Viruses

System Viruses

System Viruses are computer programs or software codes that infect various parts of the hard disk, system boot or operating system. They mostly try to infect boot files (Command.com, Io.sys and Msdos.sys). These are system files that handle the boot process of a running operating system. They basically try to infect the input and output functions of computer systems.. They can infect other system registries that are critical to running the computer system’s boot procedure.

Trojan Viruses

Trojan Horses are a malicious program designed, developed, planned, and created to harm the computer system. is the program. Codes customize the way it interacts with other programs or documents, turning them into Trojan virus. They control and perform the task of checking and modifying the critical files of the operating system that infect and damage the File Allocation Table of HARD DISK DRIVES, which contains the important data of the computer system [PC].

They are often used as a computer program.. The word Trojan derives from a Greek word denoting the Trojan War, in which officers disguised themselves in large wooden horses.. Trojan Horses is a malicious program developed to run destructive code to crash a computer system.

Macro Viruses

These are small programs built within information files.. They come with any files, texts, graphics, images or videos from the Internet. These types of viruses do not come through program files, but are created to harm programs.

When downloading certain documents from the web, they normally infect computers, and if the document contains malicious program, your system will find a virus.. If you use an up-to-date virus program, the virus program is the virus that it can easily find when you scan the file after downloading it from the Internet.

Worms

The worm is a virus that is customized to replicate itself when interacting with other computers on the network. is the code system. A virus that attaches to files or programs and damages or manipulates system files located on your computer systems.. They usually damage the computer on the network. When WORMS is executed, they interfere with performance, spread over the entire network, or damage data and functions where they reach.

File Viruses

These programs can damage executable files and registries such as .EXE and .COM. infects. Sometimes they change the extension of the file and make them useless. These viruses are appended to the beginning or end of executable files and records, they usually do not damage data files.. Their preferences are usually to prevent the computer from working well by damaging system files.. They change the programmed code of system files and documents. Files that damage the system by making changes to the system file that performs a certain function.. In fact, it is one of the most dangerous. It is a method that can be used to steal information by playing with the codes of the system file.

Boot Sector or Boot Record Viruses

Boot sector or Boot Record Viruses are also called “PARTITION VIRUS”. Computer hard starts from boot area of ​​0.1 computer hard disk drive [HDD] sector. In this sector, vital boot records cause a computer to boot up or boot the operating system.. This code in the boot sector, heaps in the partition table, and PC hard drives have the partition table, which is a basic partition that loads the working operating system.

Precautions Against Computer Viruses and Getting rid of Viruses ?

Viruses, crashes into our PC when trying to download videos, images or text online. They infect the computer the moment we come into contact with them by clicking.. Before you start downloading anything from the Internet or emails, simply take preventive measures such as an antivirus program.. When copying data from a removable disk such as DVD, CD or USB drives, use any legitimate Antivirus software and update it periodically and scan complete hard disk drives and removable disks such as USB drives and external hard disk drives to eliminate any virus infection or threat.

Never start opening or copying data from an unknown source, try scanning with a good updated antivirus and remove any malicious or virus-like programs from your computer system.

  • Always use legitimate antivirus Software.
  • Antivirus program should be updated periodically.
  • Never try to open or download unknown Web sites or from infected USB Drives and CDs or DVDs. Do not attempt to copy any files, documents, images, videos, or content from.
  • System files or Never visit pornographic websites as they contain malicious programs that may harm the operating system.
  • You should not download pirated software that may contain a malicious program.
  • Scan for viruses before using external devices such as USB.
  • Be sensitive to phishing attacks and prefer sites with https extensions. Do not share information and enter passwords on sites that do not have an https, extension.
  • How can it be understood that the computer is infected with a virus? You can browse the article called here.

LEAVE A REPLY

Please enter your comment!
Please enter your name here