123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Virus- A Brief Introduction

Profile Picture
By Author: Kay Johnson
Total Articles: 117
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The most common reason for system break down is virus, invading your system. Viruses are software made with the intention of troubling others. There are various ways through these virus trouble people by troubling people. Let us understand the mechanism of how a virus works.

Let us know few facts about Boot infectors. All the disks that is CD, DVD, hard disk have an area that decides, whether the CD or disk is bootable. As you turn the computer on, it starts reading the boot information. The computer then uses the boot information to start in a proper manner. If the boot information is infected, then the computer cannot read the information properly and this is how the virus spreads to the drive of the computer. Once, the code of the boot is on, the hard drive is affected with the virus. Then, it spreads to every disk put on to the computer and infects it with this. Thus, the infection of virus spreads.

Most of the time, these boot virus stay dormant without causing any harm to the system. They are just there. These viruses are designed often to start their work on specific date. These are some dangerous ...
... boot virus, which would disturb the boot information or enforce the complete formatting of the hard drive, as soon as they start activation.

The other type of virus is program infectors. When there is any application infected with virus loaded or run on the computer the virus is transferred to the computer. It affects the memory of the computer. While it is in the memory, any application or new program that is run gets infected with this. These commonly cause multiple infections. It means that the system may crash any time, as there are many programs on your computer.

These programs are dormant for some time, but soon start infecting the programs and then multiple programs and soon they can bring the system to crash. The symptom of this is the program saves the file without any name or improper date or name. These are designed, especially for getting the information out of the shared programs like email, macros, documents, or the compressed files.

The major mode of transfer for these threats or virus is through mails. These are sent as an attachment. In most of the cases, infected computer user without the knowledge attaches an infected file to an email, and sends the email to his relatives and friends. After receiving the email, the virus starts on, when the file attachment is opened, thus infecting a new computer. You need to be extra careful while opening emails with animations, programmed greeting cards, jokes, photographs, spreadsheet and files. There are known weapons recognized to contain virus files. It is always advisable to be very careful while sending or receiving any attachments to your friends or relatives.

This is about the virus that infects the system. To know more about computer security, preventive measures, data recovery and computer repairs, visit our service site savemysystem.co.uk.
Save My System will offer you computer virus removal services in London. We also provideLondon onsite computer repair services.

Total Views: 148Word Count: 525See All articles From Author

Add Comment

Computers Articles

1. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA

2. The Ai Revolution: What’s Coming In 2025
Author: Ben Gross

3. The Rising And Falling Trends Of Graphic Card Prices In 2024
Author: Alahdeen

4. What Is Test-driven Development And Which Three Rules Does It Follow?
Author: Byteahead

5. What Is Web Application Architecture?
Author: goodcoders

6. Understanding How Wifi Works: The Wireless Connection Process Explained
Author: Kr

7. What’s Coming In Cybersecurity For 2025?
Author: Ben Gross

8. Hire Magento Expert In India
Author: Yuvraj Raulji

9. Discovering Everything About C15 Power Cables
Author: Jennifer Truong

10. Want To Get Long-distance Power? Time To Grab Extension Power Cords
Author: Jennifer Truong

11. Best Android Development Tools To Use
Author: Best Android Development Tools To Use

12. Choosing The Right Kansas City Web Design Partner For Your Business Success
Author: naviworld1h

13. The Importance Of Choosing The Right Kansas City Ecommerce Developer And Logo Design Expert
Author: naviworld1h

14. Top Mobile App Companies And Developers In Kansas City
Author: naviworld1h

15. Boost Your Business With A Leading Web Design Company In Kansas City
Author: naviworld1h

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: