123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Virus- A Brief Introduction

Profile Picture
By Author: Kay Johnson
Total Articles: 117
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The most common reason for system break down is virus, invading your system. Viruses are software made with the intention of troubling others. There are various ways through these virus trouble people by troubling people. Let us understand the mechanism of how a virus works.

Let us know few facts about Boot infectors. All the disks that is CD, DVD, hard disk have an area that decides, whether the CD or disk is bootable. As you turn the computer on, it starts reading the boot information. The computer then uses the boot information to start in a proper manner. If the boot information is infected, then the computer cannot read the information properly and this is how the virus spreads to the drive of the computer. Once, the code of the boot is on, the hard drive is affected with the virus. Then, it spreads to every disk put on to the computer and infects it with this. Thus, the infection of virus spreads.

Most of the time, these boot virus stay dormant without causing any harm to the system. They are just there. These viruses are designed often to start their work on specific date. These are some dangerous ...
... boot virus, which would disturb the boot information or enforce the complete formatting of the hard drive, as soon as they start activation.

The other type of virus is program infectors. When there is any application infected with virus loaded or run on the computer the virus is transferred to the computer. It affects the memory of the computer. While it is in the memory, any application or new program that is run gets infected with this. These commonly cause multiple infections. It means that the system may crash any time, as there are many programs on your computer.

These programs are dormant for some time, but soon start infecting the programs and then multiple programs and soon they can bring the system to crash. The symptom of this is the program saves the file without any name or improper date or name. These are designed, especially for getting the information out of the shared programs like email, macros, documents, or the compressed files.

The major mode of transfer for these threats or virus is through mails. These are sent as an attachment. In most of the cases, infected computer user without the knowledge attaches an infected file to an email, and sends the email to his relatives and friends. After receiving the email, the virus starts on, when the file attachment is opened, thus infecting a new computer. You need to be extra careful while opening emails with animations, programmed greeting cards, jokes, photographs, spreadsheet and files. There are known weapons recognized to contain virus files. It is always advisable to be very careful while sending or receiving any attachments to your friends or relatives.

This is about the virus that infects the system. To know more about computer security, preventive measures, data recovery and computer repairs, visit our service site savemysystem.co.uk.
Save My System will offer you computer virus removal services in London. We also provideLondon onsite computer repair services.

Total Views: 164Word Count: 525See All articles From Author

Add Comment

Computers Articles

1. How To Improve The Security Of Android App?
Author: goodcoders

2. How To Earn Money From Free Apps?
Author: goodcoders

3. How Artificial Intelligence Is Revolutionizing Accounting?
Author: goodcoders

4. Explain About Web Application Architecture: Components, Types, Best Practices
Author: goodcoders

5. Complete Guide To Fitness App Development
Author: goodcoders

6. Erp For Small And Big Enterprise
Author: AITS Software

7. Top Software Development Company Melbourne
Author: Technothinksup Solutions

8. The Devops Revolution: Accelerating Innovation In The Digital Age
Author: basheer ansari shaik

9. How Ai Is Transforming Software Development
Author: Technothinksup Solutions

10. How To Do Web Scraping With Ruby?
Author: goodcoders

11. How Mobile Apps Blooming In The Fashion Industry?
Author: goodcoders

12. How Cloud Computing Helps In The Field Of Mobile App Development?
Author: goodcoders

13. The Importance Of Cybersecurity In The Digital Age
Author: Mohammad Arsh

14. First-ever ‘identity Management Day’ Is April 13, 2021
Author: Reinfosec

15. Top 5 Project Management Software Of 2025
Author: Ben Gross

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: