123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Computer Virus : A Fatal Computer Program

Profile Picture
By Author: james stepehen
Total Articles: 9
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Computer has become indisputable part of our life. We can't imagine our life without computer in present scenario. Imagine ! What will happen when your computers stops working . Really it will cause a lot of problems along with financial losses too!
The main threat to our computer is computer virus.
A computer virus is a computer program that makes a copy of itself and multiplies at very high rate. The term virus is also used for other malware. Computer virus mainly propagates through USB drive, CD , DVD or floppy disk .
A computer virus can completely cease the computer and network. Some programmers create these programs intentionally so that they can hack other computers and networks.
Strategies in which virus spreads :
For multiplication only if it is allowed to execute code and write memory. For this viruses attach themselves to executable files .
We mainly divide viruses into two categories. First is non resident virus and other is non resident virus.
Nonresident viruses seek for other hosts that can be infected immediately. First of all they try to infect host and later the control ...
... is transferred to application programs.
On the other hand resident viruses work in a different manner. First of all they get loaded into memory on execution and later the control is transferred to the host programs. It remains active in the background and keep on infecting the hosts.

How computer viruses mask themselves?
Most of the time ,we even don't know where the virus is exactly? In fact viruses use various deceptive methods to hide itself from users. The solution for computer virus removal is only a use of anti virus .
Some viruses on Ms-dos operating systems ensure that the last modified date of host file remains the same , whenever virus infects it . Now this method employed by virus can be easily detected by anti viruses.
Some viruses infects a file by writing programs on unused space of executable file . These are termed as cavity viruses . Chernobyl virus is one of the example of this sort of viruses.
Also most of the viruses are programmed in .Exe file. So users of windows operating system are more prone to these virus attack. Thus Linux is comparatively safer operating system .
Computer viruses are mainly programmed due to various bugs in operating systems and software.
The best way for computer virus removal , is use of a branded and good anti virus. We should also prevent ourselves from transferring and downloading any data from unreliable sources.

computer virus removal,This author writes article for this sites computer virus removal since long time and give the best article ever .

Total Views: 236Word Count: 439See All articles From Author

Add Comment

Computers Articles

1. Rsgoldfast Runescape Gold:fishing
Author: RuneScape gold

2. Understanding Mobile Intranet Workflow
Author: goodcoders

3. How To Personalize Your Mobile Ux?
Author: goodcoders

4. How To Optimize The Fintech Software Release Management Process
Author: goodcoders

5. Data Recovery Services Near Me: Your Ultimate Guide To Retrieving Lost Data
Author: adeel khan

6. Top 5 Data Cleansing Tools Of 2025
Author: Ben Gross

7. Come Ottenere Una Licenza Windows 11 In Italia: Guida Completa
Author: LicensePlanet

8. How To Build A Strong Brand Identity With Graphic Design
Author: dnd teams

9. Exploring The Generative Ai Market: Trends, Growth Drivers, And Future Outlook
Author: simran

10. Microsoft Dynamics 365 Vs Salesforce – Comparisons (2025)
Author: Maria

11. Top 5 Influencer Marketing Software Of 2025
Author: Ben Gross

12. Augmented Reality And Its Role In Manufacturing
Author: goodcoders

13. Effortless Environment Tracking With Tempgenius: Wifi Humidity Monitoring And Wireless Data Loggers
Author: Chris Miller

14. Sales Technology Trends That Will Impact Your Business In 2025
Author: Ben Gross

15. Infrastructure Management: Ensuring Efficiency And Sustainability
Author: ServerLT

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: