123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Computer Viruses: The Dangers Of The Internet

Profile Picture
By Author: Nermin
Total Articles: 85
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Computer viruses are one of the most destructive threats of the computer world. Just like a real biological virus, a computer virus can attach itself to a computer and copy itself. Viruses can be distinguished from malware, adware, or spyware because of their replicating abilities, and should not be referred to these other terms. Viruses are destructive because of the various harmful effects that it can bring to your computer and its files. Data located inside a user's computer can become corrupted or inaccessible, rendering potentially valuable files useless. Worse, a virus may entirely wipe the data inside the computer, all its installed programs, files saved and folders created. Another harmful effect it can perform is to spread itself like a real virus, and infect other computers. The performance of the computer can also become slower, or its applications become inaccessible for use. It is also usual to see a virus-infested computer to crash every now and then, restarting itself much to the annoyance of its user.

A virus is actually a computer program itself. Viruses are programs that needed to be executed and once ...
... activated, would be able to write its own code to the memory of the personal computer. Most of the time, viruses are able to consolidate themselves to legit programs in the form of an executable file, which makes them even more dangerous as a user make mistake a virus for a valid file and unknowingly activate the virus program. Among the types of media that it can attach itself are binary executable files such as .exe and com files, specific auto-run script files, word documents, spreadsheets, and database files. Viruses also take up memory because of its nature as a program, and thus take up space that is best utilized for other more important programs.

Viruses can spread through the use of external memory that is plugged into one's computer, or through the access of the internet. These programs can make it look like harmless files like images or videos. To combat this dangerous threat, one must install into their own personal computer an anti-virus program that seeks these potentially harmful elements which afterwards enables the user to remove the viruses. A good anti-virus program should be able to identify the existing viruses that has spread in one's PC, even the well-hidden ones, and is able to update itself with the latest virus definitions in the World Wide Web. Depending on one's usage of the computer, anti-virus programs can come in free or with a cost. Free anti-virus programs have limited capabilities and usually only has a time period for its trial and use. Priced anti-virus programs, on the other hand, usually have better or have added features and more comprehensive in their performance as a threat detector, and are usually better supported by their software developers.

The threat of these computer viruses arriving in one's computer will always exist. With that in mind, one has to always be ready to guard his/her computer from these threats and ensure the security and smooth performance of one's computer.


If you want to get more information about Internet security store and Norton Internet Security than visit our website.

Total Views: 220Word Count: 532See All articles From Author

Add Comment

Computers Articles

1. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

4. The Rise Of User Centered Web Design
Author: goodcoders

5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech

12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech

13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech

14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech

15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: