123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Technology,-Gadget-and-Science >> View Article

What Is A Computer Virus - An Overview

Profile Picture
By Author: Herminia Price
Total Articles: 14
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

A computer virus is a software program that replicates itself and infects a computer. A true virus has reproductive ability. Although in factual sense, some types of malware including adware and spyware programs do not have reproductive ability, they are included under the term computer virus. A computer virus performs a variety of functions, like annoyingly popping up irrelevant messages to deleting files and destroying hard disks.

It is an oddity that a computer virus shows how vulnerable we are, by being victims of devastating consequences like disrupted productivity running into billions of dollars, while at the same time demonstrating the sophistication of our amazing interconnectivity. We all became aware what is a computer virus and what havoc it can do when the Mydoom worm infected nearly a quarter million computers in 2004. This worm affected Microsoft Windows, probably through e-mail spammers by sending junk mail through infected computers. In an extreme scenario, a computer virus can spread through most, if not all vital computers, in the world and wreak havoc for business organizations, financial establishments, ...
... government functioning, and academic institutions.

How Do Viruses Spread?

We now know what is a computer virus and so, it will be interesting to understand how do viruses spread. For a virus to spread it must first be triggered, for example, by the user visiting a potentially dangerous site, opening a document infected by a virus, booting with a diskette infected by a "boot sector virus," or by double clicking on an infected executable file.

The Entire Process Works In The Following Way:

* A virus software program is launched
* The virus code is loaded into the PC memory
* The virus executes its destructive payload
* The virus replicates itself into other programs

If all a virus did was to replicate itself, then the harm caused would have been negligible, but unfortunately viruses do something far destructive like overwriting the boot sector of your hard drive, stealing your sensitive passwords, and hacking your e-mail ids.

What Are Trojan Horses?

As explained earlier, Trojans or Trojan horses do not replicate themselves but perform an undesired yet intended function, while at the same time pretending to do something else. A classic example is a fake log in program into a supposedly genuine bank site that prompts you to display your sensitive account information.

How Do You Protect Your Computer From Viruses?

To be safe, you simply need to load antivirus software. Once you buy and install antivirus software, you will be prompted to download regular updates that will allow the program to fight the latest computer viruses. A typical antivirus software performs the following functions:

* Scans and protects your computer against incoming e-mails
* Alerts you, if you attempt to download an infected file
* Prevents external attacks by firewall software

Fortunately, computer users do not feel jinxed with viruses these days. Antivirus products have become more advanced. People have understood that the problem of virus will stay forever, with newer versions making appearance, often with regular predictability. Happily, people will continue to use computers as long as there are people who can offer solutions.

What is a Computer Virus is a free online resource for computer virus and virus removal guidance. The site provides useful information on how to remove various viruses, adware, worms, Trojan horses, malware, and any other malicious software having the potential to disrupt and cause damage to computers.

Total Views: 217Word Count: 560See All articles From Author

Add Comment

Technology, Gadget and Science Articles

1. Guide To Understanding Led Road Flares And Led Safety Flares
Author: Andyxiong

2. Scraping Uae Grocery Chain Data
Author: Actowiz Solutions

3. What Are Document Management Services And How Do They Work?
Author: DocSmart Solutions

4. Web Scraping G2g For Real-time Price Changes & Trends
Author: Web Data Crawler

5. Rfid System Explained: Working, Benefits, And Real-world Business Applications
Author: AIDC Technologies

6. How Probe Monitoring And Storage Monitoring Are Transforming Environmental Compliance For Modern Facilities
Author: Chris Miller

7. Compliance-ready Erp With Dynamics 365 Business Central
Author: Ahil Waseem

8. Grocery Inflation Alert Dashboard – Oos & Price Spike Monitoring
Author: Food Data Scraper

9. Scrape Grocery Data Using Apis For Real-time Insights
Author: REAL DATA API

10. Multi-platform Tour Price Benchmarking For Smarter Pricing
Author: iwebdatascraping

11. Carrefour Food Delivery Data Scraping For Market Intelligence
Author: Retail Scrape

12. Best Buy Store-level Pricing Data Scraping From Us
Author: Web Data Crawler

13. Ultrapure Water Market 2025-2035: Trends, Technologies, And Industry Applications
Author: Shreya

14. Amazon Fresh Uk Grocery Deals & Offers Data Scraping Api
Author: Fooddatascrape

15. Europe Pelletized Fertilizer Market 2025–2035: Trends, Growth Drivers, And Future Outlook
Author: Shreya

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: