123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

How A Computer Gets A Virus Infection

Profile Picture
By Author: khan Mash
Total Articles: 22
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In this article I will explain how a user’s computer or laptop catches a virus. I will also talk about virus prevention and precautions.

The use of computer is expanding day by day. There are so many types of computers like desktop computer, laptop, iPad, tablet, Apple computer system, cell phones and others. Most of these computer machines can get virus infections in one way or the other. More than 80% of the world market uses Microsoft Windows computers. There are thousands and thousands of viruses, malware, adware and scripts that have so far infected millions of computers and notebooks.

How a virus attacks a computer? The way the virus transfer into a computer system is very annoying for a normal user. The attack is mysterious and destructive. As we know a virus is a computer program that can do anything the author wants it to do. Computer program has two aspects. It can run visually so that user can see it on the screen and it can also execute in the background which is the dangerous part of programming because a user cannot see it. A computer virus can execute the same way as installing a normal program ...
... on a computer. The difference is, a normal installation can be seen in the form of install wizard while the hidden execution cannot be noticed. So the virus can install itself automatically. This means, the virus copies all its files on the user’s computer without visually displaying the install wizard. Once the virus is installed, it can be run in a variety of ways like executing itself when the windows system starts. As mentioned above, the Microsoft Windows contributes to 80% to the world market that is why there are so many windows threats on the internet. The new type of computer that is safer against viruses is the Apple’s Mac computer, MacBook and MacBook Pro. I have seen attacks on these computers too but overall the number of infections is almost zero.

Let me explain some popular ways how a virus can execute without users permission. As explained above one way is, it can start when the computer system is started. A lot of times, user downloads free programs from the Internet. According to a research more than 10 percent of total websites are infected with some kind of code that can infect a system accessing that site. These websites change their malicious code regularly so that the antivirus programs cannot detect it. So when user downloads a program from the internet, it is usually in the form of a package and can contain anything including adware or agent programs used to communicate with virus developers. The virus can also attack a computer when a user opens an attachment. The email looks legitimate but in fact the attachment contains dangerous virus. There are different kinds of viruses starting from basic to the most destructive ones. Some viruses are so dangerous that data recovery is impossible after the infection.

How to clean and protect against viruses? Once a machine is infected with a worm, most of the time it can be cleaned. Many antivirus companies offer all kinds of tool to combat certain types of threats like stinger by Mcafee, tdskiller by kesperasky, power erase by Norton, Software Malicious Removal Tool by Microsoft. All these tools only work against some known infections. These companies also offer full versions of antivirus software. Which one is better? Nobody knows. The best defense is precaution. I will talk about precaution in the next paragraph. It’s very important to show your computer to a computer repair professional once it gets a virus instead of trying different things. This may avoid further complication.

So what are the important steps to avoid viruses and malware? First of all, the windows must be up to date i.e. windows updates should be installed all the time. Second a good antivirus with a firewall must be installed and up to date all the time. The next step is to avoid opening emails and attachments from unknown people or unknown email addresses. The most important one is this one. Let’s imagine, a user visits an infected website whose integrity was not known before and he or she opened it, the machine may get some popup window or the system might suddenly slow down. The best defense will be to press ctrl+alt+delete and force end all the running programs and avoid visiting that site. Some antivirus programs have the ability to feel this kind of infection and that way the user can close the website immediately.

In this article I tried to educate users on how a computer gets infections and what to do to avoid them. I also described about different types of virus attacks.

Khan Mash
MCSE, A+, Apple Certified and 21 years in IT.
Tech at
Mac Pro,ipad,notebook,data recovery

Total Views: 364Word Count: 804See All articles From Author

Add Comment

Computers Articles

1. Exploring How Ai In The Cloud Can Transform Your Business
Author: TechDogs

2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs

3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot

4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi

5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown

6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller

7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute

8. Top 7 Advantages Of React Js
Author: Bella Stone

9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone

10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD

11. Top 10 Healthcare Technology Trends
Author: goodcoders

12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith

13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press

14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.

15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: