a computer virus is a computer program that can copy

Upload: harsukhdadhich

Post on 30-May-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 A Computer Virus is a Computer Program That Can Copy

    1/14

    A computer virus is acomputer program that can copy itself and infect a computer. The

    term "virus" is also commonly but erroneously used to refer to other types ofmalware,

    adware, and spyware programs that do not have the reproductive ability. A true virus canonly spread from one computer to another (in some form of executable code) when its

    host is taken to the target computer; for instance because a user sent it over a network or

    the Internet, or carried it on a removable medium such as afloppy disk, CD,DVD, orUSB drive. Viruses can increase their chances of spreading to other computers by

    infecting files on a network file systemor a file system that is accessed by another

    computer.[1][2]

    The term "computer virus" is sometimes used as a catch-all phrase to include all types ofmalware. Malware includes computer viruses, worms, trojans, most rootkits, spyware,

    dishonest adware, crimeware, and other malicious and unwanted software, including true

    viruses. Viruses are sometimes confused with computer wormsandTrojan horses, whichare technically different. A worm can exploit security vulnerabilities to spread itself to

    other computers without needing to be transferred as part of a host, and a Trojan horse is

    a program that appears harmless but has a hidden agenda. Worms and Trojans, likeviruses, may cause harm to either a computer system's hosted data, functionalperformance, or networking throughput, when they are executed. Some viruses and other

    malware have symptoms noticeable to the computer user, but many are surreptitious.

    Viruses can really only do one of two things, they can either delete files, or they can alter them. You're

    probably asking yourself, "Then why are viruses so dangerous if all they can do is play with the files?" The

    reason this is dangerous is because they can alter any file. Some viruses are designed to attack files in the

    boot sector, this could make it impossible for your operating system to boot up, others attack system files

    that are critical for your operating system to perform normally, still others are designed to specifically attack

    your documents. If a virus infects a system file that is crucial to your system it is possible that that virus

    would cause your memory to not be freed up causing what is called as a memory leak. If this occurs your

    computer will gradually get slower as you use it, until eventually it locks up. These things may just seem like

    minor inconveniences to you now, but if your computer is infected you will quickly find out how much trouble

    it can really cause. There is of course the worst case scenario for viruses, the viruses might be designed to

    completely erase everything on your hard drive, you may be thinking "No, problem I always back up to disk".

    Well if you always backup than you put your disk in your infected computer, if it is a boot sector virus, guess

    what, your backups are infected as well. Total data loss, no matter what you do. This is why it is important to

    reduce your risk.

    Your computer will get infected by a virus by opening the virus-file. This file will usuallybe: or: attached to an email-message or: under a button on a internet-site (sometimes even

    by opening a site or perform some other action on the site). or: on a CD or other kind of

    disc. or: a file, sent to you, through a messenger-servicComputer virus' come from the

    http://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Adwarehttp://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Codehttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Compact_Dischttp://en.wikipedia.org/wiki/DVDhttp://en.wikipedia.org/wiki/DVDhttp://en.wikipedia.org/wiki/USB_flash_drivehttp://en.wikipedia.org/wiki/Network_file_systemhttp://en.wikipedia.org/wiki/Network_file_systemhttp://en.wikipedia.org/wiki/Computer_virus#cite_note-0%23cite_note-0http://en.wikipedia.org/wiki/Computer_virus#cite_note-1%23cite_note-1http://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Trojan_Horse_(Computing)http://en.wikipedia.org/wiki/Trojan_Horse_(Computing)http://en.wikipedia.org/wiki/Trojan_Horse_(Computing)http://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Adwarehttp://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Codehttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Compact_Dischttp://en.wikipedia.org/wiki/DVDhttp://en.wikipedia.org/wiki/USB_flash_drivehttp://en.wikipedia.org/wiki/Network_file_systemhttp://en.wikipedia.org/wiki/Computer_virus#cite_note-0%23cite_note-0http://en.wikipedia.org/wiki/Computer_virus#cite_note-1%23cite_note-1http://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Computer_wormhttp://en.wikipedia.org/wiki/Trojan_Horse_(Computing)
  • 8/14/2019 A Computer Virus is a Computer Program That Can Copy

    2/14

    internet, they are created by other computer users for a wide varity of reasons but mostly

    for pure evilness

    e.

    1. An infected memory stick, diskette or other computer connected by a network caninfect the computer system

    2. Downloading files that are already infected can infect your computer.

    Modern Communication Woes

    Like the telephone, email is one of the quickest and most convenient forms ofcommunication today. We send them through the office, to our children, and toour clients. We use it because it is quick and easy. We have electronic addressbooks instead of little black books.

    Email frauds commit their crimes in a way similar to con artists who commit theircrimes over the telephone. How many times have you gotten a phone call from astrange source, asking you for money or personal information? When you askedthem to verify their company and you would call them back, did they back off?

    Con artists over the phone seek to gain your trust. Creators of email virusesprey on you by claiming to be from somebody that they're not. The good news is,you really don't have to be a victim, if you're armed with the right information.

    Arm Your Computer

    Anti-Virus software is a necessity nowadays. If you don't have it, now is the besttime to shop for it! In lieu of the recent virus attacks, many of anti-viruscompanies are giving away free 30-day-trials. (Just remember the deal is muchsweeter when you're downloading it before your computer catches a virus!) Youcan shop around on the Internet for the best deals; the three major players are

    Dr. Solomon's, McAfee's Virus Shield and Norton Antivirus

    . Be sure that the operating system you're using, such as Windows '95, iscompatible with the program you choose. Once you get your software, make sureyou update it at least once a week, and that you have it set to scan for viruseswhen your computer boots up. Most of these programs have an "autoupdate"

    feature that you can schedule to automatically update your software any time thecomputer is on, even if you're not home. If a particularly notorious virus has beenreleased recently, update it daily for about a week. It may be a pain, but it's worth

    it; Symantec, the creator ofNorton Antivirus, estimates that over 5 new virusesare created a day. Two days after the Love Virus was released, over 29variations of were in circulation.

    http://www.essortment.com/all/computervirusp_pfw.htmhttp://www.essortment.com/all/computervirusp_pfw.htmhttp://www.essortment.com/all/computervirusp_pfw.htmhttp://www.essortment.com/all/computervirusp_pfw.htmhttp://www.essortment.com/all/computervirusp_pfw.htmhttp://www.essortment.com/all/computervirusp_pfw.htm
  • 8/14/2019 A Computer Virus is a Computer Program That Can Copy

    3/14

    Update your other software regularly as well. Microsoft released a "patch" in

    response to the Love Virus transmission. Software companies

    such as Microsoft are constantly discovering new security holes and fixes forbugs in their software. If you're a registered software user, then you can get

    these fixes for free by visiting the website or calling their technical support phonenumber. In addition to giving you added virus protection, these security patcheshelp your programs run more smoothly in the long run.

    For added protection, and to save a lot of frustration in the long run, it's a goodidea to have a backup of your computer files, just to be on the safe side. A Zipdrive is a great tool for this, but if you don't want to spend the cash, there are lotsof "servers" on the Internet that help you to backup and store files. You can try

    one for thirty days free at www.ebackup.com. In addition to backing up yourfiles, you should also check your hard drive to make sure that your computerprogram files (such as .exe and .com) are "read-only." (Your operating system

    manual has instructions if you're not sure how to check the Properties.) If acomputer virus tries to access them, you'll get a message to tip you off that thecomputer is trying to change the file.

    http://www.essortment.com/all/computervirusp_pfw.htmhttp://www.essortment.com/all/computervirusp_pfw.htmhttp://images.google.co.in/imgres?imgurl=http://giovanniworld.files.wordpress.com/2009/03/virus.jpg&imgrefurl=http://giovanniworld.wordpress.com/2009/03/&usg=__h04jJzuf3al49TqA8jby--lzeTk=&h=480&w=640&sz=40&hl=en&start=117&um=1&tbnid=Jr_BV8fraoNLgM:&tbnh=103&tbnw=137&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D100%26um%3D1http://images.google.co.in/imgres?imgurl=http://static.howstuffworks.com/gif/virus-ch.jpg&imgrefurl=http://computer.howstuffworks.com/virus.htm&usg=__kPOVixWYS8lpTIB9-egxzZpPiFw=&h=200&w=200&sz=25&hl=en&start=94&um=1&tbnid=eCKlMQzWNg3myM:&tbnh=104&tbnw=104&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D80%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.topnews.in/files/Virus_attack.jpg&imgrefurl=http://www.topnews.in/chinese-authorities-warn-valentines-day-virus-220092&usg=__vqDM2UGJ8bvv79v4f2x5O7JO3NQ=&h=1161&w=1273&sz=38&hl=en&start=84&um=1&tbnid=Fn4A7M6Ycj6rNM:&tbnh=137&tbnw=150&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D80%26um%3D1http://images.google.co.in/imgres?imgurl=http://askbobrankin.com/computer-virus.jpg&imgrefurl=http://askbobrankin.com/should_i_buy_antispyware_or_antivirus_software.html&usg=__0AsQ2nQOObDDl-wwoDUnqCUw4OI=&h=261&w=300&sz=15&hl=en&start=75&um=1&tbnid=H6Wh7dMgQJ8s9M:&tbnh=101&tbnw=116&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D60%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.lbl.gov/ITSD/CIS/compnews/images/splash/computer_virus.jpeg&imgrefurl=http://www.lbl.gov/ITSD/CIS/compnews/2003/September/01-real-threat.html&usg=__0vmSXtxaydq379zNdHBsFY4fEeA=&h=292&w=275&sz=17&hl=en&start=74&um=1&tbnid=ReGi-XBrfv3ojM:&tbnh=115&tbnw=108&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D60%26um%3D1http://images.google.co.in/imgres?imgurl=http://techtips.nytechsllc.com/wp-content/uploads/2007/12/pic3.jpg&imgrefurl=http://techtips.nytechsllc.com/tag/virus/&usg=__hwLriSjIf2Gmr6FzetGZjkH-Dmc=&h=313&w=345&sz=19&hl=en&start=31&um=1&tbnid=XwI50-zKmD4TJM:&tbnh=109&tbnw=120&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://computerrepairmaintenance.com/images/computer-virus-picturejpg.jpg&imgrefurl=http://www.computerrepairmaintenance.com/tag/computer-virus&usg=__MH3VtVpCKS4WcmdcPXctUp5e42I=&h=298&w=398&sz=26&hl=en&start=1&um=1&tbnid=DA6cdd4UHrhR1M:&tbnh=93&tbnw=124&prev=/images%3Fq%3Dcomputer%2Bvirus%26hl%3Den%26um%3D1http://www.essortment.com/all/computervirusp_pfw.htmhttp://www.essortment.com/all/computervirusp_pfw.htm
  • 8/14/2019 A Computer Virus is a Computer Program That Can Copy

    4/14

    http://images.google.co.in/imgres?imgurl=http://www.bidorbuy.co.za/user_images/471/424471_AVG_Antivirus_logo.jpg&imgrefurl=http://www.bidorbuy.co.za/item/10074539/Office_Software_Openoffice_org_Free_antivirus_FREE_GAME.html&usg=__4WXBMvAMUaxKN4bALjv0R9HpxRM=&h=400&w=450&sz=11&hl=en&start=10&um=1&tbnid=Z-GsQ6W5JiBJOM:&tbnh=113&tbnw=127&prev=/images%3Fq%3Dantivirus%26hl%3Den%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.freedownload2you.com/images/Avast_Antivirus.jpg&imgrefurl=http://www.freedownload2you.com/Avast_Antivirus.html&usg=___4-rWFNMveTiKMQ_yWAKVFRM6zI=&h=456&w=388&sz=24&hl=en&start=30&um=1&tbnid=nVujGXtu1C2QAM:&tbnh=128&tbnw=109&prev=/images%3Fq%3Dantivirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.consumersearch.com/files/images/products/AVG_Anti-Virus_Free_Edition_8.5.jpg&imgrefurl=http://www.consumersearch.com/antivirus-software/compare&usg=__6LuTdgcMU4d441qqlehFxw6SBv0=&h=1414&w=1065&sz=1321&hl=en&start=32&um=1&tbnid=Tv5ebe3D70UTFM:&tbnh=150&tbnw=113&prev=/images%3Fq%3Dantivirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://goolier.com/wp-content/uploads/2009/05/computer-virus1.jpg&imgrefurl=http://www.goolier.com/&usg=__CYoU-OFsPA3yLSaJ6BnjTvOBiCU=&h=294&w=400&sz=25&hl=en&start=2&um=1&tbnid=YT5pSPVBMhXOIM:&tbnh=91&tbnw=124&prev=/images%3Fq%3Dcomputer%2Bvirus%26hl%3Den%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.pcnmore.com/virus.gif&imgrefurl=http://www.pcnmore.com/virus.htm&usg=__O8ZyRDNrNG-PSph3IC0p9fEDADg=&h=1079&w=750&sz=69&hl=en&start=184&um=1&tbnid=hsAS7eORGh5soM:&tbnh=150&tbnw=104&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D180%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.vhxn.com/wp-content/uploads/2009/04/antivirussoftware.jpg&imgrefurl=http://www.vhxn.com/how-to-check-my-antivirus-software-is-working-proper-how-to-create-computer-virus/&usg=__VlfUiR4M921KSarR-FbVs7DJQO8=&h=426&w=515&sz=64&hl=en&start=240&um=1&tbnid=fT0UnaHS4cgouM:&tbnh=108&tbnw=131&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D220%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.infoniac.com/uimg/computer-virus-button-blue.jpg&imgrefurl=http://www.infoniac.com/hi-tech/list-of-computer-viruses-developed-in-1980s.html&usg=__c3pC-IagnVi3x7vewMqe22ul1Wg=&h=256&w=350&sz=10&hl=en&start=227&um=1&tbnid=jsr50rKTqHxs9M:&tbnh=88&tbnw=120&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D220%26um%3D1http://images.google.co.in/imgres?imgurl=http://static.guim.co.uk/sys-images/Money/Pix/pictures/2008/09/08/VirusRexPaulCooper460.jpg&imgrefurl=http://www.guardian.co.uk/money/blog/2008/sep/08/internetphonesbroadband&usg=__4PaajKlkEO-qWhQUmboXyTWQ8gs=&h=276&w=460&sz=15&hl=en&start=141&um=1&tbnid=Tf5aS7E3TRbqlM:&tbnh=77&tbnw=128&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D140%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.spingraphix.net/images/Computer-Virus.jpg&imgrefurl=http://www.spingraphix.net/data-recovery.asp&usg=__4Au_4MqkL9BTQmOSO-bKgG7mgrY=&h=250&w=235&sz=25&hl=en&start=131&um=1&tbnid=316XigWoWOMUnM:&tbnh=111&tbnw=104&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D120%26um%3D1
  • 8/14/2019 A Computer Virus is a Computer Program That Can Copy

    5/14

    Computer Virus398 x 298 - 26k - jpgcomputerrepairmainten...Find similar images

    computer-virus1400 x 294 - 25k - jpggoolier.comFind similar images

    http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=1&tbnid=DA6cdd4UHrhR1M:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=2&tbnid=YT5pSPVBMhXOIM:http://images.google.co.in/imgres?imgurl=http://blogs.pitch.com/plog/computer%2520virus_thumb.jpg&imgrefurl=http://blogs.pitch.com/plog/2008/08/hallmark_not_a_virus.php&usg=__tUr8BRzMPe1tfNpCc0Vvvkc1lhU=&h=325&w=400&sz=58&hl=en&start=6&um=1&tbnid=A5xXog14SKIQ5M:&tbnh=101&tbnw=124&prev=/images%3Fq%3Dcomputer%2Bvirus%26hl%3Den%26um%3D1http://images.google.co.in/imgres?imgurl=http://nuclear-imaging.info/site_content/wp-content/uploads/2009/02/computer_virus.jpg&imgrefurl=http://nuclear-imaging.info/site_content/tag/virus/&usg=__1fyhXjmXo0a10e2YKKWZfNQcNiM=&h=426&w=494&sz=67&hl=en&start=5&um=1&tbnid=xWpRTM0tpcD9yM:&tbnh=112&tbnw=130&prev=/images%3Fq%3Dcomputer%2Bvirus%26hl%3Den%26um%3D1http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=1&tbnid=DA6cdd4UHrhR1M:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=2&tbnid=YT5pSPVBMhXOIM:
  • 8/14/2019 A Computer Virus is a Computer Program That Can Copy

    6/14

    Linux is vulnerable to494 x 426 - 67k - jpgnuclear-imaging.infoFind similar images

    Hallmark: Not a400 x 325 - 58k - jpgblogs.pitch.comFind similar images

    http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=5&tbnid=xWpRTM0tpcD9yM:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=6&tbnid=A5xXog14SKIQ5M:http://images.google.co.in/imgres?imgurl=http://www.computerrepairmaintenance.com/images/computer-viruses.jpg&imgrefurl=http://www.computerrepairmaintenance.com/computer-virus/online-virus-cleaner-software-for-pc-protection&usg=__-8EirKHqUG3mQ5DL-SVTVWvkVt0=&h=326&w=400&sz=30&hl=en&start=10&um=1&tbnid=PW2C1oaQNKkMgM:&tbnh=101&tbnw=124&prev=/images%3Fq%3Dcomputer%2Bvirus%26hl%3Den%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.caricatures-ireland.com/blog/wp-content/uploads/2007/09/computer-worm.jpg&imgrefurl=http://www.caricatures-ireland.com/blog/category/computers/&usg=__CQ1YLzMo1pl_h_y23I1_eGTkrNc=&h=566&w=400&sz=79&hl=en&start=9&um=1&tbnid=kSXZNYDIzGcFvM:&tbnh=134&tbnw=95&prev=/images%3Fq%3Dcomputer%2Bvirus%26hl%3Den%26um%3D1http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=5&tbnid=xWpRTM0tpcD9yM:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=6&tbnid=A5xXog14SKIQ5M:
  • 8/14/2019 A Computer Virus is a Computer Program That Can Copy

    7/14

    Computer Virus400 x 566 - 79k - jpgcaricatures-ireland.comFind similar images

    Online Virus400 x 326 - 30k - jpgcomputerrepairmainten...Find similar images

    http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=9&tbnid=kSXZNYDIzGcFvM:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=10&tbnid=PW2C1oaQNKkMgM:http://images.google.co.in/imgres?imgurl=http://peterhgregory.files.wordpress.com/2007/03/virus.PNG&imgrefurl=http://peterhgregory.wordpress.com/books/computer-viruses-for-dummies/computer-viruses-for-dummies-humor-and-outtakes/&usg=__cHKTjkeQUs1Kz1GNdtpEP-912r4=&h=537&w=808&sz=628&hl=en&start=14&um=1&tbnid=bC8j_34i7aXdVM:&tbnh=95&tbnw=143&prev=/images%3Fq%3Dcomputer%2Bvirus%26hl%3Den%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.istockphoto.com/file_thumbview_approve/5470117/2/istockphoto_5470117-computer-virus-alert-warning-on-monitor-screen-green-and-red.jpg&imgrefurl=http://www.istockphoto.com/file_closeup.php%3Fid%3D5470117%26refnum%3Dbunhill&usg=__oDfTa795QtsD315rOI4vcvhuN7g=&h=253&w=380&sz=64&hl=en&start=13&um=1&tbnid=2XkJGnVGQEnkbM:&tbnh=82&tbnw=123&prev=/images%3Fq%3Dcomputer%2Bvirus%26hl%3Den%26um%3D1http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=9&tbnid=kSXZNYDIzGcFvM:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=10&tbnid=PW2C1oaQNKkMgM:
  • 8/14/2019 A Computer Virus is a Computer Program That Can Copy

    8/14

    Computer Virus380 x 253 - 64kistockphoto.comFind similar images

    Computer Virus808 x 537 - 628k - pngpeterhgregory...Find similar images

    Computer Virus on500 x 375 - 100k - jpgflickr.comFind similar images

    10 Worst Computer250 x 250 - 39k - jpgblog.800hightech.comFind similar images

    Stock Photo -300 x 320 - 33k - jpgfotosearch.com

    http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=13&tbnid=2XkJGnVGQEnkbM:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=14&tbnid=bC8j_34i7aXdVM:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&ndsp=20&imgtype=i_similar&sa=X&ei=7-n7SoOpBYP-7AOR9vyPAg&ct=img-sim-l&oi=image_sil&resnum=1&tbnid=3WoHgocylnjKoM:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&ndsp=20&imgtype=i_similar&sa=X&ei=7-n7SoOpBYP-7AOR9vyPAg&ct=img-sim-l&oi=image_sil&resnum=2&tbnid=lql9meKLx6XPHM:http://images.google.co.in/imgres?imgurl=http://comps.fotosearch.com/comp/IGS/IGS236/computer-virus_~IS102-013.jpg&imgrefurl=http://www.fotosearch.com/IGS236/is102-013/&usg=__eGGjM4HUyiiGq7HkAFqgKARwSI8=&h=320&w=300&sz=33&hl=en&start=23&um=1&tbnid=OffV1CWGFibegM:&tbnh=118&tbnw=111&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://blog.800hightech.com/wp-content/uploads/virus-alert.jpg&imgrefurl=http://blog.800hightech.com/worst-computer-viruses-ever/2956/&usg=__JN9nv6eYuXvQ3oAGN9v3QShYVTU=&h=250&w=250&sz=39&hl=en&start=22&um=1&tbnid=lql9meKLx6XPHM:&tbnh=111&tbnw=111&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://farm1.static.flickr.com/19/117068850_269680fff1.jpg&imgrefurl=http://www.flickr.com/photos/aaskov/117068850/&usg=__HNjsCG6nfWPophLt7ZRTQ72p4KU=&h=375&w=500&sz=100&hl=en&start=21&um=1&tbnid=3WoHgocylnjKoM:&tbnh=98&tbnw=130&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=13&tbnid=2XkJGnVGQEnkbM:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=14&tbnid=bC8j_34i7aXdVM:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&ndsp=20&imgtype=i_similar&sa=X&ei=7-n7SoOpBYP-7AOR9vyPAg&ct=img-sim-l&oi=image_sil&resnum=1&tbnid=3WoHgocylnjKoM:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&ndsp=20&imgtype=i_similar&sa=X&ei=7-n7SoOpBYP-7AOR9vyPAg&ct=img-sim-l&oi=image_sil&resnum=2&tbnid=lql9meKLx6XPHM:
  • 8/14/2019 A Computer Virus is a Computer Program That Can Copy

    9/14

    Top 10 computer250 x 251 - 23k - jpgtechiezone.inFind similar images

    all computer500 x 600 - 113k - jpgrkm.com.auFind similar images

    1

    http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=17&tbnid=uhHNAfuN809-0M:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=18&tbnid=qobn7qjMMb_VGM:http://images.google.co.in/imgres?imgurl=http://www.rkm.com.au/Computer-Virus/computer-virus-pictures/IT-Office-Computer-500.jpg&imgrefurl=http://www.rkm.com.au/Computer-Virus/office-computer.html&usg=__EEygZydkCn75y9vqc0r_VItzNmg=&h=600&w=500&sz=113&hl=en&start=18&um=1&tbnid=qobn7qjMMb_VGM:&tbnh=135&tbnw=113&prev=/images%3Fq%3Dcomputer%2Bvirus%26hl%3Den%26um%3D1http://images.google.co.in/imgres?imgurl=http://techiezone.in/wp-content/uploads/2009/08/computer-virus11.jpg&imgrefurl=http://techiezone.in/&usg=__p7uug7eAEGIk_6IWYANmJ25lej0=&h=251&w=250&sz=23&hl=en&start=17&um=1&tbnid=uhHNAfuN809-0M:&tbnh=111&tbnw=111&prev=/images%3Fq%3Dcomputer%2Bvirus%26hl%3Den%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.beckersbakeryanddeli.com/images/Cakes/Computer%2520Virus.jpg&imgrefurl=http://www.beckersbakeryanddeli.com/picture.htm&usg=__Ky_-IVfQHfjUTlWFFj43ZoIUkHM=&h=378&w=336&sz=57&hl=en&start=27&um=1&tbnid=L4_3JDX2SaWl-M:&tbnh=122&tbnw=108&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.ecliptic.ch/Stock/Detail/FV1645_computer_virus.jpg&imgrefurl=http://www.ecliptic.ch/Stock/Detail/FV1645_computer_virus.html&usg=__r-NjwvAIqKN0XhlSG6Vgbg2pz7g=&h=602&w=800&sz=96&hl=en&start=26&um=1&tbnid=TJHzImbpatWyjM:&tbnh=108&tbnw=143&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.geraldtan.com/friends/other/sars_computer_virus-3.jpg&imgrefurl=http://www.geraldtan.com/friends/misc1.html&usg=__-KS-ntoif0SlJjZnC2QXxJQ1SHM=&h=704&w=532&sz=74&hl=en&start=25&um=1&tbnid=Qdt5btJNEvj5AM:&tbnh=140&tbnw=106&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/images?hl=en&um=1&q=computer+virus&ndsp=20&imgtype=i_similar&sa=X&ei=7-n7SoOpBYP-7AOR9vyPAg&ct=img-sim-l&oi=image_sil&resnum=5&tbnid=Qdt5btJNEvj5AM:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&ndsp=20&imgtype=i_similar&sa=X&ei=7-n7SoOpBYP-7AOR9vyPAg&ct=img-sim-l&oi=image_sil&resnum=6&tbnid=TJHzImbpatWyjM:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&ndsp=20&imgtype=i_similar&sa=X&ei=7-n7SoOpBYP-7AOR9vyPAg&ct=img-sim-l&oi=image_sil&resnum=7&tbnid=L4_3JDX2SaWl-M:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=17&tbnid=uhHNAfuN809-0M:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&aq=9&oq=com&imgtype=i_similar&sa=X&ei=fOn7SqiOFtOMkAXdn4COBQ&ct=img-sim-l&oi=image_sil&resnum=18&tbnid=qobn7qjMMb_VGM:
  • 8/14/2019 A Computer Virus is a Computer Program That Can Copy

    10/14

    23456789 10 Next

    Virus ABCs

    One of the biggest fears amongnew computer users is beinginfected by a computer virus orprograms designed to destroytheir personal data. Viruses aremalicious software programs thathave been designed by othercomputer users to causedestruction and havoc on acomputer and spread themselvesto other computers where theycan repeat the process.

    Once the virus is made, it is oftendistributed through shareware,pirated software, e-mail, P2Pprograms, or other programswhere users share data.

    # A B C D E FG H I J K L MN O P Q R S TU V W X Y Z

    COMMON VIRUSESTHIS MONTHS VIRUSES

    A computer virus is a softwareprogram that was first written Rich Skrentain 1982 who was a 15-year old high school student. Known as The ElkCloner this virus spread to other computers by monitoring the floppydrive and copying itself to any floppy diskette that was inserted into thecomputer. Once a floppy diskette became infected it would infect allother computers that disk was inserted into, each computer that wasinfected would then infect every floppy diskettes inserted into it. Acomputer that was infected would also display a short poem on every50th boot.

    Computer users can help protect themselves against computer viruses,malware, and other computer security threats by installing an antivirusprotection program.

    Also see our virus question and answer section for other commonquestions about computer viruses.

    http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=20&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=40&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=60&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=80&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=100&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=120&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=140&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=160&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=180&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=20&ndsp=20http://images.google.co.in/imgres?imgurl=http://techtips.nytechsllc.com/wp-content/uploads/2007/12/pic3.jpg&imgrefurl=http://techtips.nytechsllc.com/tag/virus/&usg=__hwLriSjIf2Gmr6FzetGZjkH-Dmc=&h=313&w=345&sz=19&hl=en&start=31&um=1&tbnid=XwI50-zKmD4TJM:&tbnh=109&tbnw=120&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://www.computerhope.com/v09.htmhttp://www.computerhope.com/va.htmhttp://www.computerhope.com/vb.htmhttp://www.computerhope.com/vc.htmhttp://www.computerhope.com/vd.htmhttp://www.computerhope.com/ve.htmhttp://www.computerhope.com/vf.htmhttp://www.computerhope.com/vg.htmhttp://www.computerhope.com/vh.htmhttp://www.computerhope.com/vi.htmhttp://www.computerhope.com/vj.htmhttp://www.computerhope.com/vk.htmhttp://www.computerhope.com/vl.htmhttp://www.computerhope.com/vm.htmhttp://www.computerhope.com/vn.htmhttp://www.computerhope.com/vo.htmhttp://www.computerhope.com/vp.htmhttp://www.computerhope.com/vq.htmhttp://www.computerhope.com/vr.htmhttp://www.computerhope.com/vs.htmhttp://www.computerhope.com/vt.htmhttp://www.computerhope.com/vu.htmhttp://www.computerhope.com/vv.htmhttp://www.computerhope.com/vw.htmhttp://www.computerhope.com/vx.htmhttp://www.computerhope.com/vy.htmhttp://www.computerhope.com/vz.htmhttp://www.computerhope.com/vcommon.htmhttp://www.computerhope.com/vmonth.htmhttp://www.computerhope.com/jargon/s/software.htmhttp://www.computerhope.com/jargon/p/program.htmhttp://www.computerhope.com/history/198090.htmhttp://images.google.co.in/imgres?imgurl=http://static.howstuffworks.com/gif/worst-computer-viruses-1.jpg&imgrefurl=http://computer.howstuffworks.com/worst-computer-viruses.htm&usg=__K5iA_fdWImAVkWlOJwY4eyd_N40=&h=361&w=400&sz=17&hl=en&start=35&um=1&tbnid=I0a8Da-mkZ6gcM:&tbnh=112&tbnw=124&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://i394.photobucket.com/albums/pp23/phaoloo/m11/computer-virus.png&imgrefurl=http://www.ezineaz.com/2008/11/how-to-scan-virus-effectively.html&usg=__z7mSNBSrvzhVl-g8A_j8I6D-SV4=&h=375&w=500&sz=139&hl=en&start=33&um=1&tbnid=g17UsfBXxShjkM:&tbnh=98&tbnw=130&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://www.computerhope.com/vqanda.htmhttp://images.google.co.in/imgres?imgurl=http://i394.photobucket.com/albums/pp23/phaoloo/m11/computer-virus.png&imgrefurl=http://www.ezineaz.com/2008/11/how-to-scan-virus-effectively.html&usg=__z7mSNBSrvzhVl-g8A_j8I6D-SV4=&h=375&w=500&sz=139&hl=en&start=33&um=1&tbnid=g17UsfBXxShjkM:&tbnh=98&tbnw=130&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://www.computerhope.com/vqanda.htmhttp://images.google.co.in/imgres?imgurl=http://4.bp.blogspot.com/_RX24owhhI6A/SeQnBhMbaDI/AAAAAAAAABA/4jwUgAK2jss/s400/computer%2Bvirus%2Bpic%2B2%2Blarge.jpg&imgrefurl=http://how-to-stop-computer-viruses.blogspot.com/&usg=__WXInDtm019ddaTB0H3EMVqUHpEY=&h=298&w=398&sz=24&hl=en&start=34&um=1&tbnid=43DDQ8tETLWmwM:&tbnh=93&tbnw=124&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://4.bp.blogspot.com/_RX24owhhI6A/SeQnBhMbaDI/AAAAAAAAABA/4jwUgAK2jss/s400/computer%2Bvirus%2Bpic%2B2%2Blarge.jpg&imgrefurl=http://how-to-stop-computer-viruses.blogspot.com/&usg=__WXInDtm019ddaTB0H3EMVqUHpEY=&h=298&w=398&sz=24&hl=en&start=34&um=1&tbnid=43DDQ8tETLWmwM:&tbnh=93&tbnw=124&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://i394.photobucket.com/albums/pp23/phaoloo/m11/computer-virus.png&imgrefurl=http://www.ezineaz.com/2008/11/how-to-scan-virus-effectively.html&usg=__z7mSNBSrvzhVl-g8A_j8I6D-SV4=&h=375&w=500&sz=139&hl=en&start=33&um=1&tbnid=g17UsfBXxShjkM:&tbnh=98&tbnw=130&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://static.howstuffworks.com/gif/worst-computer-viruses-1.jpg&imgrefurl=http://computer.howstuffworks.com/worst-computer-viruses.htm&usg=__K5iA_fdWImAVkWlOJwY4eyd_N40=&h=361&w=400&sz=17&hl=en&start=35&um=1&tbnid=I0a8Da-mkZ6gcM:&tbnh=112&tbnw=124&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://4.bp.blogspot.com/_RX24owhhI6A/SeQnBhMbaDI/AAAAAAAAABA/4jwUgAK2jss/s400/computer%2Bvirus%2Bpic%2B2%2Blarge.jpg&imgrefurl=http://how-to-stop-computer-viruses.blogspot.com/&usg=__WXInDtm019ddaTB0H3EMVqUHpEY=&h=298&w=398&sz=24&hl=en&start=34&um=1&tbnid=43DDQ8tETLWmwM:&tbnh=93&tbnw=124&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://i394.photobucket.com/albums/pp23/phaoloo/m11/computer-virus.png&imgrefurl=http://www.ezineaz.com/2008/11/how-to-scan-virus-effectively.html&usg=__z7mSNBSrvzhVl-g8A_j8I6D-SV4=&h=375&w=500&sz=139&hl=en&start=33&um=1&tbnid=g17UsfBXxShjkM:&tbnh=98&tbnw=130&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://techtips.nytechsllc.com/wp-content/uploads/2007/12/pic3.jpg&imgrefurl=http://techtips.nytechsllc.com/tag/virus/&usg=__hwLriSjIf2Gmr6FzetGZjkH-Dmc=&h=313&w=345&sz=19&hl=en&start=31&um=1&tbnid=XwI50-zKmD4TJM:&tbnh=109&tbnw=120&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://activ-antivirus.com/images/av7.jpg&imgrefurl=http://activ-antivirus.com/mandatory-tool.html&usg=__RnbADjs2UWRbKLdMAxToff844M8=&h=252&w=250&sz=12&hl=en&start=30&um=1&tbnid=Kg00Kb3MO0mZoM:&tbnh=111&tbnw=110&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.ebooktechie.com/wp-content/uploads/2009/01/pc-virus.jpg&imgrefurl=http://www.ebooktechie.com/blogging/a-month-of-absence-with-trojan/&usg=__BZsv4FHO7vkCjuHa73JVXOCk-U8=&h=480&w=299&sz=32&hl=en&start=29&um=1&tbnid=6cZ5oih3Ref89M:&tbnh=129&tbnw=80&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/images?hl=en&um=1&q=computer+virus&ndsp=20&imgtype=i_similar&sa=X&ei=7-n7SoOpBYP-7AOR9vyPAg&ct=img-sim-l&oi=image_sil&resnum=9&tbnid=6cZ5oih3Ref89M:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&ndsp=20&imgtype=i_similar&sa=X&ei=7-n7SoOpBYP-7AOR9vyPAg&ct=img-sim-l&oi=image_sil&resnum=10&tbnid=Kg00Kb3MO0mZoM:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&ndsp=20&imgtype=i_similar&sa=X&ei=7-n7SoOpBYP-7AOR9vyPAg&ct=img-sim-l&oi=image_sil&resnum=11&tbnid=XwI50-zKmD4TJM:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=20&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=40&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=60&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=80&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=100&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=120&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=140&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=160&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=180&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=20&ndsp=20http://www.computerhope.com/v09.htmhttp://www.computerhope.com/va.htmhttp://www.computerhope.com/vb.htmhttp://www.computerhope.com/vc.htmhttp://www.computerhope.com/vd.htmhttp://www.computerhope.com/ve.htmhttp://www.computerhope.com/vf.htmhttp://www.computerhope.com/vg.htmhttp://www.computerhope.com/vh.htmhttp://www.computerhope.com/vi.htmhttp://www.computerhope.com/vj.htmhttp://www.computerhope.com/vk.htmhttp://www.computerhope.com/vl.htmhttp://www.computerhope.com/vm.htmhttp://www.computerhope.com/vn.htmhttp://www.computerhope.com/vo.htmhttp://www.computerhope.com/vp.htmhttp://www.computerhope.com/vq.htmhttp://www.computerhope.com/vr.htmhttp://www.computerhope.com/vs.htmhttp://www.computerhope.com/vt.htmhttp://www.computerhope.com/vu.htmhttp://www.computerhope.com/vv.htmhttp://www.computerhope.com/vw.htmhttp://www.computerhope.com/vx.htmhttp://www.computerhope.com/vy.htmhttp://www.computerhope.com/vz.htmhttp://www.computerhope.com/vcommon.htmhttp://www.computerhope.com/vmonth.htmhttp://www.computerhope.com/jargon/s/software.htmhttp://www.computerhope.com/jargon/p/program.htmhttp://www.computerhope.com/history/198090.htmhttp://www.computerhope.com/vqanda.htm
  • 8/14/2019 A Computer Virus is a Computer Program That Can Copy

    11/14

    How computer viruses are contracted

    In the past the majority of computer viruses were contracted from userssharing data using floppy diskettes. However, with the increasedpopularity of the Internet most computer viruses are contracted today

    through e-mail and by downloading software over the Internet or P2Psharing.

    See document CH001045 for additional information about how yourcomputer could become infected with a virus.

    Virus properties

    Below is a listing of some of the different properties a computer virus iscapable of having and what the particular property is capable of doing.Keep in mind that not all viruses will have every one of these abilities.

    Your computer can be infected even if files are just copied. Becausesome viruses are memory resident, as soon as a diskette or program isloaded into memory, the virus then attaches itself into memory and thenis capable of infecting any file on the computer you have access to.

    Can be Polymorphic. Some viruses have the capability of modifying theircode, which means one virus could have various amounts of similarvariants. This is also true with e-mail viruses that change the subject orbody of the message to help from being detected.

    Can be memory or non-memory resident. As mentioned earlier a virus iscapable of being either memory resident where the virus first loads intomemory and then infects a computer or non-memory resident where thevirus code is only executed each time a file is opened.

    Can be a stealth virus. Stealth viruses will first attach itself to files onthe computer and then attack the computer; this causes the virus tospread more rapidly.

    Viruses can carry other viruses. Because viruses are only softwareprograms a virus may also carry other viruses making the virus more lethal

    and help the primary virus hide or assist the primary virus with infecting aparticular section of the computer.

    Can make the system never show outward signs. Some viruses can hidechanges made, such as when a file was last modified making the virusmore difficult to detect.

    http://www.computerhope.com/issues/ch001045.htmhttp://images.google.co.in/imgres?imgurl=http://technofriends.files.wordpress.com/2007/09/macro-virus-protection.jpg&imgrefurl=http://technofriends.wordpress.com/2007/09/20/computer-viruses-how-do-they-work/&usg=__Np869hU35T46d1ahSm21BZEzACM=&h=389&w=406&sz=36&hl=en&start=37&um=1&tbnid=FONPJVYeMME8GM:&tbnh=119&tbnw=124&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.computerrepairmaintenance.com/images/computer-virus.jpg&imgrefurl=http://www.computerrepairmaintenance.com/tag/computer-virus-infection&usg=__WXVjYWoGb70qGIcwO5eygimdx3o=&h=400&w=369&sz=52&hl=en&start=38&um=1&tbnid=D8-VnUw5VBWDfM:&tbnh=124&tbnw=114&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.computerrepairmaintenance.com/images/computer-virus.jpg&imgrefurl=http://www.computerrepairmaintenance.com/tag/computer-virus-infection&usg=__WXVjYWoGb70qGIcwO5eygimdx3o=&h=400&w=369&sz=52&hl=en&start=38&um=1&tbnid=D8-VnUw5VBWDfM:&tbnh=124&tbnw=114&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://billmullins.files.wordpress.com/2008/05/windowslivewriterae662fea53c3-a446computer-virus5.jpg&imgrefurl=http://billmullins.wordpress.com/2008/05/30/think-you-have-a-virus-some-solutions/&usg=__Uaa4c00p61Ddp4dK0vvp5nM7YYQ=&h=480&w=452&sz=88&hl=en&start=39&um=1&tbnid=ychW-1D_CuPELM:&tbnh=129&tbnw=121&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://technofriends.files.wordpress.com/2007/09/macro-virus-protection.jpg&imgrefurl=http://technofriends.wordpress.com/2007/09/20/computer-viruses-how-do-they-work/&usg=__Np869hU35T46d1ahSm21BZEzACM=&h=389&w=406&sz=36&hl=en&start=37&um=1&tbnid=FONPJVYeMME8GM:&tbnh=119&tbnw=124&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.computerrepairmaintenance.com/images/computer-virus.jpg&imgrefurl=http://www.computerrepairmaintenance.com/tag/computer-virus-infection&usg=__WXVjYWoGb70qGIcwO5eygimdx3o=&h=400&w=369&sz=52&hl=en&start=38&um=1&tbnid=D8-VnUw5VBWDfM:&tbnh=124&tbnw=114&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://billmullins.files.wordpress.com/2008/05/windowslivewriterae662fea53c3-a446computer-virus5.jpg&imgrefurl=http://billmullins.wordpress.com/2008/05/30/think-you-have-a-virus-some-solutions/&usg=__Uaa4c00p61Ddp4dK0vvp5nM7YYQ=&h=480&w=452&sz=88&hl=en&start=39&um=1&tbnid=ychW-1D_CuPELM:&tbnh=129&tbnw=121&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://technofriends.files.wordpress.com/2007/09/macro-virus-protection.jpg&imgrefurl=http://technofriends.wordpress.com/2007/09/20/computer-viruses-how-do-they-work/&usg=__Np869hU35T46d1ahSm21BZEzACM=&h=389&w=406&sz=36&hl=en&start=37&um=1&tbnid=FONPJVYeMME8GM:&tbnh=119&tbnw=124&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.computerrepairmaintenance.com/images/computer-virus.jpg&imgrefurl=http://www.computerrepairmaintenance.com/tag/computer-virus-infection&usg=__WXVjYWoGb70qGIcwO5eygimdx3o=&h=400&w=369&sz=52&hl=en&start=38&um=1&tbnid=D8-VnUw5VBWDfM:&tbnh=124&tbnw=114&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://billmullins.files.wordpress.com/2008/05/windowslivewriterae662fea53c3-a446computer-virus5.jpg&imgrefurl=http://billmullins.wordpress.com/2008/05/30/think-you-have-a-virus-some-solutions/&usg=__Uaa4c00p61Ddp4dK0vvp5nM7YYQ=&h=480&w=452&sz=88&hl=en&start=39&um=1&tbnid=ychW-1D_CuPELM:&tbnh=129&tbnw=121&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://technofriends.files.wordpress.com/2007/09/macro-virus-protection.jpg&imgrefurl=http://technofriends.wordpress.com/2007/09/20/computer-viruses-how-do-they-work/&usg=__Np869hU35T46d1ahSm21BZEzACM=&h=389&w=406&sz=36&hl=en&start=37&um=1&tbnid=FONPJVYeMME8GM:&tbnh=119&tbnw=124&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.computerrepairmaintenance.com/images/computer-virus.jpg&imgrefurl=http://www.computerrepairmaintenance.com/tag/computer-virus-infection&usg=__WXVjYWoGb70qGIcwO5eygimdx3o=&h=400&w=369&sz=52&hl=en&start=38&um=1&tbnid=D8-VnUw5VBWDfM:&tbnh=124&tbnw=114&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://technofriends.files.wordpress.com/2007/09/macro-virus-protection.jpg&imgrefurl=http://technofriends.wordpress.com/2007/09/20/computer-viruses-how-do-they-work/&usg=__Np869hU35T46d1ahSm21BZEzACM=&h=389&w=406&sz=36&hl=en&start=37&um=1&tbnid=FONPJVYeMME8GM:&tbnh=119&tbnw=124&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://technofriends.files.wordpress.com/2007/09/macro-virus-protection.jpg&imgrefurl=http://technofriends.wordpress.com/2007/09/20/computer-viruses-how-do-they-work/&usg=__Np869hU35T46d1ahSm21BZEzACM=&h=389&w=406&sz=36&hl=en&start=37&um=1&tbnid=FONPJVYeMME8GM:&tbnh=119&tbnw=124&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.computerrepairmaintenance.com/images/computer-virus.jpg&imgrefurl=http://www.computerrepairmaintenance.com/tag/computer-virus-infection&usg=__WXVjYWoGb70qGIcwO5eygimdx3o=&h=400&w=369&sz=52&hl=en&start=38&um=1&tbnid=D8-VnUw5VBWDfM:&tbnh=124&tbnw=114&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://billmullins.files.wordpress.com/2008/05/windowslivewriterae662fea53c3-a446computer-virus5.jpg&imgrefurl=http://billmullins.wordpress.com/2008/05/30/think-you-have-a-virus-some-solutions/&usg=__Uaa4c00p61Ddp4dK0vvp5nM7YYQ=&h=480&w=452&sz=88&hl=en&start=39&um=1&tbnid=ychW-1D_CuPELM:&tbnh=129&tbnw=121&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://billmullins.files.wordpress.com/2008/05/windowslivewriterae662fea53c3-a446computer-virus5.jpg&imgrefurl=http://billmullins.wordpress.com/2008/05/30/think-you-have-a-virus-some-solutions/&usg=__Uaa4c00p61Ddp4dK0vvp5nM7YYQ=&h=480&w=452&sz=88&hl=en&start=39&um=1&tbnid=ychW-1D_CuPELM:&tbnh=129&tbnw=121&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://www.computerrepairmaintenance.com/images/computer-virus.jpg&imgrefurl=http://www.computerrepairmaintenance.com/tag/computer-virus-infection&usg=__WXVjYWoGb70qGIcwO5eygimdx3o=&h=400&w=369&sz=52&hl=en&start=38&um=1&tbnid=D8-VnUw5VBWDfM:&tbnh=124&tbnw=114&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/imgres?imgurl=http://technofriends.files.wordpress.com/2007/09/macro-virus-protection.jpg&imgrefurl=http://technofriends.wordpress.com/2007/09/20/computer-viruses-how-do-they-work/&usg=__Np869hU35T46d1ahSm21BZEzACM=&h=389&w=406&sz=36&hl=en&start=37&um=1&tbnid=FONPJVYeMME8GM:&tbnh=119&tbnw=124&prev=/images%3Fq%3Dcomputer%2Bvirus%26ndsp%3D20%26hl%3Den%26sa%3DN%26start%3D20%26um%3D1http://images.google.co.in/images?hl=en&um=1&q=computer+virus&ndsp=20&imgtype=i_similar&sa=X&ei=7-n7SoOpBYP-7AOR9vyPAg&ct=img-sim-l&oi=image_sil&resnum=17&tbnid=FONPJVYeMME8GM:http://images.google.co.in/images?hl=en&um=1&q=computer+virus&ndsp=20&imgtype=i_similar&sa=X&ei=7-n7SoOpBYP-7AOR9vyPAg&ct=img-sim-l&oi=image_sil&resnum=19&tbnid=ychW-1D_CuPELM:http://www.computerhope.com/issues/ch001045.htm
  • 8/14/2019 A Computer Virus is a Computer Program That Can Copy

    12/14

    Can stay on the computer even if the computer is formatted. SomeViruses have the capability of infecting different portions of the computersuch as the CMOS battery or master boot record. Finally, if a computer iscompletely erased and the virus is on a backup disk it can easily re-infectthe computer.

    How viruses may affect files

    Viruses can affect any files; however, usually attack .com, .exe,.sys, .bin, .pif or any data files - Viruses have the capability of infectingany file; however, will generally infect executable files or data files, suchas word or excel documents that are opened frequently and allow thevirus to try infecting other files more often.

    Increase the files size - When infecting files, virtues will generallyincrease the size of the file; however, with more sophisticated viruses

    these changes can be hidden.

    It can delete files as the file is run - Because most files are loaded intomemory, once the program is in memory the virus can delete the file usedto execute the virus.

    It can corrupt files randomly - Some destructive viruses are not designedto destroy random data but instead randomly delete or corrupt files.

    It can cause write protect errors when executing .exe files from awrite protected disk - Viruses may need to write themselves to files that

    are executed; because of this, if a diskette is write protected, you mayreceive a write protection error.

    It can convert .exe files to .com files - Viruses may use a separate file torun the program and rename the original file to another extension so theexe is run before the com.

    It can reboot the computer when executed - Numerous computerviruses have been designed to cause a computer to reboot, freeze, orperform other tasks not normally exhibited by the computer.

    What viruses may do to a computer

    Below are different issues you may experience when you are infectedwith a virus. Keep in mind that you also may be experiencing any of thebelow issues by another computer related issue and not a virus.

    Deleted files. Various messages in files or on programs.

    http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=0&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=0&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=40&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=60&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=80&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=100&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=120&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=140&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=160&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=180&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=200&ndsp=20http://images.google.co.in/images?hl=en&um=1&q=computer+virus&sa=N&start=40&ndsp=20
  • 8/14/2019 A Computer Virus is a Computer Program That Can Copy

    13/14

    Changes volume label. Marks clusters as bad in the FAT. Randomly overwrites sectors on the hard disk. Replaces the MBR with own code. Create more than one partition.

    Attempts to access the hard disk drive, which can result in errormessages such as: Invalid drive specification. Causes cross-linked files. Causes a "sector not found" error. Cause the system to run slow. Logical partitions created, partitions decrease in size. A directory may be displayed as garbage. Directory order may be modified so files, such as COM files, will start at

    the beginning of the directory. Cause Hardware problems such as keyboard keys not working, printer

    issues, modem issues etc.

    Disable ports such as LPT or COM ports. Caused keyboard keys to be remapped. Alter the system time / date. Cause system to hang or freeze randomly. Cause activity on HDD or FDD randomly. Increase file size.

    Computer Viruses

    Boot Sector viruses: A boot sector virus infects diskettes and hard drives. All disks and hard

    drives contain smaller sections called sectors. The first sector is called the boot. The boot carries

    the Mater Boot Record (MBR). MBR functions to read and load the operating system. So, if a

    virus infects the boot or MBR of a disk, such as a floppy disk, your hard drive can become

    infected, if you re-boot your computer while the infected disk is in the drive. Once your hard drive

    is infected all diskettes that you use in your computer will be infected. Boot sector viruses often

    spread to other computers by the use of shared infected disks and pirated software applications.

    The best way to disinfect your computer of the boot sector virus is by using antivirus software.

    Program viruses: A program virus becomes active when the program file (usually with

    extensions .BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is opened. Once active, the virus

    will make copies of itself and will infect other programs on the computer.

    Multipartite viruses: A multipartite virus is a hybrid of a Boot Sector and Program viruses. It

    infects program files and when the infected program is active it will affect the boot record. So the

    next time you start up your computer it'll infect your local drive and other programs on your

    computer.

    http://www.computerhope.com/jargon/l/lpt.htmhttp://www.computerhope.com/jargon/h/harddriv.htmhttp://www.computerhope.com/jargon/f/fdd.htmhttp://www.computerhope.com/jargon/l/lpt.htmhttp://www.computerhope.com/jargon/h/harddriv.htmhttp://www.computerhope.com/jargon/f/fdd.htm
  • 8/14/2019 A Computer Virus is a Computer Program That Can Copy

    14/14

    Stealth viruses: A stealth virus can disguise itself by using certain tactics to prevent being

    detected by antivirus software. These tactics include altering its file size, concealing itself in

    memory, and so on. This type of virus is nothing new, in fact, the first computer virus, dubbed

    Brain, was a stealth virus. A good antivirus should be able to detect a stealth virus lurking on your

    hard drive by checking the areas the virus infected and evidence in memory.

    Polymorphic viruses: A polymorphic virus acts like a chameleon, changing its virus signature

    (also known as binary pattern) every time it multiples and infects a new file. By changing binary

    patterns, a polymorphic virus becomes hard to detect by an antivirus program.

    Macro Viruses: A macro virus is programmed as a macro embedded in a document. Many

    applications, such as Microsoft Word and Excel, support macro languages. Once a macro virus

    gets on to your computer, every document you produce will become infected. This type of virus is

    relatively new and may slip by your antivirus software if you don't have the most recent version

    installed