Computer Virus is a program that copies itself, Computer virus can infect your computer and slowing down your computer. And virus also can spreads computer to computer. The person who sends out the computer virus may use networking of the internet. The computer virus also can be spread by via disk, CD, thauDVD or flash drive or other devices.
Usually, a virus is written to target a network file system or shared filet in order to spread from computer to computer using network. Worm or Trojan is slightly different from another virus it appears harmless, This is the type of virus which enters the programs exploits security hothatmay have spread through other networks or Internet users. Computer virus’ are usually small, which are design to spread from one computer to other computer and to enter and interfere Computer operation.
Virus might corrupt your windows or might delete the important data on your computer, Normaly virus can be spread through e-mails program to other computer which can even delete everything on the hard disk.
Often Computer viruses can be spread by attachments by e-mail massages or even can be instant massaging . that is why must never one a email which we dont know where it came from and who send it we may never know it could be virus.
Virus can be as attachments of funny images or video or files it can spread when u download to your computer from the internet.
HOW COMPUTER VIRUSES WORK
Virus can infect a small section of software or it will be there when the user open the program or runs the programs . It could be attached word or excel or other software programs it can be in any form or in any types of files.
Email viruses are totally different from the virus which uses email to infect computers. An attachment or files in a email that open or download from your email will be launch infection allowing to spread. An email virus cannot ifnfect your compur unless the malicious file is open.
A virus called Trojans can work by claiming a game file or other file to get inside.It could then erase the content that stored on your hard drive or other drives. Trojans do not replicate like a virus but worms is able to attack the security holes and then replicate in the network to spread to other computer which uses network.
Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service
COMPUTER IFFECTION
First thing you might not realize win32, kido, conficker, trojans orviruses have not got into your computer if u dont have Internet Security and other antivirus software.the ability of the program to get inside an operation system undetected . Depending on the infection, you may be greeted with a black or blue screen when the OS is unable to load; you will not be able to access any files, documents or other information on the computer.
If there is only one file infected, the computer may not be able to open the file . when shut down you may get massages that a program is still running but the program may have numbers and letters only. IT is most often not a program that you recongnise, even though it might state it is in the part of a system operation.
Task manager is to stop the program without result since the virus,trojan or malicious entity has the control it to continue the infecting the computer until it has run its course,rendering your computer ineffective.
WAYS TO SOLVE COMPUTER VIRUSES
THE WAYS TO PROTECT YOUR COMPUTER
Understanding what is virus and how is works the first step to obtaining the necessary protection of computer . Computer with the latest window. Window 7 have firewall , security updates / patches and windowa Defender.These devices are the first thing to protect your computer and they work as PC virus protection, but that is not enough to stop all the problems.
You need to find additional antivirus protection. Antivirus software such as Mac antivirus or Windows 7 antivirus are further protection programs that will stop computer viruses. They are a second line of defence, if you will. Antivirus software tends to block holes left by PC virus protection.
Hackers that encounters antivirus software will have to work harder to get through with thei computer viruses. Therefore you need not to worry about spending a lot of money for your anti-virus now day there many free anti-virus which can download in a secure web site which keeps your computer protected.
There many free anti-virus which is designed to automatic run an initial scan of the computer to see if your computer is effected. It will then remove any infections you might have. It may be unable to remove the entire infection, in which case it will quarantine the virus in a place where it can no longer affect other files on your computer. It will also try to repair any damage.
Other Protection Methods
By Downloading any antivirus software helps, But there is also other measures your own to keep malicious viruses. First thing never open an email attachment if u can’t identify the sender and also have your our own antivirus software runs a scan on the attachment in the event that the sender’s computer has been infected.
Second, do not download any items from a site you do not trust or that does not have the secured server symbol – a lock. Download only files you recognize, including music, movies and other online media.
Third, set up your wireless network security and obtain a mobile antivirus. An unsecure Internet connection is an invitation to hackers to try to download malicious threats. A mobile antivirus is also set up for wireless networks, whereas other antivirus software is meant for secured connections.
TYPE OF VIRUSES
Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed
Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.
Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.
The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.
Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.
The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive.
Examples of boot viruses include: Polyboot.B, AntiEXE.
Macro Virus
Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.
Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.
Directory Virus
Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus. Once infected it becomes impossible to locate the original files.
CONCLUSION
To keep our computer safe we need to anti — virus programs that stores the definition known as virus and malware program. To keep our anti-virus active we need to update and scan our computer every time we use computer.
Now it should be clear that how important to use a computer and keep it safe from viruses. and u should always full scan your computer for virus to prevent the loss of data. when ever u use a pendrive or external hard disk you must scan for viruses to keep your computer safe.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download