Saturday, May 23, 2020

A Computer Virus Is a Computer Program That Can Copy Itself

A computer virus is a computer program that can copy itself[1] and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[2][3] The term computer virus is sometimes†¦show more content†¦Slow infectors, on the other hand, are designed to infect hosts infrequently. Some slow infectors, for instance, only infect files when they are copied. Slow infectors are designed to avoid detection by limiting their actions: they are less likely to slow down a computer noticeably and will, at most, infrequently trigger anti-virus software that detects suspicious behavior by programs. The slow infector approach, however, does not seem very successful. Stealth Some viruses try to trick antivirus software by intercepting its requests to the operating system. A virus can hide itself by intercepting the antivirus software’s request to read the file and passing the request to the virus, instead of the OS. The virus can then return an uninfected version of the file to the antivirus software, so that it seems that the file is clean. Modern antivirus software employs various techniques to counter stealth mechanisms of viruses. The only completely reliable method to avoid stealth is to boot from a medium that is known to be clean Spyware is a type of malware that is installed on computers and collects little bits information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically,Show MoreRelatedComputer Viruses Essay example758 Words   |  4 PagesA computer virus program is altering program and it replicated itself by coping itself into other programs stored in a computer. The word virus is also commonly used broadly to include computer viruses, worms, and Trojan horse programs. For example, so-called anti-virus software will remove all three classes of these malicious programs. The first virus was born in the very beginning of 1970’s or even in the end of 1960’s although nobody was calling it a virus back then. Pervading animalRead MoreThe Dangers Facing Your Personal Computer1321 Words   |  5 PagesDid you know that your personal computer might be in danger? If you do not have proper protection for your computer it could potentially be attacked or may already have a virus! There are many different types of viruses out there and the amount of damage they do can vary. I’m going to inform you about what they are, what types there are, and how they can be prevented. Computer virus is the term that defines a class of programs that illegally explore a wide variety of systems. ItRead MoreAnnotated Bibliography On The Internet1366 Words   |  6 PagesProtocol 5 URL – Uniform Resource Locator 5 Virus 6 Trojan Horse 7 Worm 7 Differences between Computer Viruses 8 Bibliography 9 â€Æ' THE INTERNET Definition Of The Internet There were so many definition for the internet but the one that stand out most to me and gave me a clear understanding of the definition was form the (Collins English Dicitionary- Complete Unabridged) - â€Å"the internet- the single worldwide computer network that interconnects other computer networks, on which end user services, suchRead MoreCyber Attacks : A Huge Problem For Online Communities1231 Words   |  5 Pagesincreasingly popular methods to infect computer machines. Malware, also known as malicious software, is used by hackers, and criminals around the world to disrupt computer activities, and gain access to private, or important information in computer systems, and to gather that information illegally. There are countless forms of malicious software, and they can be located everywhere, such as on widely known websites, advertisements being displayed, and more. Computer Viruses The first type of malwareRead MoreThe Origin Of The Internet999 Words   |  4 Pages â€Æ' Contents THE INTERNET 3 THE ORIGIN OF THE INTERNET 3 HOW THE INTERNET WORKS 3 HTML AND HOW IT WORKS 4 HTTP AND HOW IT WORKS 4 URL 4 VIRUS AND HOW IT WORKS 4 TROJAN HORSE AND HOW IT WORKS 5 COMPUTER WORM AND HOW IT WORK 5 THE DIFFERENCE BETWEEN A VIRUS, A WORM AND TROJAN HORSE 5 Bibliography 6 â€Æ' The internet is defined as systems of interconnected computer networks that are connect to several billions devices over the world. It is an international network of networks that consist of millionsRead MoreEthical And Social Issues Of Computer Viruses And Computer Sabotage1446 Words   |  6 PagesSocial Issues of Computer Viruses and Computer Sabotage Computer sabotage is a very dangerous form of computer crime. Computer sabotage is described as acts of malicious destruction to a computer or computer resource. Common forms of computer sabotage include the distribution of malicious and destructive programs such as that can cause damage not only to the software of a computer but also the hardware of a computer. â€Å"The computer saboteurs create tiny but destructive programs that cause seriousRead MoreEffect of Virus on Performance of Computer System1446 Words   |  6 PagesEFFECT OF VIRUS ON PERFORMANCE OF COMPUTER SYSTEM IN AN ORGANIZATION 1.0 INTRODUCTION AND BACKGROUND Computer is an advanced electronic device which manipulate data according to a set of instruction provided and generate the desired output, It can process both numerical and non-numerical (arithmetic and logical) calculations.. The two principal characteristics of a computer are: it responds to a specific set of instructions in a well-defined manner and it can execute aRead More Process Essay - How to Recognize and Eliminate Macro Viruses759 Words   |  4 Pages Imagine starting up your computer only to see the image on the screen melt while eerie music plays. The hard drive crunches away. What is it doing in there? Before you turn off the machine, most of your files have been deleted. Your computer is the victim of a computer virus. But where did the virus come from? It may have been that game you borrowed or, more likely, it came from an electronic document. Most viruses infect programs, but newer viruses can infect documents as well. ThisRead MoreHow Antivirus Effects Our Lives Essay examples1177 Words   |  5 Pagesantivirus is a program used to protect a computer from malware such as virus, Trojan horses, computer worms and other malicious programs. Besides from protecting a computer, the anti-virus offers many solutions to prevent new infections into your computer by scanning emails and files when they are being downloaded. An antivirus program is considered a security strategy. A computer virus is similar to a biological virus; it spreads from one computer to another just as the biological virus spreads fromRead MoreApplied Information Technology Host 1051288 Words   |  6 PagesHTTP? 4 What does URL stand for? 4 Computer Infections 5 What is a Virus? 5 How it works 5 What is a Trojan horse? 6 How it works 6 History 6 Where can they be found? 6 What is a Worm? 7 How it works 7 What happens when systems are infected 7 Differences between a Virus, a Trojan horse and a Worm 8 Bibliography 9 â€Æ' What is the Internet? The Internet is a worldwide communications system that allows millions of computers to exchange information. The Internet can also be defined as a worldwide collection

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.