The Viruses Your Computer Might Be Hiding

In easy terms, a virus can be specified as a computer system code that has worked its method into your computer system without your direct knowledge and permission. The code interacts with the OS of the computer including its memory and makes changes in the computer system without the support of the owner. Learn more here... In fact, most of the people are not conscious that they have been struck by a computer virus unless their computer slows down to a crawl and programs that previously opened within seconds start taking much longer to open. Most of the time, this occurs as the virus keeps duplicating itself and utilizes all the available computer memory for its dubious functions.

For the virus to duplicate itself, it needs to be allowed to perform its code in addition to write to its memory. This is why many of them must connect themselves to an executable file which forms part of a legitimate program so that when the user introduces the infected program the virus is automatically performed.

Network Viruses - These viruses spread fast if a Local Area Network exists and at times through the web. Occasionally they spread through shared drives and subfolders. After the virus infects a computer, it pays attention to the network to attack other victims. After it assaults the new computer on the network, it starts listening again to the network and repeats the cycle of infection. Nimda and SQL Slammer are the most powerful network viruses.

What Is a 'Computer Virus'? - Expert Q&A - About.com Tech

Stealth Viruses - These types of computer viruses tries to fool the anti-virus software application. It achieves that by intercepting its requests to the OS. It can hide itself from some antivirus software application and for that reason making it undetected to some antivirus software applications.

Resident Virus - These refers to all the viruses that inserts itself into the memory of a system after which it is free to take a variety of actions and run independently of the file that contaminated it. A resident virus acts in a similar way to a payload virus that takes an action after the execution of a file including it.

The Polymorphic Virus - This virus mutates gradually altering the code made use of to provide its payload. The virus has the capability to secure itself with a file encryption algorithm and will automatically change itself when specific conditions are not satisfied. The virus is rather evasive making it hard for the anti-viruses to discover it.

Most of the anti-viruses utilize codes to discover any virus. The fact that this virus alters its code is exactly what helps it to avoid detection.

Direct Action Virus - The virus works when the file including the virus is executed. Instantly after the payload has actually been transported, the virus becomes dominant however it will not impact the computer system unless the file is performed again. Although this virus may not be prolific, it has in the past influenced and harmed records. A fine example of this type of a file is the Vienna virus.

Macro Virus - These are viruses that are supported by performance application programs such as Microsoft Excel. They are actions based programs that utilize a particular macro program language making it possible for a virus to be hidden in the file. The virus is broad in regards to payload and the most typical one is Melissa.

Melissa is a word document which contains passwords to adult sites. The virus has the ability of attaching itself to Microsoft Outlook and immediately e-mails copies of itself to other mail recipients.

The history of computer viruses is as old as the computers itself. It is estimated that the very first computer virus was produced in the 1970s when computer networks were only offered in a few of the leading universities in the US. However, with the popularity of computer systems these viruses have become more prevalent. These days, viruses are made use of by advanced criminals to commit all type of digital criminal offenses consisting of stealing of identity, hacking of checking account, charge card and many other such digital criminal activities.

Viruses have grown in complexity and nowadays and are often used as part of a huge system to dedicate digital crimes. Most of the time, infected computers are utilized to carry out a distributed denial of service attack on websites. Bear in mind that some kinds of computer viruses can be harmful to PC systems while others can remain on the computer system without triggering significant damage. Having an upgraded version of an antivirus can assist to keep your computer system clean from these harmful programs.

Antivirus software offered in the market today can begin eliminating all the common viruses that generally contaminate the computer systems. It is recommended to purchase a superior anti-virus software application to make sure that your computer does not get infected in the first place as well as being capable of eliminating existing viruses.


There are no comments on this page.
Valid XHTML :: Valid CSS: :: Powered by WikkaWiki