what is computer virus and how to protect yourself from viruses


Viruses

what is computer virus techeeINDIA
techeeINDIA



Computervirus is a malicious program that requires a host and is designed to make asystem sick, just like a real virus. Viruses can spread from computer tocomputer, and they are far more malicious. Broadly three types if viruses are:-



1.Fileinfectors – connect themselves to a program file.


2.Boot sector viruses –deploy themselves on the beginning tracks of a hard drive.


3.Macro viruses – infect datafiles.


Mostviruses are unfold by email attachments and heat them to be suspicious of anyfiles connected to unsolicited messages. The following are traits of acomputer viruses.


ØIt is capable of replicate.


ØIt calls for a host program as a carrier.


ØIt is activated by means of external action.


ØIts replication ability is restrained to the(virtual) device.



Howcomputer viruses spread?

Computerviruses flow from laptop to laptop with the aid of attaching themselves to documents or bootrecords of disks and diskettes. These days it isn't uncommon to find them ine-mail attachments and different programs that can be downloaded from the internet.


Avirus is a quite passive agent that can be travel from one file to anotherfile at the same computer if the infected file is completed, from computermemory to a document on disk, on a disk that is carried one computer to some other(some organizations limit floppy drives, thereby stopping users from copyinginformation onto their computers), on e-mail attachment executable files, andover a modem or community connection.


Damagethat viruses cause



what is computer virus techeeINDIA
techeeINDIA


Virusesmain objected is to make your gadget risky and cause harm to facts. Mainly thesecause damage in lots of methods: -


ØCan break record allocation tables (FAT) andlead to the corruption of an entire file device, ensuing inside the want to fullyreinstall and reload the machine.


ØCan create horrific sectors on the disk, destroyingparts of packages and files.


ØCan decreases the gap on tough disks byduplicating files.


ØCan layout specific tracks on the disks orformat the whole disk.


ØCan spoil precise executable documents andalter facts in information documents, inflicting a lack of integrity inside the records.


ØCan purpose the system to hold in order that it doesnot reply to any keyboard or mouse movements.







Trojanhorses

Atrojan horse is code hidden in a program which include a game or spreadsheet thatlooks safe to run but hidden aspect effects. When the program is run, it appears tofunction because the consumer expects, but in truely it's far destroying, unfavorable, oraltering records in the program in which to embed itself. An example of a Trojanhorse might be a Christmas executable that, while performed, pops up with ananimated determine of Santa Claus and a caption saying “Merry Christmas”. In thebackground, more code might be deleting documents or performing others maliciousactions.


HowTrojan horse spread

Trojanhorse normally are spread through email and change of disks and informationbetween computers. Worms can also unfold Trojan horses.


Damagecaused through Trojan Horses

Thedamage that Trojan horses motive is a whole lot similar to what a pandemic causes. Most ofthe time the customers are ignorant of the harm it's miles inflicting because of theTrojan horse’s protecting effects.


Worms: -


A bug is a software designed to duplicate.the application may additionally perform any sort of extra obligations as properly. The followingare traits of a computer virus:


Ø It is capable of replicate.


Ø It is self-contained and does not require ahost.


Ø It is activated by using advent method (it needsa multitasking gadget).


Ø If it is a community malicious program, it is able to replicateacross communication links.


Worms are program that run independentlyand tour from laptop to pc throughout community connections. Worms may additionally haveportions of themselves running on many specific computers. Worms do not changeother software, even though they will carry other code that does.



HowWorms Spread:-


Worms are self sustaining dealers capablepropagating themselves with out the use of every other program or intervention oraction by way of a consumer. Worms are discovered mainly on computers that are succesful ofmultitasking and are connected to community.


Damagethat Worms can cause:-


Most worms disrupt offerings and createsystem control trouble. Some worms scan for passwords and different loopholesand then send the records again to the attackers. In some reasons worms caninstall Trojan horses or viruses that reason harm to the machine.



Spam: -

Spam refers to digital direct mail orjunk new institution posting. Some human beings outline spam even more generally as anyunsolicited e mail. Merriam -Webster dictionary defines junk mail as unsolicited usuallycommercial e mail despatched to a big variety of addresses.


Avoidingspam: -


Ø One manner to help avoid junk mail or junk mail is tocreate a clear out that finds and does some thing to email that you suspect is spam.

Ø Another tip is not to register yourself withtrue identification to join things at the Internet. These places frequently share thate-mail address with different businesses that then send you spam.



How to shield against computer virus :-




what is computer virus techeeINDIA
techeeINDIA


Virus prevention isn't a tough undertaking.all you want to be is greater careful and make sure to lead virus loose computinglife.


Ø Never use a “foreign “disk or CD withoutscanning it for viruses.


Ø Always scan files downloaded from the internetor different assets.


Ø Never boot your PC from a floppy except youare sure that it's miles virus loose.


Ø Write defend your disks.


Ø Use licensed software program.


Ø Password guard your PC to prevent unattendedmodification.


Ø Make normal backups.


Ø Install and use antivirus software program.


Ø Keep antivirus software updated.  



                                       Jai Hind               

');());

0 Response to "what is computer virus and how to protect yourself from viruses"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel