Preview

Computer Viruses Compilation

Good Essays
Open Document
Open Document
563 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Viruses Compilation
Virus

- a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. A computer virus is an executable program. Depend on the nature of a virus, it may cause damage of your hard disk contents, and/or interfere normal operation of your computer.
By definition, a virus program is able to replicate itself. This means that the virus multiplies on a computer by making copies of itself. This replication is intentional; it is part of the virus program. In most cases, if a file that contains virus is executed or copied onto another computer, then that computer will also be "infected" by the same virus.
A virus can be introduced to a computer system along with any software program. For Internet users, this threat can come from downloading files through FTP (file transfer protocol), or referencing email attachments. (Please refer to our web page on Handling Email's File Attachments for details.)

What can Viruses do?
■ Slow down email. Viruses that spread by email, such asSobig, can generate so much email traffic that servers slow down or crash. Even if this doesn't happen, companies may react to the risk by shutting down servers anyway.
■ Steal confidential data. The Bugbear-D worm records the user's keystrokes, including passwords, and gives the virus writer access to them.
■ Use your computer to attack websites.
MyDoom used infected computers to flood the SCO software company's website with data, making the site unusable (a denial of service attack).
■ Let other users hijack your computer. Some viruses place“backdoor Trojans” on the computer, allowing the virus writer to connect to your computer and use it for their own purposes.
■ Corrupt data. The Compatable virus makes changes to the data in Excel spreadsheets.
■ Delete data. The Sircam worm may attempt to delete or overwrite the hard disk on a certain day.
■ Disable hardware. CIH, also known as Chernobyl, attempts to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    What the CIH virus did was temporarily disable the BIOS’s functionality. Without the BIOS initiated, a Windows machine simply will not boot. Users would try and reboot the machine from an .iso file placed on a floppy disk/CD/DVD/flash drive/etc. however once the damage is done, it can’t be reversed because the computer is designed to revert to the original BIOS code on the computer, not the correct BIOS from the outside source.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    * Scan all files and information contained on portable media and storage devices (such as DVDs, USB drives, floppy disks, etc.) for malware and malicious code prior to being used on any department information systems (such as laptops, PDAs, desktop computers, etc.).…

    • 932 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Good Essays

    A virus is a small infectious agent that replicates only inside the living cells of other organisms. A virus is a small parasite that cannot reproduce by itself. Once it infects a susceptible cell, however, a virus can direct the cell to produce many more viruses. Viruses can infect all types of life forms, such as animals and plants to microorganisms, including bacteria and archaea.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Good Essays

    * This virus can duplicate itself to no end. It will send itself ro everyone in your address book appearing as an email sent from your email address.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Malware Lifecycle

    • 463 Words
    • 2 Pages

    Next we will discuss malware what it is and how it affects us. Malware is any kind of unwanted software that is installed without your adequate consent. Viruses, worms, and Trojan horses are examples of malicious software that are often grouped together and referred to as malware. Cybercriminals sometimes try to trick you into downloading rogue (fake) security software that claims to protect you against malware. This rogue security software might ask you to pay for a fake product, install malware on your computer, or steal your personal information. To protect yourself from Malware it is important to do some of the following: make sure automatic updating is turned on to get all the latest security updates. Keep your firewall turned on. Don't open spam email messages or click links on suspicious…

    • 463 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cyp 3.3, Task 7

    • 1343 Words
    • 6 Pages

    A child or young person may unknowingly download viruses and malware; a programme that can attach itself to another programme, if this is opened through a spam email it can then damage or create files and generate unwanted behaviour to your computer.…

    • 1343 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    A virus has multiple meanings in our world but we are speaking in the terms of technology. A virus is something that has been put into the computer without the owners consent that is made to go through the information on the computer and take things from the computer without the owner's consent. There are many ways to prevent this from happening but with these preventions the person creating these viruses have created different forms of viruses to get around these defenses.…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ur mama

    • 659 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Files have a way of building up and can quickly use up your disk space. If you…

    • 392 Words
    • 2 Pages
    Satisfactory Essays