Preview

SOURCES OF COMPUTER VIRUS

Good Essays
Open Document
Open Document
741 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SOURCES OF COMPUTER VIRUS
SOURCES OF COMPUTER VIRUS
Virus infection in Computers can be contacted through different means. Below are the commonest causes of Computer Virus attack.
1. Through the internet: The easiest and quickest means of spreading Computer Virus is through the internet. Basically through downloaded files and documents. When the source of a document is not trusted it should not be downloaded. If at all it will be downloaded it has to be thoroughly scanned for virus with a reliable anti-virus Software.
2. Through Email attachments: When the source of an email attachment is not known and trusted it should not be opened especially the messages of “get rich quickly”. Some of them are Scam and coded virus. This kind of offer is usually appealing and used as a bait to trap the unsuspecting public or computer user.
3. Removable Storage Devices: Going by the definition of a Computer Virus, it has the ability to replicate itself through every medium instructed in the coded software. One of the means of doing so is through a removable storage facility such as Floppy Disc, USB Flash drive, Memory cards etc. Before accepting any of these devices used on a system they should be scanned for Virus.
4. Through Bluetooth Transfer: Viruses can be contacted through a transfer of documents via a Bluetooth, once one of the Computers is infected with a Virus or the document so transferred. This called for the installation of a reliable anti- Virus
10 Signs Of A Computer With Virus
1. Your computer is running unusually slow
This could be a sign that you have malware on your computer. When this gets onto a machine, it can take away system resources and slow it down.
2. Your computer keeps displaying pop up messages
This is another sign that you may have malware or spyware installed on your computer. The pop up messages try to redirect you to other malicious sites or advertise to you. However, more fake antivirus software that wants you to pay money for it to remove any “threats” detected on your

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    1. What are the various types of malware? How do worms differ from viruses? Do Trojan…

    • 639 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Computer program that can copy itself and infect a computer. The term ‘computer virus’ is sometimes used as a catch-all phrase to include all types of malware, including true viruses.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Module 4 Blank Study Guide

    • 2907 Words
    • 12 Pages

    1. How does the spreading of a computer virus compare to the spreading of human viruses?…

    • 2907 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chipopo Research Paper

    • 343 Words
    • 2 Pages

    Accidentally I downloaded the virus called PUP.Chipopo on my Windows 10 computer and it is continuously popping browser screen with the annoying and unwanted ads. How to remove PUP.Chipopo? How to stop irritating ads? Why my computer is performing sluggishly?…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    As computers have evolved, so have the attacks against them. But before the Internet became so widely accessible, viruses spread mainly through floppy disks and other removable media. The following article will explore some of the most notorious email hacks and viruses from the past, to the present.…

    • 735 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Direct transmission occurs when someone comes in physical contact with the infected person. Droplets and airborne viruses can also spread through close contact with the infected individual or contaminated items. According to the CDC, the best way to prevent exposure to is avoid close contact with sick people. If you are sick, stay home from work to prevent the disease from spreading.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ur mama

    • 659 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It is transmitted when someone having infection shakes hand or sneezes or coughs or other physical contact. Some virus and bacteria have the power to live outside the body for a prolonged span of time and therefore, you can get infected by touching any object that is harboring the germs.…

    • 463 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Smallpox

    • 424 Words
    • 2 Pages

    Smallpox usually requires fairly prolonged face-to-face contact to spread. It's most often transmitted through the air by droplets that escape when an infected person coughs, sneezes or talks. In rare instances, airborne virus may spread farther, possibly through the ventilation system in a building, infecting people in other rooms or on other floors. Smallpox can also spread through contact with contaminated clothing and bedding, although the risk of infection from these sources is slight.…

    • 424 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    essay about email

    • 385 Words
    • 2 Pages

    (i) Emails may carry viruses. These are small programs that harm your computer system. They can read out your email address book and send themselves to a number of people around the world.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays