What is computer Viruses and One Reason Why People Make Them

What are computer Viruses, and what is One Reason Why People Make Them?

Over recent years, computers have become the same as viruses, and viruses don’t show any signs of becoming extinct remove any time soon. In recent news, report that “Before the month is even ended, April has set evidence for virus emails. In the past, we would be contented in telling new computer users not to worry about computer viruses and that catching a computer virus is rare. Today that will be some of the worst advice we could give anyone. Today as reported in countless news reports, computer viruses are rampant, and they are very problematic. This article will describe what computer viruses are and then point you in the direction of some rather special protection and prevention should do.

In short, a computer virus is a software program designed to destroy a computer or steal user data. It attacks computers via distribution, often unknowingly through email attachments from an unknown source, software downloads from un-trusted sources, and even some types of advanced website scripting. Viruses that destroy data are called Trojan horses, viruses that explode their attacks are known as bombs, and viruses that duplicate themselves are known as worms. Some viruses are a combination of each other viruses. However, they can be further identified according to where they are located on a computer.

A virus originating from the boot sector of a computer is a boot sector virus, and this nasty devil does its dirty work the moment a computer is turned on. A virus that attaches itself to infect other programs is a file virus and activates the moment that an infected program starts its,s crashers. File viruses may also be referred to as sponging viruses; on the other hand, should a virus work from both the boot sector and from an infected program, the virus is then called a multipartite virus.

Why viruses exist remains a mystery.

On the other hand, we had privy access to the mind behind a virus programmer who explained the motivation behind his destructive inclination. It seems that this person had a deep grudge against a popular computer and online service, which shall remain unnamed. In this hacker’s mind, the online service failed to do a quality job in protecting younger ones from online smut, and as retaliation but he created and distributed a virus to as many file libraries of this service as he could. He intended to disable the computers of the online service’s users so much that they would not be able to connect for days. In his mind, the loss of connection means loss of revenue for the online service providers.

Although the malicious code that this person generated may have worked for a small percentage of computer users, sufficed to say, the online service continued on and still exists today. Despite his motivation or intention, his efforts were null, all in vain.

We will not be surprised to learn if other motivations behind spreading viruses were similar to this person’s, but that does not justify viruses’ damage. Innocent people become pawns for the evil plans of others who have convinced themselves they are doing the righting.

We were protecting a computer from getting a virus or cleaning a virus from a computer system once infected requires using antivirus software. But maybe something else we can do. Perhaps you will hear they will make an effort to educate the people who won’t put viruses into the public about ways to display dissatisfaction with a service or product that does not involve yourself harming innocent people. In that so, we can just reduce the number of virus news stories and protect our investments at the same time. Read also Basics of Web usability.

Ways That Computer Viruses Spread

For a computer virus or similar program to have any significant impact, it must be able to spread from one computer to another. They are specially designed to get access to parts of your computer system software that allow for communication with other compares. Below is a discussion of some of the most common methods.

Boot Infectors

All disks like hard disk, floppy, CD, DVD, and flash drive contains a boot sector whether it is a bootable disk or not. When you turn on your personal computer, it looks for boot information. If the computer sees a disk with boot information, it reads that information and uses it to start the computer properly. If, for some reason, that boot information gets infected with a virus, the virus is activated and possibly transferred to the computer’s hard drive if the infection was on a flash drive, for example.

Once the boot code on the hard drive is infected, the virus will be loaded into your computer system memory every time you start your computer. From memory, the boot virus can travel to any and every drive that is put into your computer. This is how the infection spreads to other computers.

Most boot viruses will be on a system for a long time without causing any problems, simply existing to spread themselves. Regularly such viruses are developing to activate their bad behavior on a specific date Halloween for example. Some nasty boot viruses will destroy the boot information or force a complete format of the hard drive immediately after they get into a computer which will move the dish to crash. You may like How To Start Your Career In Information Technology beginner

Program Infectors

When infected software is run, the virus activates itself and is loaded into the computer’s memory. While the virus is in memory, any new software file you run can also become infected. This means that there will be increasingly more software on your computer system that is infected. Multiple infections are widespread and will undoubtedly cause computer system problems.

Program files may function without any problems. They will work perfectly for some time, but eventually, they will have issues, or multiple infections bring the entire computer system to crash. The program’s data may be the first sign of virus infection, such as saving files without proper names or incomplete data.

Viruses of this type are regularly designed to seek out programs that are used to share information between users or computers, such as email applications, screen savers, office document Macros, self-extracting compressed files, and others. Also, read Some Basic Changes To Make In Your Internet Explorer Options.

Through email attachments

Most of the dangerous viruses are primarily spread through email attachment files that can be sent along with an email message. In such cases, the user of a viruses infected computer unknowingly attaches an infected file to an email message and then sends the email to someone you know or a colleague. When the email is received, the virus is launched when the file attachment is opened, as a result infecting a new computer. Email messages with attachments, automated greeting cards, jokes, photographs, spreadsheets, and many more all have been documented to contain virus files.

More and more regularly, mass mailing email worms or viruses are being released. These attacks AUTOMATICALLY scan your computer’s files for any email address it can find and then uses your email application to AUTOMATICALLY send the infected file to any email address found in any file on your computer, not just email message files. Read also Things you must do if you want to avoid Spyware.

It is vital to take note of the emails that you open to make sure that they do not contain harmful viruses. Even emails from family or friends can have a virus if that person’s computer is infected. This is where antivirus software would be beneficial in detecting if there is a virus in any incoming messages.

Leave a Comment

Your email address will not be published.

Scroll to Top