Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Keep The TechnoWorldInc.com Community Clean: Read Guidelines Here.
Recent Updates
[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[February 14, 2024, 02:00:39 PM]

[February 14, 2024, 02:00:39 PM]

[February 14, 2024, 02:00:39 PM]

[February 14, 2024, 02:00:39 PM]

[February 08, 2024, 10:26:18 AM]

[February 08, 2024, 10:26:18 AM]

[February 08, 2024, 10:26:18 AM]

[February 08, 2024, 10:26:18 AM]

[November 27, 2023, 06:32:12 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   MegaPixelShop
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Ethical Hacking / Security / Viruses » Viruses
  Computer Virus
Pages: [1]   Go Down
  Print  
Author Topic: Computer Virus  (Read 2040 times)
Daniel Franklin
TWI Hero
**********


Karma: 3
Offline Offline

Posts: 16647


View Profile Email
Computer Virus
« Posted: October 02, 2007, 02:33:41 PM »




Who can forget the way the world was frozen with the threat of the "Millennium Bug"? While people around the globe should have been counting down to a phenomenal celebration, we were too busy preparing for certain doom and gloom beset by a computer virus. Of course, the clock struck twelve on January 1, 2000 and a new millennium quietly began, bug-free.

Those unfortunate enough to have had to deal with a computer virus knows all too well the damage that can be done. From taking on annoying quirks, to erasing files, to completely obliterating computers or entire systems, the powerful effect of a computer virus is nothing to sneeze at. Computer viruses pose real threats that can be minimal, or can cause worldwide destruction.

In computer security technology circles, the definition of a computer virus is a "self-replicating program that spreads by inserting copies of itself into other executable code or documents". A computer virus behaves in a manner similar to a biological virus, which spreads by inserting itself into living cells.

Extending the analogy, the insertion of a computer virus into a program is termed as an "infection" and the infected file (or executable code that is not part of a file) is called a "host". Viruses are one of several types of malicious software, also known as "malware". The term "virus" is often extended to refer to worms, Trojan horses and other sorts of malware. These are less common than they used to be, however, so the inclusion of these types of malware can be confusing to computer users. This confusion can have serious implications, as it can lead to a focus on preventing one genre of malware over another, potentially leaving computers vulnerable to future damage. The basic rule holds that computer viruses can only damage software, not hardware.

Viruses have targeted in the following types of hosts:

* Boot sectors of floppy disks; hard disk partitions.

* Master boot record of a hard disk.

* Binary executable files (.COM-files and .EXE-files in MS-DOS; portable executable files in Microsoft Windows; ELF files in Linux).

* General-purpose script files (batch files in MS-DOS and Microsoft Windows; shell script files on Unix-like platforms).

* Application-specific script files (Telix scripts).

* Documents containing macros (Microsoft Word documents).

A computer virus by nature is destructive, but others are created solely for the annoyance factor. Some viruses pester computer users with a delayed payload, also known as a "bomb". For example, a bomb virus might display a message on a specific day, or wait until it has infected a certain number of hosts. A time bomb occurs on a particular date or time, and a logic bomb occurs when the computer user takes an action that triggers the bomb. However, the predominant negative effect of viruses continues to be their uncontrolled self-reproduction, which wastes or overwhelms computer resources.

To hinder the continuous spread of computer viruses, programmers have created anti-virus software. However, a fast infector can infect every potential host file that it's able to access. This presents a special problem to anti-virus software. A virus scanner will perform a system-wide scan, accessing every potential host file on the computer. If the virus scanner fails to notice that a virus exists in the computer's memory, the virus can "piggy-back" on the virus scanner, and infect every file that is scanned. Fast infectors rely on their incredible spreading rate. To combat the problem, certain anti-virus software programs, like the well-known Spyware, are expanding to cover worms and other threats.

Like the potential devastation of the Millennium Bug in 2000, computer viruses continue to present a real threat to single users and corporate networks alike.

Articles Source - Free Articles
About the Author

Lisa Moore contributes to several web magazines, on small business and technology and work from home subjects.

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.099 seconds with 25 queries.