Which is the example of computer virus?
Virus (computer), a self-duplicating computer program that spreads from computer to computer, interfering with data and software. Just as biological viruses infect people, spreading from person to person, computer viruses infect personal computers (PCs) and servers, the computers that control access to a network of computers. Some viruses are mere annoyances, but others can do serious damage. Viruses can delete or change files, steal important information, load and run unwanted applications, send documents via electronic mail (e-mail), or even cripple a machine's operating system (OS), the basic software that runs the computer.
How infection occurs?
A virus can infect a computer in a number of ways. It can arrive on a floppy disk or inside an e-mail message. It can piggyback on files downloaded from the World Wide Web or from an Internet service used to share music and movies. Or it can exploit flaws in the way computers exchange data over a network. So-called blended-threat viruses spread via multiple methods at the same time. Some blended-threat viruses, for instance, spread via e-mail but also propagate by exploiting flaws in an operating system.
Traditionally, even if a virus found its way onto a computer, it could not actually infect the machine-or propagate to other machines-unless the user was somehow fooled into executing the virus by opening it and running it just as one would run a legitimate program. But a new breed of computer virus can infect machines and spread to others entirely on its own. Simply by connecting a computer to a network, the computer owner runs the risk of infection. Because the Internet connects computers around the world, viruses can spread from one end of the globe to the other in a matter of minutes.
Types of viruses
There are many categories of viruses, including parasitic or file viruses, bootstrap-sector, multipartite, macro, and script viruses. Then there are so-called computer worms, which have become particularly prevalent. A computer worm is a type of virus. However, instead of infecting files or operating systems, a worm replicates from computer to computer by spreading entire copies of itself. Parasitic or file viruses infect executable files or programs in the computer. These files are often identified by the extension .exe in the name of the computer file. File viruses leave the contents of the host program unchanged but attach to the host in such a way that the virus code is run first. These viruses can be either direct-action or resident. A direct-action virus selects one or more programs to infect each time it is executed. A resident virus hides in the computer's memory and infects a particular program when that program is executed. Bootstrap-sector viruses reside on the first portion of the hard disk or floppy disk, known as the boot sector. These viruses replace either the programs that store information about the disk's contents or the programs that start the computer. Typically, these viruses spread by means of the physical exchange of floppy disks. Multipartite viruses combine the abilities of the parasitic and the bootstrap-sector viruses, and so are able to infect either files or boot sectors. These types of viruses can spread if a computer user boots from an infected diskette or accesses infected files. Other viruses infect programs that contain powerful macro languages (programming languages that let the user create new features and utilities). These viruses, called macro viruses, are written in macro languages and automatically execute when the legitimate program is opened. Script viruses are written in script programming languages, such as VBScript (Visual Basic Script) and JavaScript. These script languages can be seen as a special kind of macro language and are even more powerful because most are closely related to the operating system environment. The 'ILOVEYOU' virus, which appeared in 2000 and infected an estimated 1 in 5 personal computers, is a famous example of a script virus. Strictly speaking, a computer virus is always a program that attaches itself to some other program. But computer virus has become a blanket term that also refers to computer worms. A worm operates entirely on its own, without ever attaching itself to another program. Typically, a worm spreads over e-mail and through other ways that computers exchange information over a network. In this way, a worm not only wreaks havoc on machines, but also clogs network connections and slows network traffic, so that it takes an excessively long time to load a Web page or send an e-mail.
Protection against viruses
Computer users can prepare for a viral infection by creating backups of legitimate original software and data files regularly so that the computer system can be restored if necessary. Viral infection can be prevented by obtaining software from legitimate sources or by using a quarantined computer-that is, a computer not connected to any network-to test new software. Plus, users should regularly install operating system (OS) patches, software updates that mend the sort of flaws, or holes, in the OS often exploited by viruses. Patches can be downloaded from the Web site of the operating system's developer. However, the best prevention may be the installation of current and well-designed antiviral software. Such software can prevent a viral infection and thereby help stop its spread.
Several types of antiviral software can be used to detect the presence of a virus. Scanning software can recognize the characteristics of a virus's computer code and look for these characteristics in the computer's files. Because new viruses must be analyzed as they appear, scanning software must be updated periodically to be effective. Other scanners search for common features of viral programs and are usually less reliable. Most antiviral software uses both on-demand and on-access scanners. On-demand scanners are launched only when the user activates them. On-access scanners, on the other hand, are constantly monitoring the computer for viruses but are always in the background and are not visible to the user. The on-access scanners are seen as the proactive part of an antivirus package and the on-demand scanners are seen as reactive. On-demand scanners usually detect a virus only after the infection has occurred and that is why they are considered reactive.
Antivirus software is usually sold as packages containing many different software programs that are independent of one another and perform different functions. When installed or packaged together, antiviral packages provide complete protection against viruses. Within most antiviral packages, several methods are used to detect viruses. Checksumming, for example, uses mathematical calculations to compare the state of executable programs before and after they are run. If the checksum has not changed, then the system is uninfected. Checksumming software can detect an infection only after it has occurred, however. As this technology is dated and some viruses can evade it, checksumming is rarely used today.
Most antivirus packages also use heuristics (problem-solving by trial and error) to detect new viruses. This technology observes a program's behavior and evaluates how closely it resembles a virus. It relies on experience with previous viruses to predict the likelihood that a suspicious file is an as-yet unidentified or unclassified new virus.
Other types of antiviral software include monitoring software and integrity-shell software. Monitoring software is different from scanning software. It detects illegal or potentially damaging viral activities such as overwriting computer files or reformatting the computer's hard drive. Integrity-shell software establishes layers through which any command to run a program must pass. Checksumming is performed automatically within the integrity shell, and infected programs, if detected, are not allowed to run.
Once a viral infection has been detected, it can be contained by immediately isolating computers on networks, halting the exchange of files, and using only write-protected disks. In order for a computer system to recover from a viral infection, the virus must first be eliminated. Some antivirus software attempts to remove detected viruses, but sometimes with unsatisfactory results. More reliable results are obtained by turning off the infected computer; restarting it from a write-protected floppy disk; deleting infected files and replacing them with legitimate files from backup disks; and erasing any viruses on the boot sector.
What is virus and how to protect?
A Virus is a self replicating program which has the ability to duplicate and transfer itself to other computers.
The great grandaddy of all viruses, the Boot sector virus executes itself by infecting the start up processes of a computer. These type of viruses are now considered dinosaurs of the computer age. However recently they had a revival due to the self executing nature of usb memory sticks. This has been resolved in part by motherboard manufacturers switching the feature off as a default.
A Worm is a virus which has the ability to transfer itself across a network to a target machine.
A Trojan is a malicious program which uses a legitimate program to hide in to be transported. A RAT (Remote Access Trojan) is the type which most people are familiar with which allows an attacker to take complete control of a target machine. these types of malicious programs do not self replicate so therefore they are not considered true viruses however they are generalised into the same category by the public.
Bots are networks of infected computers with a form of RAT on them which operate as a swarm. The Bot program is designed to run applications and provide proxy services for criminals. Generally these are used to send SPAM.
Root kits (Known in the late 1990's as Device Driver Trojans) are RATS which have the ability to superceed the operating system and therefore can cloak themselves against detection by applications and the operating system istself.
SpyWare is software which is designed to report back to its creators your activity on the internet.
There are lots more virus/Trojan/Spyware variants which are beyond the scope of this article.
ScareWare
Again not really a virus but a method of getting a user to install malicious software. Scareware will normally report a condition which frightens the user into installing or purchasing a program. It's a social manipulation ploy, not a program itself.
For instance a website may offer to scan your computer for viruses then find hundreds on a previously clean machine. It will then offer to clean these viruses if you just download the tool to do so. Of course the took is usually malicious and in some cases is used to blackmail the user into parting with money to clear the fault.
Antivirus
Antivirus solutions are used to detect and remove viruses,spyware and trojans. They do this using a couple of methods.
The Signature file method
Each program on a computer is made from instructions which are represented as numbers. Take a big enough sample of these numbers and you can cross compare the 'signature' with an unknown file byte by byte until a match (or not) with the sample is achieved.
Hueristic analysis
Hueristics are used to identify unknown types of virus. It does this by not looking at what the file is but at what it does. For instance, a screen saver program is highly unlikely to attempt to erase the hard drive on the computer in its first few lines of code, but a virus might. Or a Trojan might want to open a port to "Phone Home". These activities can be scored and the result can be filtered by a 'sensitivity control' set by the programmer or the user.
Expert opinion votes the best method of preventing infection by malicious programs is to get 'NetWise'. Make sure that you have a functioning antivirus solution from a reputable company. Take a look at your browsing habits.
Criminals favour websites that are highly popular or contain information which will reduce the users resistance to installing their malicious software. Ilegal Peer to peer sharing systems, hacker websites, and porn sites are all favourite targets for criminals who use virus techniques to steal credit card information or proxy machines for further criminal activities.
Avoid these types of websites and file transfers and your reduce the overall risk of becoming infected with a virus.
Which part did the virus creeper attack?
the creepr virus {when it was made spread to screens of computers infeted it} goes to computers and infects them and then the messege "i'm the creeper cacth me if you can!" appears on infeted screens and what it does is mess up programmsa and stuff like that
Any software to remove Nhatquanglan virus?
I consistently suggest the use of Spybot Search and Destroy (http://www.safer-networking.org,) AVG Anti-Virus (http://www.grisoft.com,) and Site Advisor (Internet Explorer and Firefox Add-On at http://www.siteadvisor.com).
How do you remove Trojan horse agent kh and Trojan horse backdoor generic3 rtf from computer?
try one of the free demo versions of virus scan/ firewall software available from Norton, or Zone Alarm or any other one of the companies out there, they are fully functional and up to date versions of their software that you can download and use on a temporary basis, you may even decide to pay for the subscription which is a good idea.
How do you download antivirus on iPad?
The iPad doesn't need any anti-virus.. The operating system automatically segments the memory, so downloaded programs cannot invade other memory spaces or programs. The worst it can do is crash itself.
What is a virus protection sorfware?
"to protect PC from dangerous software and programmes"
To be slightly more indepth without being complicated, Virus protection softwares tend to scan files on your computer, and use a variety of methods to indicate possible infection, such as Virus signatures of known viruses, new viruses are constantly being released so it is important to keep these upto date.
How do you delete AVG antivirus registration file?
Follow the steps given below to uninstall AVG antivirus:
Start->Control Panel->Add Or Remove Programs
In Add Or Remove Programs there are list of software installed in system. There by selecting software and then clicking on REMOVE option, we can uninstall the software.
How to turn on and off the antivirus protection?
To turn on anti-virus protection, if it is installed & not working -->>
1. Start>> Control Panel >> Security Center >> turn on if it is turn off
2. Check for updates
3. Reinstall the anti-virus
Note: If your PC has virus, it can prevents anti-virus to work
Does redsnow give you a virus?
redsn0w itself will not give you a virus, but a program that pretends to be redsn0w (a Trojan) very easily could. The best advice is to always download your software from reliable sources.
Can norton remove malware virus?
Norton is the leader in security software for your computer with more PC Magazine Editor's choice awards than any other security company. Start a free trial and protect your PC today!
cutt.ly/7jtIlIT
What is the ISA expansion slot?
ISA is the precursor to PCI. Standing for "Industry Standard Architecture" It was common from the early 1980s to the mid 1990s. ISA was a typically inelegant solution for the time, and required one to know exactly what one was doing- PnP was rare, even for so called "ISA PnP" peripherals. In the end, the combination of flexibility, ease of use, and greater capability allowed PCI to supersede ISA.
Does my computer have anti virus?
Yes it does if you have avg or microsft security essentials.
to determine whether or not you have anti virus software installed is to check the firewall and look under virus protection.
if should be a blue colour or it should say "virus protection on".
But your anti virus is either on desktop or the bottom right hand corner in taskbar.
What are the websites called that have viruses?
the worst computer websites/downloads to get viruses off are:
1.musicjesus
2.limewire
3.winrar
3.javascript
4.any windows live messenger scripts
5.mediafire
on the hole if you stay away from these websites or other websites that are a bit weird or any type of music sites to download free music off then you should be fine and virus free but i do recommend that you install an anti-virus software such as Malwarebytes, avast antivirus,
ad-aware or spy bot search and destroy to keep your computer fully safe from any kinds of worms, hackers, key loggers and Trojans.
How do you get a description for a free downloading antivirus software?
You can download it from different websites, depending upon your needs. Just for your ease, you can browse downloadbull.com/category/system-maintenance/antivirus-antimalware/ and you can get different reliable and tested antiviruses.
What does a Trojan horse virus do?
A "trojan horse" is not a virus; it's a type of malware that may be spread like a virus.
It hides within other programs, or pretends to be a trusted program, but it is really malicious software. Like the Trojan Horse in the Iliad, it secretly does damage once you mistakenly let it into your computer system. It can be used to steal information from the computer.
Can an MP3 spread a virus to your computer?
Yes, but there have not been any reported mp3 viruses for PCs, Macs, or Linux computers. But there has been one confirmed mp3 virus that attacks ipods.
Somebody thought that files must be executable to infect a machine, but this is not accurate in my opinion. A cleverly crafted data file can take advantage of flaws in existing software to cause unexpected behavior, which may include adding, replacing or deleting files. There have been many reported vulnerabilities reported (and fixed) with the code in web browsers that displays images (jpeg, gif, etc) some of which have allowed execution of arbitrary code. There is no reason that similar vulnerabilities might exist in mp3 player software, as the link above demonstrates.]
Keeping your computer up to date with operating system fixes should help minimize the risk, which is already fairly low, as would not downloading mp3 files from unknown sources. These kind of attacks are also very specific to a particular operating system and software. Virus scanners generally don't even look in image, audio or video files, because there have been few or no examples of this sort of virus.
Which computer viruses have caused worldwide damage in the last 2 years?
jab iska answer mil jae to muje call karde 9266846505
How many type of computer viruses?
bomb virus- sets off and abunch of blank windows open( I had it too :( )
weegee virus- Mouse cannot move and black screen of weege poops of and weegee says something then your computer catches on fire!
I love you letter- A letter opens and i dont know what happens next?
Pacman virus- Starts as pacman but not quite, Its starts to eat your files and Guess what? All your files will be eaten by the evil pacman.
That are only the viruses i know
How do you delete temporary internet files?
It's possible and of course it's a great alternative for your risk-free privacy. There is this software-History Killer Pro, with help of which, you can erase all the internet temp files, in a word, every detail of your internet activity and computer usage. So you might just consider trying it out
Hope I could help.
How do you prevent your computer from becoming infected by a virus?
Most web browsers have a pop up blocker, this will help. Otherwise, just close the windows (if they open one) and don't click on anything they ask you too.
You get a vaccine for that particular virus. However, this only works before hand. Vaccines are weakened or dead viruses injected into your body so your immune system can create antibodies to stop you from getting the real thing.
How can you remove virus from the computer?
I would suggest you contact a certified technician online who can help you out in removing virus from your system.Jupitersupport.com is best online virus removal service.
What type of computer virus is Tool Security?
It is a virus claiming that it is anti-virus software. It tells you that you have lots of problems with your computer, but the number of problems is generated randomly each time. It tells you that it needs your credit card details to buy the full version and fix the problems, but don't enter the details, otherwise they will buy stuff on your card.
I don't know how the virus got on my computer in the first place, as I'm pretty sure I didn't download anything, so just be careful of what websites you're on next time.
The way I got rid of it was to do a factory reset on my computer, and I think that that fixed it, but my computer was rubbish anyway, so I bought a new one.
One piece of advice: Buy a mac!
Is antivirus software only good for 1 year?
yeah the antivirus is only good for year because the newer version of windows come it will not accept the older version of antivirus as windows service packs, vista, windows 7