What is computer virus - How computer virus works - Working of computer virus
Post by Jawad Ahmad Riaz
What is computer virus
Many a years ago the invention of the computer came into being and nowadays it has become a very powerful source of the information gathering as well as a good source of communication between two different places at the same time. Computer has an ability to run different type of the programs simultaneously at the same time. As we know that the working and the speed of the computer depends on the hardware and the software used in the computer.
Different types of programs that slows the working and the output of the computer can some times be Computer viruses. Computer virus programs can not only harm computer hardware some tmes, but almost certainly it is harmful for the data stored on computer hard drive.Typically, they are defined as the envious programs or the software that play role in infect the system and slows down its progress are called as viruses. A virus has the power to reproduction without any obstacle and permission, and it spread it self from file to file. They infect the system of the user without its permission, the occurring of the virus is not noticeable, and they can occur without the knowledge of the users. Some viruses are very much powerful that they can destroy the programs to large extent and harmfully affect the performance of the personal computer.
Types of Viruses
Based on the working and the ability of doing infection viruses are categorized into several types . Following are the types of computer viruses
Type of virus that infects the whole memory of the RAM is called as resident virus e.g. Randex
Boot virus is the type of virus that spread the virus in the bootable part of the hard drive for example Poly boot
These two types are most important but there are also some other types of viruses that can infect the system such as Trojans, Worms, Macro virus and many more
Working of Viruses:
The working of the computer viruses depends upon the different steps from occurrence until last stage. The steps that are involved in the working are as follows
Occurrence or Invasion:
The first step in the working of the viruses is the invasion. It is defined as the process or the way by which viruses enter in the computer system and infect the system. These viruses entered in the system through different types of outside source. However, two important and main components that enhance the invasion of the viruses are disk drives and different types of network adapters, which are used to configure the network. The drives may be of any kind such as Floppy, hard drives, Zip many type of other removable drive sources. These viruses affect the working and the progress of the hard drive and system become slowly hacked.
Other source of virus entrance in the system is different types of networking cards that are used for communicational purposes such as LAN card, modem etc. When we activate the internet through these cards, some Web pages that are coded for these infections arte straightly spread the virus in the computer hardware and the system become corrupted. Different types of E-mails are also responsible for the activation of the virus in your systems.
When these viruses enter the system, they can directly move towards the hidden areas in the system that is far from the vision of the users. In addition, when we open some kind of files or different types of documentation related to these viruses the virus could infect the system destroy its major components of working and completely slows down the progress of the system. After this virus can replicate and coy its self into the system and installs its major infected components in the memory of the computer. Moreover, due this infection and installation whole data on the drives will lost and the operating system destroy.
Interested in Advertising your products or website with us? Click Why Advertising with us ?
- Understanding Antivirus
Browse All Categories
- WiFi Technology
- Wimax Technology
- Computer Networks
- Mobile Communication
- IT - Certifications
- Computer OS
- Computer Hardware
- Computer security
- Technology Reviews
- Networking Tutorials
- Other Technology articles
- Top 10
Lastest articles in Category