A
computer virus is a small
software
program that can spread from one computer system to another and cause
interferences with computer operations. A computer virus has the
capacity to corrupt or to delete data on your computer and it can use an
e-mail program to spread the virus to other email addresses in your
online address book. In the worst case scenario, it can even delete
everything on your hard disk.
Forms of Computer Viruses
In
the same way as viruses harm peoples' bodies, computer viruses can do
considerable damage to computer systems. Viruses are infections.
Computer infections can come in several forms and your computer can
"catch" one in several ways:
- An email virus
is one type of computer virus. An email virus can travel through
attachments in email messages and can automatically replicate itself by
mailing itself to dozens or even hundreds of people on your list of
contacts found in your online address book. There are email viruses that
can launch themselves into your computer while you are simply viewing
the messasge. You don’t even need to double-click the message in order
for the message to install itself.
- A Trojan horse
is not a virus. It is a computer program that claims to be a game but,
in actuality, will just do damage once you run it. It may even erase
your hard disk. It cannot automatically replicate itself.
- A worm
is a type of software called mallware that uses security holes and
computer networks in order to replicate itself. The worm will scan the
network for machines which carry a particular security hole. It will
then copy itself to the machine through the security hole and will start
replicating itself.
Viruses in general, start working and
spreading once you start using the application or program to which the
virus is attached. For instance, a program that has a virus in it will
place the virus in the system’s memory each time that program is run.
Once
the virus is in the memory, one of several things can happen. First, it
can be programmed to attach itself to other programs and applications,
folders, or disks. Second, if given the chance, it can infect a network.
How Computer Viruses Are Activated
Computer
viruses are easily spread through the use of attachments in various
email messages or via messages from instant messaging; so, you must
never open unexpected email attachments unless you know and trust
whoever sent the message.
Be very careful as computer viruses can
be easily disguised as ordinary-looking attachments or even as
attractive images, funny graphics, cards, video, and audio files.
Computer viruses can also spread through downloads you do while online.
They can be hidden in software, especially in
pirated items, or in other programs and files which you are downloading.
How Computer Viruses Operate
Viruses
operate in a multitude of ways. Some will stay active only when the
application to which it is attached is running. Others will be inactive
once the computer is turned off, while some will run every time you turn
your computer on after it has infected the network or system files.
There are some indicators that will tell you that your computer is infected:
- Your computer is running slower than normal
- Computer applications are not working right
- Disk drivers and disks have become inaccessible
- You cannot print
- You find unusual, error messages
- Dialog boxes and menus are distorted
- You find double extensions on attachments which you’ve recently opened (ex. gif, jpg, vbs)
- Your antivirus program is suddenly disabled or cannot be restarted
- Antivirus programs cannot be installed in your computer or cannot run
- New and unusual icons suddenly appear on your desktop
- Strange music or sounds suddenly play from the speakers
- A program you typically use suddenly disappears from your computer without you purposely removing it
To
safeguard your files and to protect your computer, take time to
understand computer viruses and what you should avoid doing to save your
system from the virus. Be sure to always turn on the
firewall, keep your computer’s operating system updated, update your antivirus software, and use updated antispyware programs