In computers, a virus is a program or programming code that replicates 
by being copied or initiating its copying to another program, computer 
boot sector or document. Viruses can be transmitted as attachments to an
 e-mail note or in a downloaded file, or be present on a diskette or CD.
 The immediate source of the e-mail note, downloaded file, or diskette 
you've received is usually unaware that it contains a virus. Some 
viruses wreak their effect as soon as their code is executed; other 
viruses lie dormant until circumstances cause their code to be executed 
by the computer. Some viruses are benign or playful in intent and effect
 ("Happy Birthday, Ludwig!") and some can be quite harmful, erasing data
 or causing your hard disk to require reformatting. A virus that 
replicates itself by resending itself as an e-mail attachment or as part
 of a network message is known as a worm.
Generally, there are three main classes of viruses:
 
File infectors. Some file infector viruses attach themselves 
to program files, usually selected .COM or .EXE files. Some can infect 
any program for which execution is requested, including .SYS, .OVL, 
.PRG, and .MNU files. When the program is loaded, the virus is loaded as
 well. Other file infector viruses arrive as wholly-contained programs 
or scripts sent as an attachment to an e-mail note. 
System or boot-record infectors. These viruses infect executable code found in certain system areas on a disk. They attach to the DOS boot sector
 on diskettes or the Master Boot Record on hard disks. A typical 
scenario (familiar to the author) is to receive a diskette from an 
innocent source that contains a boot disk virus. When your operating 
system is running, files on the diskette can be read without triggering 
the boot disk virus. However, if you leave the diskette in the drive, 
and then turn the computer off or reload the operating system, the 
computer will look first in your A drive, find the diskette with its 
boot disk virus, load it, and make it temporarily impossible to use your
 hard disk. (Allow several days for recovery.) This is why you should 
make sure you have a bootable floppy.
Macro viruses. These are among the most common viruses, and 
they tend to do the least damage. Macro viruses infect your Microsoft 
Word application and typically insert unwanted words or phrases.
Friday, October 7, 2016
virus
Subscribe to:
Post Comments (Atom)






0 comments:
Post a Comment