1. A computer virus is a program that can make copies of itself. Most computer viruses do nothing more than this and are more of an annoyance than a danger. Some computer viruses may also harm data and programs stored on a computer.
2. A Virus is a small, executable program (Macros can be considered as executable) with the ability to replicate itself by adding its code to that of a host program and/or the system area of a hard or floppy disk. The user is generally unaware of the actions of a virus as it replicates and usually only becomes aware of its presence when the virus 'activates', which it does according to a given set of conditions and at which time it is often too late. However, once the user knows what signs to look for, it can be very obvious when viral activity occurs. Every virus has its own personality. Viruses differ in many ways, each having its own unique properties that make it different. Here are some ways that viruses differ from each other: -
a) Size . A virus can be as small as 66 bytes or less, or as large as 4096 bytes or more. Compared to most computer programs a virus must be very small.
b) Method of infection. A virus can infect the host program in
different ways. Below are three methods commonly used. They are by no means the only ways, but they are the most common. It is possible for a virus to use one or more of these methods:-
i) Overwriting. When a virus infects using this method, it will simply write a copy of itself over the beginning of the host program. This is a very simple method and is used by more primitive viruses. An infected file has been destroyed and must be restored from a backup disk. Overwriting tends to make the user suspicious because the host program no longer functions. This method of infection causes no change in the size of an infected program.
ii) Appending . This method is a bit more complex. The virus appends itself onto the end of the host program and also edits the beginning of the program. When the user runs the infected program it will jump to the end of the program where the virus is located, perform the functions of the virus, then return and continue to run the host program. To the user, the program is functioning normally. This method of infection causes infected programs to increase in size. Some appending viruses are unable to tell whether or not they have already infected a program and will continue to infect the program hundreds of times, causing it to grow considerably in size.
iii) Disk infectors . Other viruses will infect the boot record or partition table. This is an executable area of the disk that is automatically run every time you boot up from the disk. This means that as soon as the computer boots up, the virus is in memory.
Contact us to Get Immediate Call Back or Email From us to get an Answer for Your Queries. If any delay; Please Feel Free to Speak to 'ANALYST' at 09678069366 or 09988877963 (Roaming) or Call Customer Care at 09678070896. |
Friday, February 8, 2008
Computer Virus - Part 1/3
Subscribe to:
Post Comments (Atom)
DISCLAIMER SPONSORED POSTS
This policy is valid from 01July,2007.
This blog is a personal blog written and edited by me. For questions about this blog, please contact me.
This blog accepts forms of cash advertising, sponsorship, paid insertions or other forms of compensation.
This blog abides by word of mouth marketing standards. We believe in honesty of relationship, opinion and identity. The compensation received may influence the advertising content, topics or posts made in this blog. The owner(s) of this blog is compensated to provide opinion on products, services, websites and various other topics. Even though the owner(s) of this blog receives compensation for our posts or advertisements, we always give our honest opinions, findings, beliefs, or experiences on those topics or products. Every effort is made to make the sponsored post identifiable but at times due to advertisers restrictions the same may not be feasible all the time.The views and opinions expressed on this blog are purely the bloggers' own. Any product claim, statistic, quote or other representation about a product or service should be verified with the manufacturer, provider or party in question.
The owner(s) of this blog would like to disclose the following existing relationships. I have a interest in technical field which may influence the style of writing.
0 comments:
Post a Comment