A Virus is an umbrella term used to describe malicious programs that unwantedly install themselves onto your computer. Computer viruses are destructive programs that delete or corrupt files, interfere with your computer operations and reproduce themselves to fill disk or RAM space on your computer. There’s typically a piece of code that causes an unexpected and usually malicious event to occur. A computer virus is often disguised as games or images with clever, inviting titles.
The virus can cause damage in many forms. A mild version, like the Melissa virus, can spam other email addresses and social media accounts. Other worms can spread into your computer to delete files, erase hard disks, cause malfunction, and steal private information. To know more about how to detect virus from your computer, then Virus removal guidelines is the best platform for all.
What is a Computer Virus?
In technical term, a computer virus is a computer program which replicates itself and designed in such a way to damage your computer. It can steal your information (like Credit Card, Bank Details, your Facebook or email passwords). It can also provide backdoor unauthorized access to the hackers.
How Viruses Come to the Computer?
Remember the torrent files you download? How many download buttons you see? Remember the girl who wants to have sex with you in your city, which keeps popping up in the bottom corner of your computer screen. You want to download youtube videos and google gives you some tools to download those videos. Porn Websites. Unverified source of images.
One of the possible sources of virus attacks is downloadable programs from the web. Unreliable sources and internet newsgroups are one of the main sources of computer virus attacks.
Executable files having an extension of “.com”, “.exe” and “coolgame.exe” contain virus sources too.
you want to use some software but you don’t want to pay. You look for a shortcut, you want to crack that software with serial keys. Most people who download cracked and illegal versions of software online are unaware about the reality that they may contain virus sources as well. Such cracked forms of illegal files contain viruses and bugs that are difficult to detect as well as to remove.
Email attachments are one of the other popular sources of computer virus attacks. Hence, you must handle email attachments with extreme care, especially if the email comes from an unknown sender.
There can be no denying the fact that the internet is one of the common sources of virus infection. This fact is not a real surprise and there is no point to stop accessing internet henceforth. Majority of all computer users are unaware as of when viruses attack computer systems. Almost every computer user click/download everything that comes their way and hence unknowingly invites the possibility of virus attacks.
Your USB’s (Pen Drives). People generally do not plug out USB once they shut down their computer. When they restart, it is possible that your computer will boot from USB and you have welcomed a virus in your system.
Type of Computer Virus
There are many viruses in this computer world, but I am only stating few which are very popular:
Boot Sector Virus
From a user perspective, boot sector viruses are some of the most dangerous. Because they infect the master boot record, they are notoriously difficult to remove, often requiring a full system format. This is especially true if the virus has encrypted the boot sector or excessively damaged the code. Possible Source: USB (Pen Drives) and Email Attachments
File Infector Virus
It attaches itself to executable programs such as word processors, game files, spreadsheets applications, etc. The file infector virus fixes itself into the host file and begins its operation whenever the file is executed.
Like file infector virus, they install themselves on a computer. It allows them to work even when the original source of the infection has been eradicated. They can be tricky to spot and even trickier to remove.
One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. Remember the step 2.
Spyware: These programs are designed to monitor your computer. Your every online and offline activity can be tracked. Your video chats can be monitored. Everything you can imagine can be tracked by it.
Some types of spyware could include keyloggers that store every keystroke that a user enters.
Some of the Famous Computer Viruses
Designed By: David L. Smith.
The name Melissa has given after the name of an exotic dancer in Florida. One of the first emails activated the virus.
Reported Costs: $1.1 billion
Quality: If the day of the month matched the minute, the virus would insert a Bart Simpson(Cartoon Character) quote.
Designed By: Onel d Guzman
Launched from the Philippines, email subject line would say it was a love letter from a secret admirer.
Reported Costs: $15 billion
Reached 45 million users in one day (Beware when next time you receive a proposal from unknown sources).
Designed By: Unknown
They were drinking code red mountain dew, that is why the name it got “Code Red”.
Reported Costs: $2 billion