wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

VIRUS

profile
Sudhir Shingare
Aug 29, 2022
0 Likes
0 Discussions
170 Reads

A computer virus is a type of malicious software or malware, that spreads between computers and causes damage to data and software.

Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage.

Disadvantages:

1. They slow down our computer

2. They can crush our computer or delete our       all file

3. They can steal information

Example:

Worm, ILOVEYOU, SQL Slammer, Stuxnet, CryptoLocker, Tinba, Welchia, and Shlayer are some examples of computer viruses.

Computer viruses cause billions of dollars' worth of economic damage each year.

 

 

 


Comments ()


Sign in

Read Next

Firewall / IDS Evasion Techniques

Blog banner

semaphores

Blog banner

Importance of Network Security Risk

Blog banner

Raid and levels of raid.

Blog banner

SIEM Empowering Security

Blog banner

Scheduling

Blog banner

Disk Scheduling

Blog banner

Memory Management

Blog banner

Traveling

Blog banner

Having passion in life

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Esri India launches Policy Maps.

Blog banner

Mail merge

Blog banner

Short note on expert system

Blog banner

CyberSecurity Color Wheel

Blog banner

Shoulders

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

I/O Management and Disk Scheduling

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

I/O Buffering

Blog banner

How To Secure Operating Systems ?

Blog banner

Multicore and Multithreading

Blog banner

Veg Mix Pickle

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

Multithreading in Operating System

Blog banner

Cyber Forensics on IOT Devices

Blog banner

What is Minting & Mining

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

Deadlock

Blog banner

Caching windows

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

Linux 94

Blog banner

"Audit" In Data Science

Blog banner

Know your Processors!

Blog banner

Windows Operating System

Blog banner

Traditional Unix System

Blog banner

Artical on FreshBooks

Blog banner

OS Evolution Achievements

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner