wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virus

profile
Prudhvi Gubbala
Aug 26, 2022
0 Likes
0 Discussions
86 Reads

Virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected".

Some of the examples that viruses effect the computers: it can steal data or passwords, log keystrokes, spam your email contacts, corrupt files, erase data, cause permanent damage to the hard disk, and sometimes can even take over your device control.

viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage. A key thing to know about  viruses is that they are designed to spread across programs and systems. Viruses typically attach to an executable host file, which results in their viral codes executing when a file is opened. The code then spreads from the document or software it is attached to via networks, drives, file-sharing programs, or infected email attachments.

Some types of virus are:

Boot Sector Virus.

Overwrite Virus.

Direct Action Virus. 

Web Scripting Virus.

Polymorphic Virus.

Directory Virus.

Macro Virus.

Memory Resident Virus.

Among these viruses are Trojans, malware, adware, and worms, etc.


Comments ()


Sign in

Read Next

ARTICLE ON WRIKE CORPORATION

Blog banner

Deadlocks in Operating Systems

Blog banner

Deadlock

Blog banner

Importance of self defence for girls

Blog banner

Busted : Common Web Security Myths

Blog banner

DATA VAULT

Blog banner

Direct memory access

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Memory Management in Operating System

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

File System

Blog banner

Fitness regime by Deepesh

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

Mumbai famous street food

Blog banner

E-Cash (Electronic Cash)

Blog banner

DURGA POOJA

Blog banner

Getting into anime My anime suggestions

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

MODERN OPERATING SYSTEM

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Virtualisation

Blog banner

All you need to know about “On-page SEO”

Blog banner

Electronic Funds Transfer

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Use case of K-means clustering

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

social media issue

Blog banner

Information of meesho company

Blog banner

Hypothesis Testing in Data Science

Blog banner

Memory management

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

Yahoo! mail

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Importance Of Yoga.

Blog banner

Types of Threads

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Memory hierarchy

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

Women empowerment

Blog banner