wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virus

profile
Prudhvi Gubbala
Aug 26, 2022
0 Likes
0 Discussions
86 Reads

Virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected".

Some of the examples that viruses effect the computers: it can steal data or passwords, log keystrokes, spam your email contacts, corrupt files, erase data, cause permanent damage to the hard disk, and sometimes can even take over your device control.

viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage. A key thing to know about  viruses is that they are designed to spread across programs and systems. Viruses typically attach to an executable host file, which results in their viral codes executing when a file is opened. The code then spreads from the document or software it is attached to via networks, drives, file-sharing programs, or infected email attachments.

Some types of virus are:

Boot Sector Virus.

Overwrite Virus.

Direct Action Virus. 

Web Scripting Virus.

Polymorphic Virus.

Directory Virus.

Macro Virus.

Memory Resident Virus.

Among these viruses are Trojans, malware, adware, and worms, etc.


Comments ()


Sign in

Read Next

Network Security Risks

Blog banner

geographic information system (GIS)

Blog banner

On-Page SEO

Blog banner

What is Data, Information and Knowledge?

Blog banner

Chicken Dum Biryani

Blog banner

Scheduling

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

E-Cash (Electronic Cash)

Blog banner

Development Of Modern Operating System

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

TRELLO

Blog banner

Threat management

Blog banner

Memory management

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

Uniprocessor Scheduling

Blog banner

Introduction my self

Blog banner

Data carving - using hex editor

Blog banner

Android Flashlight Application

Blog banner

Blog name

Blog banner

Boxing

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Dr. Venkadavarahan

Blog banner

John Titor: The Time Traveler

Blog banner

Deadlock

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

10 Unknown facts about India's Independence

Blog banner

Cloud Computing

Blog banner

Memory managment

Blog banner

Deadlock

Blog banner

Objectives and functions of Operating System...

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

Importance of modern technology era

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Service transistion under difficult conditions

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

How To Secure Operating Systems ?

Blog banner

Beyond the Track: Why the Best Hotel in Arcadia, Florida, Completes Your IMSA Sebring Getaway

Blog banner