wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virus

profile
Prudhvi Gubbala
Aug 26, 2022
0 Likes
0 Discussions
86 Reads

Virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected".

Some of the examples that viruses effect the computers: it can steal data or passwords, log keystrokes, spam your email contacts, corrupt files, erase data, cause permanent damage to the hard disk, and sometimes can even take over your device control.

viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage. A key thing to know about  viruses is that they are designed to spread across programs and systems. Viruses typically attach to an executable host file, which results in their viral codes executing when a file is opened. The code then spreads from the document or software it is attached to via networks, drives, file-sharing programs, or infected email attachments.

Some types of virus are:

Boot Sector Virus.

Overwrite Virus.

Direct Action Virus. 

Web Scripting Virus.

Polymorphic Virus.

Directory Virus.

Macro Virus.

Memory Resident Virus.

Among these viruses are Trojans, malware, adware, and worms, etc.


Comments ()


Sign in

Read Next

How secured are you online ?

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

Top 10 Logos and their meanings

Blog banner

WINDOWS I/ O

Blog banner

Mumbai

Blog banner

SESSION HIJACKING

Blog banner

Boxing

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Data Mining

Blog banner

Social Engineering Attacks

Blog banner

Security Breaches in Stock market trading

Blog banner

Power of words

Blog banner

Threads in OS

Blog banner

Artificial Intelligence and I

Blog banner

Tableau

Blog banner

Intrusion Detection Systems - Anushka Linge

Blog banner

What is Spyware? and examples of them.

Blog banner

Modern operating system

Blog banner

Open Source Project By Google

Blog banner

Advantage of freedom

Blog banner

Concurrency and Deadlocks

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Time Series Analysis

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Cache memory

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

DURGA POOJA

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Dangers of Using Public WiFis

Blog banner

Dudhasagar waterfall ?

Blog banner

Data is an asset and it is your responsibility!

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

Deadlock

Blog banner

Health is Wealth

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

File Management

Blog banner

Spotify

Blog banner

Types of Big Data

Blog banner

Social Media Marketing Trends 2022

Blog banner

ProofHub

Blog banner