wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virus

profile
Prudhvi Gubbala
Aug 26, 2022
0 Likes
0 Discussions
87 Reads

Virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected".

Some of the examples that viruses effect the computers: it can steal data or passwords, log keystrokes, spam your email contacts, corrupt files, erase data, cause permanent damage to the hard disk, and sometimes can even take over your device control.

viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage. A key thing to know about  viruses is that they are designed to spread across programs and systems. Viruses typically attach to an executable host file, which results in their viral codes executing when a file is opened. The code then spreads from the document or software it is attached to via networks, drives, file-sharing programs, or infected email attachments.

Some types of virus are:

Boot Sector Virus.

Overwrite Virus.

Direct Action Virus. 

Web Scripting Virus.

Polymorphic Virus.

Directory Virus.

Macro Virus.

Memory Resident Virus.

Among these viruses are Trojans, malware, adware, and worms, etc.


Comments ()


Sign in

Read Next

BUSINESS MODELS OF E COMMERCE

Blog banner

How to Grow Your Brand on YouTube Without a Big Budget

Blog banner

Dudhasagar waterfall ?

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

Understanding the 'Ambiverts'

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Yoga in INDIA and ABROAD

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Assignment-3

Blog banner

The evolution of OS

Blog banner

Twisted world

Blog banner

OPERATING SYSTEM

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

The application udemy

Blog banner

Constrains in service design

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

SQL Injection practice on DVWA

Blog banner

Memory Management

Blog banner

E-security systems | CCTV

Blog banner

VIRTUAL MACHINES

Blog banner

Service Transition Process in ITSM

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Hash password! Is it really secured?

Blog banner

1.1 basic elements

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Old age lifestyle

Blog banner

Service design process in ITSM

Blog banner

Art and Culture of Rajasthan

Blog banner

M commerce

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

semaphores in os

Blog banner

Different Types of Data

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Blockchain Transactions

Blog banner

Principles of Concurrency

Blog banner

Why Data Security Is Important

Blog banner

File management

Blog banner

Why Oak Tree Hotel Is Arcadia’s Hidden Gem?

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner