wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virus

profile
Prudhvi Gubbala
Aug 26, 2022
0 Likes
0 Discussions
86 Reads

Virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected".

Some of the examples that viruses effect the computers: it can steal data or passwords, log keystrokes, spam your email contacts, corrupt files, erase data, cause permanent damage to the hard disk, and sometimes can even take over your device control.

viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage. A key thing to know about  viruses is that they are designed to spread across programs and systems. Viruses typically attach to an executable host file, which results in their viral codes executing when a file is opened. The code then spreads from the document or software it is attached to via networks, drives, file-sharing programs, or infected email attachments.

Some types of virus are:

Boot Sector Virus.

Overwrite Virus.

Direct Action Virus. 

Web Scripting Virus.

Polymorphic Virus.

Directory Virus.

Macro Virus.

Memory Resident Virus.

Among these viruses are Trojans, malware, adware, and worms, etc.


Comments ()


Sign in

Read Next

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

TAILS OS

Blog banner

Short note on Microsoft office

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

DIGITAL ECONOMY

Blog banner

The Difference Between Plaque and Tartar Explained Simply

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

Virtual Memory

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

RAID

Blog banner

I/O Management and Disk Scheduling

Blog banner

Hash password! Is it really secured?

Blog banner

Theads

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Buffering

Blog banner

I/O Management and Disk Scheduling

Blog banner

Virtual memory in os

Blog banner

semaphores

Blog banner

Virtual Machine

Blog banner

Service transistion under difficult conditions

Blog banner

Why Kanye West (Now Ye) is the GOAT: A Legacy Beyond Music

Blog banner

Importance of education

Blog banner

Os assignment

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Search Marketing In 2026: From Keywords To Credibility And User Intent

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

(Input/Output) in os

Blog banner

Wiretapping

Blog banner

Deadlock and Starvation

Blog banner

Introduction my self

Blog banner

Mesh Topology

Blog banner

Modern Operating System - Khush bagaria

Blog banner

Segmentation and paging concept

Blog banner

Busted : Common Web Security Myths

Blog banner

Importance Of Blockchain

Blog banner

The functions of operating system

Blog banner

SECURITY TOOLS

Blog banner

What is OS Fingerprinting?

Blog banner

What is Influencer Marketing and its Trends

Blog banner

Network Footprinting in Cybersecurity

Blog banner