Are you interested to know what is Computer Virus?
everyone knows how to use the computer and people who use the computer must
have heard the name of the virus.
Virus, this name
is a very familiar name in the world of the Internet. Along with this, it is also a
very scary name because it is very harmful to your computer and other
electronic gadgets. That is, if it enters the system once, then it can also
spoil it and can also destroy your data.
Just like the Virus is not good for our health and
they spread many diseases in our body, in the same way, this Virus also
causes much damage to the computer system. Therefore, it is good for all
computer users to keep information about them.
Computer Virus Many people
will know something about these and what it is and what it does. But many people may have heard the name of the virus but they will not
know what the virus can do on your computer.
So today I am going to tell you in this article about
what is a virus and how to kill the virus. Hopefully, you will
get to know a lot by reading this article.
What is Computer Virus
Computer Virus is a small
the software program that is designed to delete your computer’s operation and
the computer’s data or access it.
Computer Virus without our
knowledge can spoil the system in such a way that it is not just about us to
fix it. The computer runs through many software programs, without any program,
the computer cannot work.
Software programs are made to make the computer work
properly and some programs are also made to spoil the work of the computer.
The computer was invented by humans,
humans made its program to run the computer, and as I said the virus
is also a small program, it has also been made human. A computer virus
is not natural, it is not made by itself, it is also made by the programmers
consciously so that they can spoil another computer.
Or we can also say that the Virus is actually
computer programs that are destructive rather than productive. Its basic
purpose is to deliver damage to the place of providing help.
History of computer viruses
Robert Thomas, he was the first engineer who first developed a computer virus while working at BBN
Technologies in 1971.
This first virus was named the “ Creeper ” virus,
and it was an experimental program that Thomas himself had done to infect the
mainframes of ARPANET. After infecting the Virus system, it displayed on
the following message screen, “I’m the creeper: Catch me if you can .”
The original wild computer virus that was first
tracked was “ Elk Cloner. ” In the history of the entire computer virus,
this Elk Cloner had previously infected Apple II operating system through
a floppy disk. Richard Skrenta developed this virus in 1982,
which was a teenager at that time.
Suppose computer viruses were designed according to
prank, but it seems that if a malicious program is installed in the memory of the computer then it can do many such things by running the system to
the user. You can also stop further and they will not have any control over
these malicious programs.
The first person to name this Malicious Program as “ Computer
Virus ” was Fred Cohen, who named it in 1983. This name came
to light when he named these programs in an academic paper titled “ Computer
Viruses – Theory and Experiments ” where he had written complete
information about these malicious programs such as how it works, what it can do
etc.
What can computer viruses do?
A computer virus can corrupt
or delete the data on the computer. You can completely eliminate the data
stored in your hard disk. Computer virus also spoils their computers by
going to other computers through e-mail attachments.
Virus slows down
the speed of your computer. It destroys your files and program.
What is Malware
Malware’s full name is malicious software. It is also
a software program that gives access to computers. Malicious software means bad
software which is not good at all and once it comes in your system, it can
completely spoil your system.
Malware is also the name of a virus which
starts to slowly erase the data of your system.
Where does Malware come into our computer? Malware can
come from many places in our system and the most used source which is common
a source today is the internet.
On the Internet, we get some information every day. If
we went to any malicious site to get the same information or downloaded pirated
software, games, and movies from somewhere, then malware online comes into
our computer from there.
This was about how online malware gets into our
computer, now we will know how offline malware gets into our computer.
We all use a Pen drive, CDs, DVDs on our computers.
When we bring Pen Drive and CDs from another place to connect to our computer
to and our computer destroy data.
Types of Malware
Malware is of three types – Virus Worms and Trojan
horse virus. These three are different, their work is also different.
These three spoil your computer in different ways. Let us know about these
three and what they do.
What is a virus?
Virus can corrupt
the files and software on your computer. Suppose there is a word document in
your system in which virus has come, then it will delete the data of
your document or corrupt the document from which you will not get any
information from it.
Or it could also be that this virus can
completely corrupt your word processing software. In such a situation, if you
copy or share a corrupted file, then this virus goes to another
computer and also spoils its system.
Virus type
A computer virus is a type of
malware that if entered into the computer’s memory, then it can multiply itself
automatically and can also change programs, applications.
Here computer infects occur when these malicious codes
keep replicating themselves. Here, I am going to provide information about the types
of these computer viruses to you.
Boot Sector Virus
This type of virus infects the master boot
record and removing them is a very difficult task and often the system has to
be formatted to remove them. These are mainly spread by removable media.
Direct Action Virus
They are also called a non-resident virus, once
it is installed, it remains hidden in the computer memory. It stays attached
to the specific type of files that it infects. They do not infect user
experience and the system’s performance.
Resident Virus
Like direct action viruses, resident viruses are also
installed on the computer. Apart from this, identifying them is also a smile.
Multipartite Virus
This type of virus can affect the system in
multiple ways. These infect both the boot sector and executable files
simultaneously.
Polymorphic Virus
Identifying these types of viruses is a very funny thing
for a traditional anti-virus program, as these viruses change their
signature pattern frequently whenever they replicate themselves.
Overwrite Virus
This type of virus deletes all the files that
they infect. To remove these viruses from the system, the user has to delete
all the infected files, causing data loss.
It is a very happy thing to recognize these viruses as
they are spread through emails.
Space filler Virus –
also called “Cavity Viruses”. They have been given this name because it fills
all the spaces in the code, so it does not harm the files.
File
infectors Virus
Some file infector viruses
attach to program files, such as .com or .exe files. Some file infector viruses
also infect files with .sys, .ovl, .prg, and .mnu.
In the same way, when a
particular program is also loaded, the virus also gets loaded
automatically. These viruses come in the users’ computer with email
Macro viruses
As suggested in the name,
these macro viruses mainly target macro language commands only in some
applications like Microsoft Word.
These macro viruses have been
designed in such a way that it easily adds its malicious code to a genuine macro
sequences.
Overwrite
Viruses
This virus has been
designed in such a way that it can overwrite itself and destroy any file or
application data. It starts to overwrite its own code once it starts an attack.
Polymorphic
Viruses
This type of virus is
used more often by cybercriminals. This is a type of malware type that can
easily change or mutate its underlying code and without changing any basic
functions or features.
This does not make it
vulnerable to which anti-malware. Whenever an anti-malware detects it, it
modifies itself which makes it very smiling to get hold of it.
Resident
Viruses
This virus implants
itself in the computer’s memory. Basically, there is no need for the original virus
program for infection to infect any files or programs. Even if we delete the
original virus, a version of it is stored in memory, which itself
activates itself.
Resident
Viruses
This virus implants
itself in the computer’s memory. Basically, there is no need for the original virus
program for infection to infect any files or programs. Even if we delete the
original virus, a version of it is stored in memory, which itself activates
itself.
This happens when computer Oss
load some applications or functions. Since it is hidden in the system’s RAM, it
is often not able to detect any antivirus or antimalware.
Rootkit
Viruses
This rootkit virus is a
type of malware type that secretly installs an illegal rootkit in the infected
system. With this, it opens a door for the attackers which gives them full
control over the system.
This allows the attacker to
fundamentally modify or disable a program or function. These rootkit virus
can bypass antivirus software very easily. Rootkit scanner is
required to capture them.
System Boot Record Infectors Viruses
These boot-record infectors
infect executable code that is found in specific system areas of the disk. As
the name suggests, they infect USB thumb drives and the DOS boot sector more.
These boot viruses are not
seen much these days because the present systems do not depend on much physical
storage media.
What is Worms
Worms are also like viruses, but they multiply
themselves and try to spread themselves as much as possible. This means that
if there are worms in your system, then they start making many copies of
different files, due to which the system slows down.
If we copy and share the same files with another
computer, then worms will go there and slow down that computer by making many
copies of files.
What is Trojan Horse Virus
Trojan Horse virus is a very
dangerous malware. This malware comes by hiding your identity on your computer.
For example, if you are using the internet and you
have visited a site, there is an additional such as “ click here to win the smartphone ”
and if you click on it, then trojan horse virus malware comes into your
the computer only through it. Will go and you will not even know about it and your
the system will completely ruin it.
These are also present on the internet in the form of
a lot of software, you will think that it is a genuine software, but in reality,
it remains a trojan virus which is hidden inside that software
and once they come in your computer, then it will be in your computer. Start
slowing down. With that, he would open a door so that different kinds of
viruses and worms get into your computer.
System Virus Infection Signs
How to know if your system is infected with a Virus
or not. That is why I am going to tell you about some warning signs below,
which is very important to know for all computer users –
1. Slower
system performance
2. Frequent
pop-ups in the screen
3. Own
programs
4. Files
automatically multiplying / duplicating
5. New
files and programs are automatically installed in the computer
6. Files,
folders or programs are automatically deleted and corrupted
7. Weird
sound from hard drive
If you show such warnings in your system then you should
know that your system can be infected by a virus. So, soon download good antivirus software and scan it.
How to Protect Your System from Viruses and Worms
Here I am going to give you some such tips that will
make it easier for you to avoid these viruses.
What to do
1. Always
install a good Antivirus in your system and keep updating it from time
to time.
2. If
you do not know about his sender then you should not open it.
3. Do
not download anything from Unauthorized Websites such as MP3, Movies, Software, etc.
4. Get
all the downloaded things scanned properly. Because they are more likely to
have a virus.
5. Use
removable media such as pen drive, only after scanning the disks.
6. If
you visit any website, then you should take care of one thing that is a popular
and registered website and do not click on any such link which will cause you
trouble later.
What not to do
1. Never
open an email attachment, if you do not know about that sender.
2. Do
not try to open any unsolicited executable files, documents, spreadsheets, without
scanning.
3. Untrusted
Website documents executable software download
4. Ads
that give you greed, click here and win the lottery,
do not ever click on such pairs. Similar greed comes to us in e-mails, so you
should never open that mail because there are more chances of malware in it.
What did you learn today
I hope you have liked this article about my computer
virus – What is Computer Virus. It has always been my endeavor to provide
complete information about the type of virus to the readers, so that
there is no need to search them in the context of that article in any other
sites or the internet.
This will also save their time and they will also get
all the information in one place. If you have any doubts about this article or
you want that there should be some improvement in it, then for this you can
write down comments.
If you liked this post what is Computer Virus or got to learn something, then please share
this post on social networks such as Facebook, Twitter, and other social media
sites.
No comments:
Post a Comment
Thanks For The Comment