Computer Viruses


A Computer Viruses will function as an element that will constitute damage to the hard disk contents or interfere with the normal operational executions of the PC system. This will cause the PC to be unable to function properly until the virus is eliminated and the overall system is overhauled and rebooted.

    computer viruses examples

    Computer Viruses Examples 

    The Basics

    A Computer Viruses program is usually able to replicate itself and this too is an added problem once the virus latches on to a system. Progressively getting out of control, the PC virus will attempt to cause as much damage as possible before it Will be detected and eliminated. 

    The replication is usually intentional and designed to act a bit like a Trojan, thus causing the unsuspecting user to be caught off guard. If a file that contains a virus is opened, or copied onto another PC, then the other PC will also become infected and this process is repeated every time the file is opened and downloaded onto other systems.

    A Computer Viruses can easily be introduced into a computer system along with any software program and this is bad news for the users of FTP. otherwise referred to as file transfer protocol. The Viruses can also become a problem when there is referencing done and email attachments are being used. When the virus enters the PC system, it can attach itself to, or even replace an existing program. This of course isn't good for the user, who will ultimately open the attachment or file and cause the PC virus to be activated.

    Types of Computer Viruses

    How Are Computer Viruses Spread?


    Having a Computer Viruses unleash itself within a PC system can be a nightmare for the user, as this is most often done unintentionally but with no less detrimental effects. There's no possible way to detect how a virus really attacks and spreads but a lot of effort is put into how to ensure the damage done is as minimal as possible.

    How They Get Around

    The following are some of the more frequent ways that PC Viruses can spread from one computer system to another effectively until detection is almost too late to save the infected material:

    Email attachments are by far the most popular way that viruses notice their way into the user’s PC system. When Microsoft’s Outlook Express automatically opens attachments to emails received, the Computer virus is automatically unleashed on the system. However, most users now tend to avoid opening attachments they are unfamiliar with and instead resort to immediately deleting them to ensure the PC virus does not gain access into the system.

    Rogue sites are another problem area for unleashing viruses. Sometimes the virus is introduced into the system by simply visiting sites without knowing the possibility of the PC virus being embedded in the Website’s content. Thus when the Website is downloaded, so will be the virus too.

    Networks are also another popular way the Computer virus is able to gain some momentum, as any user on the same server opening a Website where there is a virus will unleash the virus onto other users’ systems too. It usually takes only one party to accidentally open an infected Website and all the other users on the network will be exposed to the virus infecting their systems too.

    Infected disks are sometimes the cause of the Computer viruses spreading, as the user of the infected disk is the source of the hard drive being infected and thus corrupting all the material on the hard drive itself.

    Computer Viruses Definition

    How Bad Can A Virus Attack Be?

    Computer Viruses Are Serious

    A Computer Viruses in itself is a very damaging program and when unleashed on a PC system, the damage can be quite devastating, to say the least. Even in the mildest form, PC Viruses can and usually do, cause a lot of damage to the user’s system.

    It would appear that the virus is able to show the vulnerability of the user and the tools getting used, while at the same time these PC viruses are able to display just how innovative the inventor can be if there's a need to inflict online damage, without any actual physical intervention. Phenomenal numbers have been documented within the very small window of time that it takes to cause devastating damage to a PC system. 

    Some of the injuries done won't be able to be rectified, thus causing the user to lose all the data permanently. Applications can also be lost but usually, it is fairly simple to download again but this isn't so possible when it comes to data loss. PC Viruses are usually designed to represent a small piece of software that latches onto existing programs until it is activated and then launches into damage mode. 

    An example of such would be the almost unavoidable use of spreadsheet Software as this particular application is Sure to be open often thus making it an ideal place to attach the virus to. viruses are also another area wherever there are usually devastating results from the invasion of Computer Viruses

    This is particularly thus if the user tends to open attachments without proper care or scrutiny. Trojan horses are also another simple PC programs that claim to perform with one objective but usually come with the intention of infecting the user’s system with a virus.

    Removing The Computer Virus protection Automatically


    Having to deal with virus invasions is part of everyday computer system usage. It is almost impossible to eradicate the problem completely but the good news is, this is certainly controllable.

    Get Rid Of That Bug

    The user Will have to explore all the various Computer antivirus applications available to identify one that is most suitable for the current needs when going online. This exercise is very important as it will give the user a fighting chance of ensuring damage, if any, is considered minimal.

    Removing viruses doesn't essentially mean that the user Will've to erase all the material on the system and start all over again, as in most cases the PC virus can be dealt with, without having to resort to such forceful measures. Therefore, the user will first have to identify the particular virus in question and then go about finding a suitable counter-active antivirus program that can be used to tackle the unpleasant task of eradicating the virus and stopping it from inflicting more harm. However, it ought to be noted that in almost all cases, some percentage of data is usually lost.

    Perhaps the primary step will be to identify the kinds of work and online activities the user intends to participate in. If this Can be found to be fairly consistent in choice, then at the very onset of use, the individual can have some suitable antivirus programs installed into the system to detect, control, or minimize any invasion that manages to pass through the Computer Viruses programs in place. These programs will run automatically whenever the PC system is activated and are perhaps a very good form of preventive measures that can be taken.

    Windows Server 2012
    Osi Model Layers