wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virus

profile
Prudhvi Gubbala
Aug 26, 2022
0 Likes
0 Discussions
86 Reads

Virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected".

Some of the examples that viruses effect the computers: it can steal data or passwords, log keystrokes, spam your email contacts, corrupt files, erase data, cause permanent damage to the hard disk, and sometimes can even take over your device control.

viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage. A key thing to know about  viruses is that they are designed to spread across programs and systems. Viruses typically attach to an executable host file, which results in their viral codes executing when a file is opened. The code then spreads from the document or software it is attached to via networks, drives, file-sharing programs, or infected email attachments.

Some types of virus are:

Boot Sector Virus.

Overwrite Virus.

Direct Action Virus. 

Web Scripting Virus.

Polymorphic Virus.

Directory Virus.

Macro Virus.

Memory Resident Virus.

Among these viruses are Trojans, malware, adware, and worms, etc.


Comments ()


Sign in

Read Next

Memory Management

Blog banner

Zoho

Blog banner

INTRANET

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

File management in os

Blog banner

Vikrant’s first blog

Blog banner

Landslide Hazard

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Memory heirachy (Operating system)

Blog banner

Yoga in INDIA and ABROAD

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

Cache Memory

Blog banner

Multicore CPUs

Blog banner

Assignment-3

Blog banner

GIS in Disaster Management

Blog banner

Memory Management

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Virtual memory

Blog banner

FREE VERSION OF G-MAIL

Blog banner

E-Governance

Blog banner

therapist blog

Blog banner

RAID

Blog banner

Different memory allocation strategies

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

A Journey By Train

Blog banner

Install Ubuntu Easily

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Blockchain uses and use cases

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

Swiggi

Blog banner

Raid

Blog banner

Interrupts in operating system.

Blog banner

Hypothesis Testing in Data Science

Blog banner

MAILFENCE

Blog banner

Friendship

Blog banner

virtual machines and virtualization

Blog banner

BENIFITS OF YOGA

Blog banner

What is Data, Information and Knowledge?

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

Fashion design

Blog banner

RAID and It's Levels

Blog banner