Main Menu
Articles Home
Most Popular Articles
Top Authors
Submit Articles
Submission Guidelines
Link to Us
Bookmark
Contact Us





Translate this page
 


 
Home / Computers

How Viruses Contaminate Your Computer

By:Jordi Shoman


Viruses are little bits of software that normally have a negative impact on our computers when they are activated. Usually viruses are attached onto other software programs (games, disk utilities, office documents/Macros, screen-savers), and are activated when these normally harmless programs are started.



A virus is inactive until the infected program is run or an infected boot record on a floppy/CD is read. When the virus is activated it loads into your computer's memory where it can perform its nasty job or spread itself to other programs on your system or computers in your network.



Floppy disks used in an infected system (or CD-Roms/DVDs burned on an infected system) can then carry the virus to another machine. Programs downloaded from USENET, or file-sharing programs (Kazaa, Morpheus, Limewire etc.) can also spread a virus. More frequently now, email is also becoming a favourite way to spread viruses, Trojan horses and especially internet worms.



It should be made clear, that USENET and file-sharing programs do not create viruses or infected files in any way. It is certain anti-social people who create viruses, and then use these services to spread the infected files to other users on the system.



This is very similar to cars and highways in that Ford, Toyota or the highway makers do not cause traffic accidents, it is the idiot who got drunk and then drove who causes a 14 car pileup. Of course if there weren't cars or highways there wouldn't be an accident... then again, the idiot would still be getting smashed and driving his horse-carriage into the store window.



When you get a virus on your computer, it can erase everything that you have on your hard drive. Each virus is different - some of them come up as strange messages on your screen, while others just work at eroding the files on the computer. A virus just doesn't appear in your computer - you have to put them there, usually by running program from the Internet that contain viruses. They sometimes come from attachments in emails. It is possible that an email from a friend could contain a virus if that person's computer is infected. With anti-virus software installed on your computer, this will tell you whether or not it is safe to open the email with a message such as "No virus detected in incoming mail:



When you do get a virus through programs or mail, it hides in your computer and when you save data in the computer, you also save the virus. Then it starts to infect all the other files in your computer. When you send files to a friend or co-worker, you also send the virus to his/her computer. After a while the virus starts to crowd the data in your files and causes major problems with the system, such that you may not even be able to open important documents or you may not be able to open any of the programs on the computer. The virus won't affect the memory of your computer, but it will affect any disks that you use to save your work.



Digg del.icio.us Blink Stumble Spurl Reddit Netscape Furl

Article keywords: antivirus software, norton antivirus, pccillin, anti virus, norton, virus, trojan horse

Article Source: http://www.articles3k.com

Anti virus software and general PC protection and maintenance are essential for safe and secure computing. Right now learn to easily block trojan horses, spyware, computer viruses, and other malicious software.








Related Articles
  • 1). Is A Computer Repair Franchise Right For You?  By : Joe Duchesne
    Starting a computer repair business is not for everyone. Starting one from scratch is even less appealing to most people. One way to dramatically reduce the potential for business failure is to buy into a computer repair franchise. There are some real positives to doing this but there are also at least a couple of negatives. First the positive. A good franchise opportunity will offer you lots of training and support.

  • 2). Infrared And Bluetooth: Connecting Things Easier  By : Robert Thatcher
    With different electrical devices produced everyday, the problem of connecting things is becoming more and more complex. The system that comprises the computers and other electronic devices makes use of varieties of connecting wires, cables and the likes. These parts communicate trough light beams, lasers, radio signals and infrared. However, the problem with this devices and technologies is often the connection between each component.

  • 3). Blu-ray Technology  By : John Richardson
    New technology is now making it possible for viewers to record and store high definition programming onto DVDs. Blu-ray Disc is one method of recording HD content onto an optical disc. A blue-laser optical disc (MPEG-2 or MPEG-4) is used. Systems that use this technology will be able to play traditional DVDs, but the goal of Blu-ray is to create an image that's as close to the HD format as possible.

  • 4). Things To Consider When Buying An Intercom  By : Mike Davidson
    An intercom is an electronic communication system that is commonly found in hospitals, schools, offices and other large buildings, in ships and liners, and even in homes. With just a push of a button, an intercom system enables people in different rooms to communicate with each other in an instant. The intercom is now becoming a popular component not only of workplaces but also of every household.

  • 5). IT Specialist: Why Narrow It Down?  By : Joshua Feinberg
    If you're trying to grow your business, why would you turn away potential clients? In this article, you'll learn that as an IT specialist, your marketing efforts are less about turning away other clients and instead about finding if you have enough prospects to market to. If you know that your best clients are small accounting offices, do a quick search to find out how many small accounting offices there are in one hour radius of where you're located.

  • 6). Media Players And The Digital Age  By : Mike Johnston
    It is important for you to know exactly what a media player is, and how you may want to use it with your lifestyle. Remember the longer you wait to learn, the more you will feel left behind and possibly be missing many entertainments features too. The word multimedia player has its beginnings with the media technology from radio and TV. It is just another form of communication written in computer software as files, which creates another form of communication for people to use.

  • 8). How To Remove Winfixer 2005 Plus Unwanted Spyware And Adware  By : Edward Toppe
    Spyware and adware is advertising supported software that allows its publishers to snoop on a computer user's internet activity. It is designed to obtain information about computer users and their surfing behavior usually without their knowledge or consent. Spyware is potentially more harmful than Adware because it can record your keystrokes, history, passwords, credit card number and other confidential and private information.

  • 9). Online Backup: The Simple Value  By : Sandy Baker
    There are many reasons to use online backup. The simple fact is that your computer could get invaded or destroyed in minutes and it can happen completely and suddenly as well. The fact is that more and more people are falling victim to this type of occurrence every day. What happens is that it leaves you without all that you know and need and leaves you without any way of fixing it.

  • 10). Three Ways To Jumpstart Your IT Career  By : Chris Bryant, CCIE #12933
    We all get stuck in ruts from time to time, and that happens on the job as well. You've thought about doing something different with your information technology career, but just haven't quite gotten around to it yet. Sound familiar? You can make 2006 the best year yet for your IT career. There are several simple steps you can take to accelerate your career - but you have to take the step, not just think about it! Learn something new.



 


© 2013 articles3k.com - Privacy Policy