Computer Support System

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 30 April 2011

How Computer Virus Works?

Posted on 00:08 by Unknown
Strange as it may sound, the computer virus is something of an Information Age marvel. On one hand, viruses show us how vulnerable we are -- a properly engineered virus can have a devastating effect, disrupting productivity and doing billions of dollars in damages. On the other hand, they show us how sophisticated and interconnected human beings have become.
For example, experts estimate that the Mydoom worm infected approximately a quarter-million computers in a single day in January 2004. Back in March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained. TheILOVEYOU virus in 2000 had a similarly devastating effect. In January 2007, a worm called Storm appeared -- by October, experts believed up to 50 million computers were infected. That's pretty impressive when you consider that many viruses are incredibly simple.
When you listen to the news, you hear about many different forms of electronic infection. The most common are:
  • Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.
  • E-mail viruses - An e-mail virus travels as an attachment toe-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software [source:Johnson].
  • Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.
  • Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
In this article, we will discuss viruses -- both "traditional" viruses and e-mail viruses -- so that you can learn how they work and understand how to protect yourself.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Blog, File Sharing, Free Articles, My Computer, Virus | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Clearing Hard Drive Space on Windows XP
    Windows XP was released way back in 2001, so what should you do when you’re running out of hard drive space for these 2009 programs? Clearin...
  • What to Look For When Purchasing a Mouse
    The mouse is probably the most essential part of many users experience with computers. Your mouse can affect the ease of browsing around the...
  • How To: Install Windows Mobile 6.5 Right Now
    The bad news:  Windows Mobile 6.5  won't be coming out for a while, and you'll be expected to buy a whole new phone to get it. The g...
  • Windows Explorer Keyboard Shortcut
    Windows Explorer keyboard shortcuts Press To END Display the bottom of the active window. HOME Display the top of the active window. NUM LOC...
  • Automate Windows Maintenance Tasks to Keep Your PC Running Like New
    With a Windows computer there are several maintenance tasks you should run on a regular basis, though most of us forget. Here’s how to autom...
  • Submit googleaddurl.com
    Google adds new sites to our index, and updates existing ones, every time we crawl the web. If you have a new URL, tell us about it here. We...
  • How to Delete Everything on Your Computer
    There are people who want to delete everything in their computer and want to start from scratch again. But the problem is that they do not k...
  • Blogspot vs Wordpress
    WordPress Vs. Blogger: Which Should You Choose for Your Professional Blog? You've made the decision to start a professional blog. Now yo...
  • How to make Elastomer (Botle)
    Material : A. Thermoplastic - Heated melt - Cooled → back to its original kesifat Example : Polyethylene , polypropylene , polyst...
  • Windows Keyboard Shortcut Overview
    General keyboard shortcuts Press To CTRL+C Copy. CTRL+X Cut. CTRL+V Paste. CTRL+Z Undo. DELETE Delete. SHIFT+DELETE Delete selected item per...

Categories

  • Access Media Collection
  • Add HTML facebook on site
  • addurl
  • Administration Tools
  • Adsense
  • Anatomy Virus
  • Animator
  • Anomymity
  • Anti Virus
  • Applications Install
  • BELAJAR PHOTOSHOP
  • Blog
  • Blufftop
  • CA-CLIPPER INTERNAL ERROR
  • Cannot Open Password
  • Celebs
  • Computer Desk
  • Computer Hang
  • Computer Icon
  • Computer Management
  • Computer Repair
  • Computer Set Up
  • Computer Tablet
  • Computer Touch Screen
  • Computer Troubleshooting
  • Cookies
  • Cookies Definitions
  • Crack
  • Create DVD
  • Create DVD Maker
  • Create PDF
  • Create PDF using Smart PDF Creator
  • D-Link
  • D-Link Router
  • Database Format
  • Definitions of Virus
  • Device
  • Device Manager
  • DNS
  • Doc Protect
  • Dongle USB
  • Drive partitions
  • Drive parts
  • Driver Printer HP
  • DVD compress
  • DVD Drive
  • Earn Money
  • Easy Gif Animator
  • Elastomer
  • Eror Format
  • Eror Solution
  • Error Computer
  • ERROR Solutions
  • Error windows explorer
  • External Hard Drive
  • Facebook
  • Facebook and Site
  • File Sharing
  • Football Game
  • Free Articles
  • Free Internet
  • Game Sport
  • Googel
  • Hack Password
  • Hard Drive
  • Hard Drive Partitioning
  • Healty
  • Help and Support
  • Help Support
  • Household Aplieance
  • How to
  • How to Download
  • HP Lapotop Reviews
  • Inside Adsense
  • intall
  • Intall Windows 7 Ultimates
  • Internet
  • Internet Browser
  • Internet Explore
  • Ipad
  • Java Programe
  • Java Script
  • JPEG JPG GIF PNG BMP
  • Keyboard
  • Keygen Smadav 8.7
  • Laptop
  • Laptop Computer Skin
  • Laptop vs PC
  • Life Style
  • Local Area Network
  • Maintanance and Repair
  • Make CD iso
  • Make DVD
  • Make Money with blog
  • Make Your Own Copy-Protected CD with Passive Protection
  • Messenger and Chat
  • Microsoft
  • Mobile Aplications
  • Mobile Phone
  • Modem
  • MotorSport
  • Ms Word Applications
  • MS Word to PDF
  • Ms Words
  • My Computer
  • Network Set Up
  • Networking
  • NVIDIA GeForce
  • Online Shoping
  • Operating System
  • Partitions drive
  • Password Wifi
  • PC Desktop
  • PDF EDITOR
  • PDF Remover
  • Photoshop
  • Picture
  • Prevent Windows XP
  • Print
  • Printer Error
  • Protect CD from Copy
  • Protect Password Folder
  • Protect Your Computer
  • Reboot Application
  • Remove Pasword Excel
  • Restore Windows Registry
  • Router
  • Search Engine Index
  • Search Engines Optimizer
  • Security
  • Security System
  • Shortcut
  • Smadav 8.7
  • Smart PDF Creator
  • Social Networking
  • software Protection
  • Solving Probelm
  • Startup Programs
  • SuperBike
  • System Registry
  • System Restore
  • Table Manager
  • Test DVD
  • Test DVD Drive
  • Troubleshooting all
  • Tutorial Java
  • TUTORIAL PHOTOSHOP
  • Upload File to blogger
  • Upload Files
  • USB Install
  • USB REMOVE
  • USB Repair
  • VGA Card
  • VGA Conector
  • VGA Informations
  • Virtual Memory is to Low
  • Virus
  • Viture Windows 7
  • Watermark
  • What is Cookies
  • Wifi
  • Wifi Pasword Finder
  • Win Pes2011
  • Windows
  • Windows Device
  • Windows DVD Maker
  • windows explorer cannot open
  • Windows Mobile
  • Wireless
  • Wireless router
  • Word Password Remover
  • words documents cannot open
  • Words error
  • XFBML and HTML Facebook

Blog Archive

  • ▼  2011 (70)
    • ►  November (24)
    • ►  September (3)
    • ►  August (2)
    • ►  May (1)
    • ▼  April (24)
      • How Computer Virus Works?
      • HP Laptop Reviews
      • Laptop Computer Skins
      • Computer Desk
      • How to Make a Touch Screen Laptop with Multiple Fi...
      • A "Social Networking Safety Act", Social Networking
      • A Free Internet, If We Can Keep It
      • There’s anonymity on the Internet. Get over it.
      • Make Your Own Copy-Protected CD with Passive Prote...
      • Windows 2000 DNS
      • Windows 2000 Access Management
      • Computer Management
      • How to Use Computer Management on the Local Computer
      • Computer Management
      • 7 Problems Solving Strategies
      • The NetBeans Software
      • Java Comments
      • The Structure of Java Code
      • Sharing your Java Programmes
      • How to Run Your Java Program
      • Printing to the Output Window
      • MEMBUAT EFEK PHOTO BOOTH PADA FOTO
      • MEMBUT GELEMBUNG DI PHOTOSHOP
      • MEMBUAT PATUNG DI PHOTOSHOP
    • ►  March (15)
    • ►  January (1)
  • ►  2010 (168)
    • ►  December (6)
    • ►  November (4)
    • ►  October (124)
    • ►  September (8)
    • ►  August (3)
    • ►  July (2)
    • ►  March (2)
    • ►  February (2)
    • ►  January (17)
Powered by Blogger.

About Me

Unknown
View my complete profile