123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Virus- A Brief Introduction

Profile Picture
By Author: Kay Johnson
Total Articles: 117
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The most common reason for system break down is virus, invading your system. Viruses are software made with the intention of troubling others. There are various ways through these virus trouble people by troubling people. Let us understand the mechanism of how a virus works.

Let us know few facts about Boot infectors. All the disks that is CD, DVD, hard disk have an area that decides, whether the CD or disk is bootable. As you turn the computer on, it starts reading the boot information. The computer then uses the boot information to start in a proper manner. If the boot information is infected, then the computer cannot read the information properly and this is how the virus spreads to the drive of the computer. Once, the code of the boot is on, the hard drive is affected with the virus. Then, it spreads to every disk put on to the computer and infects it with this. Thus, the infection of virus spreads.

Most of the time, these boot virus stay dormant without causing any harm to the system. They are just there. These viruses are designed often to start their work on specific date. These are some dangerous ...
... boot virus, which would disturb the boot information or enforce the complete formatting of the hard drive, as soon as they start activation.

The other type of virus is program infectors. When there is any application infected with virus loaded or run on the computer the virus is transferred to the computer. It affects the memory of the computer. While it is in the memory, any application or new program that is run gets infected with this. These commonly cause multiple infections. It means that the system may crash any time, as there are many programs on your computer.

These programs are dormant for some time, but soon start infecting the programs and then multiple programs and soon they can bring the system to crash. The symptom of this is the program saves the file without any name or improper date or name. These are designed, especially for getting the information out of the shared programs like email, macros, documents, or the compressed files.

The major mode of transfer for these threats or virus is through mails. These are sent as an attachment. In most of the cases, infected computer user without the knowledge attaches an infected file to an email, and sends the email to his relatives and friends. After receiving the email, the virus starts on, when the file attachment is opened, thus infecting a new computer. You need to be extra careful while opening emails with animations, programmed greeting cards, jokes, photographs, spreadsheet and files. There are known weapons recognized to contain virus files. It is always advisable to be very careful while sending or receiving any attachments to your friends or relatives.

This is about the virus that infects the system. To know more about computer security, preventive measures, data recovery and computer repairs, visit our service site savemysystem.co.uk.
Save My System will offer you computer virus removal services in London. We also provideLondon onsite computer repair services.

Total Views: 182Word Count: 525See All articles From Author

Add Comment

Computers Articles

1. Looking For A Tableau Replacement? Try Helical Insight – Open Source Bi Tool
Author: Vhelical

2. Accidentally Deleted Files From Your Hard Drive? Here’s What To Do Next
Author: f2.technology

3. Optimizing Manufacturing With Intelligent Online Production Planning
Author: Logitrac360

4. Extract Food App Review Data For Customer Sentiment
Author: Food Data Scrape

5. How Can Korean Naver Window Scraping Help You Analyze Korean Product Trends?
Author: Mobile App Scraping

6. Web Scraping Organic Vs Paid Listings On Food Apps
Author: Food Data Scrape

7. The Real Cost Of Ignoring Paid Marketing
Author: Nodesure Technologies Pvt Ltd

8. The Ultimate Guide To Height Safety Training In Melbourne
Author: Train Now

9. Why Helical Insight Is The Leading Open Source Business Analytics Tool
Author: Vhelical

10. Reliable Humidity Monitor And Refrigerator Alerting Solutions From Tempgenius For Critical Environments
Author: Chris Miller

11. Discover The Best Lenovo Store And Dell Showroom In Mumbai For Quality Tech
Author: Prachi Grey

12. Revolutionizing Data Reports The Rise Of Open Source Chat-based Reporting Tools
Author: Vhelical

13. Ultimate Guide To Doctor App Development
Author: EMed

14. How To Ensure Accurate Naver Blog Data Scraping On Android And Ios Devices?
Author: Mobile App Scraping

15. Powering Connectivity: Modern Networking Solutions
Author: Trinity Diaz

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: