SlideShare a Scribd company logo
1 of 13
The term “boot sector” is a generic name that
seems to originally come from MS-DOS but is
now applied generally to the boot information
used by any operating system. In modern
computers this is usually called the “master boot
record,” and it is the first sector on a partitioned
storage device.
Boot sector viruses became popular because of
the use of floppy disks to boot a computer. The
widespread usage of the Internet and the death
of the floppy has made other means of virus
transmission more effective.
This type of virus, which can spread itself in numerous ways
including voluntary download, effectively hijacks certain
browser functions, usually in the form of re-directing the user
automatically to particular sites. It’s usually assumed that this
tactic is designed to increase revenue from web
advertisements
This type of virus, unlike most, only comes into
action when the file containing the virus is
executed. The payload is delivered and then the
virus essentially becomes dormant – it takes no
other action unless an infected file is executed
again.
Most viruses do not use the direct action method
of reproduction simply because it is not prolific,
but viruses of this type have done damage in the
past. The Vienna virus, which briefly threatened
computers in 1988, is one such example of a
direct action virus.
Perhaps the most common type of virus, the file infector
takes root in a host file and then begins its operation
when the file is executed. The virus may completely
overwrite the file that it infects, or may only replace parts
of the file, or may not replace anything but instead re-
write the file so that the virus is executed rather than the
program the user intended.
Although called a “file virus” the definition doesn’t apply
to all viruses in all files generally – for example, the
macro virus below is not referred to by the file virus.
Instead, the definition is usually meant to refer only to
viruses which use an executable file format, such as .exe,
as their host.
A wide variety of programs, including productivity
applications like Microsoft Excel, provide support for
Macros – special actions programmed into the document
using a specific macro programming language.
Unfortunately, this makes it possible for a virus to be
hidden inside a seemingly benign document.
Macro viruses very widely in terms of payload. The most
well known macro virus is probably Melissa, a Word
document supposedly containing the passwords to
pornographic websites. The virus also exploited Word’s
link to Microsoft Outlook in order to automatically email
copies of itself.
While some viruses are happy to spread via one
method or deliver a single payload, Multipartite viruses
want it all. A virus of this type may spread in multiple
ways, and it may take different actions on an infected
computer depending on variables, such as the
operating system installed or the existence of certain
files.
Another jack-of-all-trades, the Polymorphic virus actually
mutates over time or after every execution, changing the
code used to deliver its payload. Alternatively, or in
addition, a Polymorphic virus may guard itself with an
encryption algorithm that automatically alters itself when
certain conditions are met.
The goal of this trickery is evasion. Antivirus programs
often find viruses by the specific code used. Obscuring or
changing the code of a virus can help it avoid detection.
This broad virus definition applies to any virus that inserts
itself into a system’s memory. It then may take any
number of actions and run independently of the file that
was originally infected.
A resident virus can be compared to a direct payload
virus, which does not insert itself into the system’s
memory and therefore only takes action when an infected
file is executed.
Many websites execute complex code in order to provide
interesting content. Displaying online video in your
browser, for example, requires the execution of a specific
code language that provides both the video itself and the
player interface.
Of course, this code can sometimes be exploited, making
it possible for a virus to infect a computer or take actions
on a computer through a website. Although malicious
sites are sometimes created with purposely infected code,
many such cases of virus exist because of code inserted
into a site without the webmaster’s knowledge.
The threat of viruses infecting our computers is a serious matter. Luckily,
the steps for avoiding an infection on your equipment are relatively simple.
1. The first step in preventing infection is by installing anti-virus software
on your all your computers. A good antivirus system will scan your machine
regularly to clean it from any infected files. Some popular antivirus systems
are Norton Antivirus, Panda Antivirus and McAfee. It is advised to NOT
connect to the Internet without AV protection – the cost is well worth it.
Update your anti-virus software regularly. Over 200 viruses are
discovered each month, so you'll want to be protected.
3. WHEN IN DOUBT, THROW IT OUT! Always use caution and do not
open, download, or execute any suspicious files or email attachments. If the
file was in fact legitimate, you can always ask the sender to resend it. Do not
open any files attached to an email
Delete chain emails and junk email. Do not forward or reply to
any to them. These types of email are considered spam, which is
unsolicited, intrusive mail that clogs up the network.
2. Use caution when downloading files from the Internet. Ensure
that the source is a legitimate and reputable one. Verify that an
anti-virus program checks the files on the download site. If you're
uncertain, don't download the file at all.
3. Back up your files on a regular basis. If a virus destroys your
files, at least you can replace them with your back-up copy.
Computer virus

More Related Content

What's hot

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..Sid1256
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Assignment of virus
Assignment of virusAssignment of virus
Assignment of virusHuma Tariq
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Computer virus
Computer virusComputer virus
Computer virushrithikjha
 
As computer virus
As computer virusAs computer virus
As computer virusachal bisht
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Virus & Worms(20120628)
Virus & Worms(20120628)Virus & Worms(20120628)
Virus & Worms(20120628)Tejas Kolge
 

What's hot (20)

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Assignment of virus
Assignment of virusAssignment of virus
Assignment of virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
Virus  Virus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Virus & Worms(20120628)
Virus & Worms(20120628)Virus & Worms(20120628)
Virus & Worms(20120628)
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 

Viewers also liked

CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"Mikee Monte de Ramos
 
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...COWCATCHER Publications
 
Health issues of ICT
Health issues of ICTHealth issues of ICT
Health issues of ICTCJ900
 

Viewers also liked (7)

CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Rohan dev
Rohan devRohan dev
Rohan dev
 
Computer virus
Computer virusComputer virus
Computer virus
 
Chemistry pbl
Chemistry pblChemistry pbl
Chemistry pbl
 
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
 
Health issues of ICT
Health issues of ICTHealth issues of ICT
Health issues of ICT
 

Similar to Computer virus

Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Computer Virus
Computer Virus Computer Virus
Computer Virus bebo
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threatSadaf Walliyani
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 

Similar to Computer virus (20)

Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Virus
VirusVirus
Virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer virus
Computer virus Computer virus
Computer virus
 

Recently uploaded

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

Computer virus

  • 1.
  • 2. The term “boot sector” is a generic name that seems to originally come from MS-DOS but is now applied generally to the boot information used by any operating system. In modern computers this is usually called the “master boot record,” and it is the first sector on a partitioned storage device. Boot sector viruses became popular because of the use of floppy disks to boot a computer. The widespread usage of the Internet and the death of the floppy has made other means of virus transmission more effective.
  • 3. This type of virus, which can spread itself in numerous ways including voluntary download, effectively hijacks certain browser functions, usually in the form of re-directing the user automatically to particular sites. It’s usually assumed that this tactic is designed to increase revenue from web advertisements
  • 4. This type of virus, unlike most, only comes into action when the file containing the virus is executed. The payload is delivered and then the virus essentially becomes dormant – it takes no other action unless an infected file is executed again. Most viruses do not use the direct action method of reproduction simply because it is not prolific, but viruses of this type have done damage in the past. The Vienna virus, which briefly threatened computers in 1988, is one such example of a direct action virus.
  • 5. Perhaps the most common type of virus, the file infector takes root in a host file and then begins its operation when the file is executed. The virus may completely overwrite the file that it infects, or may only replace parts of the file, or may not replace anything but instead re- write the file so that the virus is executed rather than the program the user intended. Although called a “file virus” the definition doesn’t apply to all viruses in all files generally – for example, the macro virus below is not referred to by the file virus. Instead, the definition is usually meant to refer only to viruses which use an executable file format, such as .exe, as their host.
  • 6. A wide variety of programs, including productivity applications like Microsoft Excel, provide support for Macros – special actions programmed into the document using a specific macro programming language. Unfortunately, this makes it possible for a virus to be hidden inside a seemingly benign document. Macro viruses very widely in terms of payload. The most well known macro virus is probably Melissa, a Word document supposedly containing the passwords to pornographic websites. The virus also exploited Word’s link to Microsoft Outlook in order to automatically email copies of itself.
  • 7. While some viruses are happy to spread via one method or deliver a single payload, Multipartite viruses want it all. A virus of this type may spread in multiple ways, and it may take different actions on an infected computer depending on variables, such as the operating system installed or the existence of certain files.
  • 8. Another jack-of-all-trades, the Polymorphic virus actually mutates over time or after every execution, changing the code used to deliver its payload. Alternatively, or in addition, a Polymorphic virus may guard itself with an encryption algorithm that automatically alters itself when certain conditions are met. The goal of this trickery is evasion. Antivirus programs often find viruses by the specific code used. Obscuring or changing the code of a virus can help it avoid detection.
  • 9. This broad virus definition applies to any virus that inserts itself into a system’s memory. It then may take any number of actions and run independently of the file that was originally infected. A resident virus can be compared to a direct payload virus, which does not insert itself into the system’s memory and therefore only takes action when an infected file is executed.
  • 10. Many websites execute complex code in order to provide interesting content. Displaying online video in your browser, for example, requires the execution of a specific code language that provides both the video itself and the player interface. Of course, this code can sometimes be exploited, making it possible for a virus to infect a computer or take actions on a computer through a website. Although malicious sites are sometimes created with purposely infected code, many such cases of virus exist because of code inserted into a site without the webmaster’s knowledge.
  • 11. The threat of viruses infecting our computers is a serious matter. Luckily, the steps for avoiding an infection on your equipment are relatively simple. 1. The first step in preventing infection is by installing anti-virus software on your all your computers. A good antivirus system will scan your machine regularly to clean it from any infected files. Some popular antivirus systems are Norton Antivirus, Panda Antivirus and McAfee. It is advised to NOT connect to the Internet without AV protection – the cost is well worth it. Update your anti-virus software regularly. Over 200 viruses are discovered each month, so you'll want to be protected. 3. WHEN IN DOUBT, THROW IT OUT! Always use caution and do not open, download, or execute any suspicious files or email attachments. If the file was in fact legitimate, you can always ask the sender to resend it. Do not open any files attached to an email
  • 12. Delete chain emails and junk email. Do not forward or reply to any to them. These types of email are considered spam, which is unsolicited, intrusive mail that clogs up the network. 2. Use caution when downloading files from the Internet. Ensure that the source is a legitimate and reputable one. Verify that an anti-virus program checks the files on the download site. If you're uncertain, don't download the file at all. 3. Back up your files on a regular basis. If a virus destroys your files, at least you can replace them with your back-up copy.