SlideShare a Scribd company logo
Explore Which Types of Viruses Can Affect Your Computer?
With our increasing reliance on computers, the chances of it being affected by a virus have also
increased. Viruses essentially are codes that alter the way the computer functions as it gets
transmitted from one device to another. Your computer may have been working perfectly well until
one day when it malfunctions and begins to crash or slows down or causes data loss-related
issues. Computer support Worcester MA experts suggest that when you see your perfectly fine
device malfunctioning as such, it is quite certain that a virus has taken its place. However, there
are many types of viruses that may affect your device. Hence, it is essential to understand what
are the different types of viruses, how they can affect your device, and what could be the possible
next steps in getting rid of them.
1. Resident Virus: These are the worst form of computer viruses that seriously affect your
computer’s performance by gaining near-complete control of whatever they can access.
A resident virus essentially stores itself in the device memory and hence gains control
over the overall performance of the system. In fact, it can even attach itself to the antivirus
and begin to attack that, hence leading to increased vulnerability of the system.
2. Direct Action Virus: Computer services Marlborough MA explain that this form of the
virus is easy to get rid of once identified. They are also known as file infector viruses and
essentially enter your computer by attaching themselves to .exe or .com files. Once that
file has been opened or installed, these viruses enter your system and begin to gain
access to other files on your computer. Since it attaches itself to files, this virus essentially
affects your access to files in your computer and may sometimes even lead to data loss.
However, a decent level of computer anti-virus software should be able to get rid of these
easily.
3. Web Scripting Virus: As the name suggests, this virus enters your computer through the
web. This is another kind of virus that is stressful to deal with and may require professional
help from IT support Marlborough teams. The virus essentially infiltrates your browser’s
security and then allows hackers to extract your data. In the worst case, this virus may
cause your personal and financial information to reach the wrong hands.
4. Macro Virus: This is a deceptive form of the virus that is commonly found in programs
like Word and Excel. This happens because Word and Excel are written in a macro
language and hence the virus attempts to mimic that to gain access to your files. Since
they look very similar to any other Excel or Word file, they can get into your system very
easily. And once you open these documents your computer gets infected almost
immediately or you are redirected to a malicious website. If all the performance and data
loss due to the virus wasn’t enough, it can also send itself to other people in your contact
list. Because of such widespread effects, it’s crucial to get this virus sorted out
immediately.
While this list is not exhaustive, these are some of the common viruses that may affect your
system and how to identify what virus has entered. In any case of virus infiltration, a computer
repair Worcester MA professional would be the best help to get your computer sorted again!

More Related Content

What's hot

Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
San Diego Continuing Education
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
 
Computer virus
Computer virusComputer virus
Computer virus
Sahib Sethi
 
Computer virus
Computer virusComputer virus
Computer virus
arif srk
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
sharing notes123
 
Code Red Virus
Code Red VirusCode Red Virus
Code Red Virus
smithz
 
Code Red Worm
Code Red WormCode Red Worm
Code Red Worm
RaDe0N
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
Imtiaz Ahmed
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
Priyatham Galisetty
 
Computer virus
Computer virusComputer virus
Computer virus
nutantripathi
 
Internet security issues
Internet security issuesInternet security issues
Internet security issues
irfan shaikh
 
Data loss causes and its threats
Data loss causes and its threatsData loss causes and its threats
Data loss causes and its threats
Remo Software
 
Computer virus
Computer virusComputer virus
Computer virus
Priti Singh
 
Virus
VirusVirus
Computer virus
Computer virusComputer virus
Computer virus
Dikshyanta Dhungana
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
casyrichard
 
Virus & Worms(20120628)
Virus & Worms(20120628)Virus & Worms(20120628)
Virus & Worms(20120628)
Tejas Kolge
 
Malware programs
Malware programsMalware programs
Malware programs
Prince Singh
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
amiable_indian
 
As computer virus
As computer virusAs computer virus
As computer virus
achal bisht
 

What's hot (20)

Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Code Red Virus
Code Red VirusCode Red Virus
Code Red Virus
 
Code Red Worm
Code Red WormCode Red Worm
Code Red Worm
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Computer virus
Computer virusComputer virus
Computer virus
 
Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
Data loss causes and its threats
Data loss causes and its threatsData loss causes and its threats
Data loss causes and its threats
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
Virus & Worms(20120628)
Virus & Worms(20120628)Virus & Worms(20120628)
Virus & Worms(20120628)
 
Malware programs
Malware programsMalware programs
Malware programs
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
As computer virus
As computer virusAs computer virus
As computer virus
 

Similar to What types of viruses can affect your computer

What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
ranaanish11062001
 
Computer virus
Computer virus Computer virus
Computer virus
AshishVasan
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
Computer virus
Computer virusComputer virus
Computer virus
Dark Side
 
Virus
VirusVirus
Virus
dddaou
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Virus
VirusVirus
COMPUTER VIRUS blog.pdf
COMPUTER VIRUS blog.pdfCOMPUTER VIRUS blog.pdf
COMPUTER VIRUS blog.pdf
SaifMallick1
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
Muhammad Ramzan
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
PRANJAL SAIKIA
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
mPower Technology
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
Virus
VirusVirus
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
Ammar Hasayen
 

Similar to What types of viruses can affect your computer (20)

What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Computer virus
Computer virus Computer virus
Computer virus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
COMPUTER VIRUS blog.pdf
COMPUTER VIRUS blog.pdfCOMPUTER VIRUS blog.pdf
COMPUTER VIRUS blog.pdf
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Virus
VirusVirus
Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 

More from AGR Technologies

Computer repair in southborough
Computer repair in southboroughComputer repair in southborough
Computer repair in southborough
AGR Technologies
 
Desktop support in marlborough
Desktop support in marlboroughDesktop support in marlborough
Desktop support in marlborough
AGR Technologies
 
Computer repair in marlborough
Computer repair in marlboroughComputer repair in marlborough
Computer repair in marlborough
AGR Technologies
 
Computer repair in northborough
Computer repair in northboroughComputer repair in northborough
Computer repair in northborough
AGR Technologies
 
Desktop support in worcester
Desktop support in worcesterDesktop support in worcester
Desktop support in worcester
AGR Technologies
 
Computer repair in worcester
Computer repair in worcesterComputer repair in worcester
Computer repair in worcester
AGR Technologies
 
IT Support
IT SupportIT Support
IT Support
AGR Technologies
 

More from AGR Technologies (7)

Computer repair in southborough
Computer repair in southboroughComputer repair in southborough
Computer repair in southborough
 
Desktop support in marlborough
Desktop support in marlboroughDesktop support in marlborough
Desktop support in marlborough
 
Computer repair in marlborough
Computer repair in marlboroughComputer repair in marlborough
Computer repair in marlborough
 
Computer repair in northborough
Computer repair in northboroughComputer repair in northborough
Computer repair in northborough
 
Desktop support in worcester
Desktop support in worcesterDesktop support in worcester
Desktop support in worcester
 
Computer repair in worcester
Computer repair in worcesterComputer repair in worcester
Computer repair in worcester
 
IT Support
IT SupportIT Support
IT Support
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 

What types of viruses can affect your computer

  • 1. Explore Which Types of Viruses Can Affect Your Computer? With our increasing reliance on computers, the chances of it being affected by a virus have also increased. Viruses essentially are codes that alter the way the computer functions as it gets transmitted from one device to another. Your computer may have been working perfectly well until one day when it malfunctions and begins to crash or slows down or causes data loss-related issues. Computer support Worcester MA experts suggest that when you see your perfectly fine device malfunctioning as such, it is quite certain that a virus has taken its place. However, there are many types of viruses that may affect your device. Hence, it is essential to understand what are the different types of viruses, how they can affect your device, and what could be the possible next steps in getting rid of them. 1. Resident Virus: These are the worst form of computer viruses that seriously affect your computer’s performance by gaining near-complete control of whatever they can access. A resident virus essentially stores itself in the device memory and hence gains control over the overall performance of the system. In fact, it can even attach itself to the antivirus and begin to attack that, hence leading to increased vulnerability of the system. 2. Direct Action Virus: Computer services Marlborough MA explain that this form of the virus is easy to get rid of once identified. They are also known as file infector viruses and essentially enter your computer by attaching themselves to .exe or .com files. Once that
  • 2. file has been opened or installed, these viruses enter your system and begin to gain access to other files on your computer. Since it attaches itself to files, this virus essentially affects your access to files in your computer and may sometimes even lead to data loss. However, a decent level of computer anti-virus software should be able to get rid of these easily. 3. Web Scripting Virus: As the name suggests, this virus enters your computer through the web. This is another kind of virus that is stressful to deal with and may require professional help from IT support Marlborough teams. The virus essentially infiltrates your browser’s security and then allows hackers to extract your data. In the worst case, this virus may cause your personal and financial information to reach the wrong hands. 4. Macro Virus: This is a deceptive form of the virus that is commonly found in programs like Word and Excel. This happens because Word and Excel are written in a macro language and hence the virus attempts to mimic that to gain access to your files. Since they look very similar to any other Excel or Word file, they can get into your system very easily. And once you open these documents your computer gets infected almost immediately or you are redirected to a malicious website. If all the performance and data loss due to the virus wasn’t enough, it can also send itself to other people in your contact list. Because of such widespread effects, it’s crucial to get this virus sorted out immediately. While this list is not exhaustive, these are some of the common viruses that may affect your system and how to identify what virus has entered. In any case of virus infiltration, a computer repair Worcester MA professional would be the best help to get your computer sorted again!