Skip to main content

Free Stuff

ABC of Computer Virus

One of the biggest fears among new computer users is being infected by a computer virus or programs designed to destroy their personal data. Viruses are malicious software programs that have been designed by other computer users to cause destruction and havoc on a computer and spread themselves to other computers where they can repeat the process.


Once the virus is made, it is often distributed through shareware, pirated software, e-mail, P2P programs, or other programs where users share data.


History:
          A computer virus is a software program that was first written Rich Skrenta in 1982 who was a 15-year old high school student. Known as The Elk Cloner this virus spread to other computers by monitoring the floppy drive and copying itself to any floppy diskette that was inserted into the computer. Once a floppy diskette became infected it would infect all other computers that disk was inserted into, each computer that was infected would then infect every floppy diskettes inserted into it. A computer that was infected would also display a short poem on every 50th boot.


Computer users can help protect themselves against computer viruses, malware, and other computer security threats by installing an antivirus protection program.


How its contracted:
                         In the past the majority of computer viruses were contracted from users sharing data using floppy diskettes. However, with the increased popularity of the Internet most computer viruses are contracted today through e-mail and by downloading software over the Internet or P2P sharing.


Virus properties:
                     Below is a listing of some of the different properties a computer virus is capable of having and what the particular property is capable of doing. Keep in mind that not all viruses will have every one of these abilities.


Your computer can be infected even if files are just copied.Because some viruses are memory resident, as soon as a diskette or program is loaded into memory, the virus then attaches itself into memory and then is capable of infecting any file on the computer you have access to.


Can be Polymorphic. Some viruses have the capability of modifying their code, which means one virus could have various amounts of similar variants. This is also true with e-mail viruses that change the subject or body of the message to help from being detected.


Can be memory or non-memory resident. As mentioned earlier a virus is capable of being either memory resident where the virus first loads into memory and then infects a computer or non-memory resident where the virus code is only executed each time a file is opened.


Can be a stealth virus. Stealth viruses will first attach itself to files on the computer and then attack the computer; this causes the virus to spread more rapidly.


Viruses can carry other viruses. Because viruses are only software programs a virus may also carry other viruses making the virus more lethal and help the primary virus hide or assist the primary virus with infecting a particular section of the computer.


Can make the system never show outward signs. Some viruses can hide changes made, such as when a file was last modified making the virus more difficult to detect.


Can stay on the computer even if the computer is formatted.Some Viruses have the capability of infecting different portions of the computer such as the CMOS battery or master boot record. Finally, if a computer is completely erased and the virus is on a backup disk it can easily re-infect the computer.


How virus may affect files:


Viruses can affect any files; however, usually attack .com, .exe, .sys, .bin, .pif or any data files - Viruses have the capability of infecting any file; however, will generally infect executable files or data files, such as word or excel documents that are opened frequently and allow the virus to try infecting other files more often.


Increase the files size - When infecting files, virtues will generally increase the size of the file; however, with more sophisticated viruses these changes can be hidden.


It can delete files as the file is run - Because most files are loaded into memory, once the program is in memory the virus can delete the file used to execute the virus.


It can corrupt files randomly - Some destructive viruses are not designed to destroy random data but instead randomly delete or corrupt files.


It can cause write protect errors when executing .exe files from a write protected disk - Viruses may need to write themselves to files that are executed; because of this, if a diskette is write protected, you may receive a write protection error.


It can convert .exe files to .com files - Viruses may use a separate file to run the program and rename the original file to another extension so the exe is run before the com.


It can reboot the computer when executed - Numerous computer viruses have been designed to cause a computer to reboot, freeze, or perform other tasks not normally exhibited by the computer.


What viruses may do to a computer:
                                                Below are different issues you may experience when you are infected with a virus. Keep in mind that you also may be experiencing any of the below issues by another computer related issue and not a virus.


1. Delete files.
2. Various messages in files on programs.
3. Changes volume label.
4. Make clusters as bad in FAT.
5. Randomly overwrites sectors on the hard disk.
6. Replaces the MBR(Master Boot record) with own code.
7. Create more than one partition.
8. Attempts to access the hard disk drive, which can result in error messages such as "Invalid drive specification".
9. Causes cross-linked files.


and much more...


Detecting Viruses:
                       The recommended method of detecting and cleaning the computer from any computer viruses or other malware is an antivirus protection program.
           Alternatively, a user can look at various aspects of the computer and detect possible signs indicating a virus is on the computer. While this method can be used to determine some viruses, it cannot clean or determine the exact virus you may or may not have and is not recommended.


enjoy with us.
support the blog, Click on ads

Comments

Popular posts from this blog

All about ZIKA virus

Here's all you need to know about the Zika virus - from the dangers it poses to pregnant women to the steps one can take to minimise risk of exposure. Q: What is the Zika virus? A: It is a virus infection transmitted by the bite of an infected Aedes mosquito, which also carries the dengue and chikungunya viruses. It is generally a mild disease; four in five people who become infected with Zika do not show any symptoms but could be infectious. Q: What are the symptoms? A: They include a fever, an itchy rash, body aches, headache, red eyes and occasionally, nausea and vomiting. These usually develop within three to 12 days after the mosquito bite and often last between four and seven days. Q: Who is at greatest risk? A: Unborn babies are the most at risk should their mothers become infected with the Zika virus. Between 1 per cent and 10 per cent of women infected during pregnancy give birth to babies with defects. The most common defect is microcephaly, where the...

Six Best Android Apps for Geeks

1. ConnectBot:  Every geek will always have a hand on these kind of stuffs. Forget your PC or laptop and guess this SSH Client will satisfy all your ultimate geeky thing. ConnectBot is a powerful open-source Secure Shell (SSH) client. It can manage simultaneous SSH sessions, create secure tunnels, and copy/paste between other applications. This client allows you to connect to Secure Shell servers that typically run on UNIX-based servers. Use Connect Bot to maximum number of sessions and feel like GOD Features: -Support device with hardware keyboard. - Popup keyboard with all those normally hard to find characters - Use the volume keys to quickly change font size - External keyboard support - Telnet support - Local Android terminal support - Click URLs to open in a browser - Copy & Paste within sessions - UTF-8 character support - Easily organise your connections by group - Keep multiple SSH sessions running in the background - Password & OpenSSH privat...

786 - What really it is ?

Over the years, I have come across many misconceptions of 786, many heated debates on it as well. Personally I found it hard to believe that we can simply summaries an ayat of Quraan with 3 numbers. Anyway, below is an answer to the nagging question “What is the significance of 786?” “786″ – Does it stand for Bismillah-hir Rahman-nir Raheem’? For those who seek the Truth or the sake of the Truth. 786 being used by people who are misguided as the numerical representation of “Bismillah-hir Rahmaan-nir Raheem” should be informed that it has no religious or Islamic significance whatsoever. The numerals 786 or any other numerals does not represents “Bismillah-hir Rahman-nir Raheem” or any other Surah of the Most Noble and Holy Qur’an and is not a Sunnah either. CAN NUMBER 786 REPLACE THE HOLY NAME OF ALMIGHTY ALLAH AZZA WAJJAL MOST EXALTED? Almighty Allah Rabbul Ala’meen tells us very clearly in verse 2 of Surah Yusuf: “Verily, We have sent it down as an Arabic Qura...