This website uses cookies to ensure you have the best experience. Learn more

Computer Virus Essay

1196 words - 5 pages

“Computer Virus”

What is a Computer Virus ?
“A Software program able of reproducing itself and usually capable of causing great harm to files or other programs on the same .”
“A virus is a program that may disturb the normal working of a computer virus .”

How is a Computer Virus created?
The following are the points through which the computer virus is created:
* Computer viruses are created by programmers who write code that builds a program with replication and destructive abilities. They do this because they are either malicious for the sake of being destructive or are malicious and driven by corporate disruption or financial gain. Virus code is written ...view middle of the document...

A special case is the virus dropper, programs that carry viral code and spread viruses as they move through a system. This type is a viral carrier rather than a virus itself.


* Viruses target specific objects inside a computer system. They go after files or other programs that exist on the PC or laptop to help the computer function properly. Viruses attack files that have the .com, .sys or .exe extensions. Viruses attack batch files, which are programs that run a series of steps desired by a user. Viruses also seek to destroy highly important areas on a computer, known as boot sectors, which are areas of the hard drive the computer sets aside for launching its important core programming.

Where is the Computer Virus present ?
* Computer Virus is present on the disk of the computer .
* It can also be present in the boot sector of the computer.
* It is present in the folders or the files of the computer.
* A file containing virus is called Infected file.
* Computer Virus is present in online games .
* The harmful virus are present on the side of the web page also.
How Computer Virus damages our data ?
Computer Virus damages the data in different ways .These different ways are as follow:
I) The second name of the virus is the “destruction”.
II) It destroy the data step by step.
III) It hides itself inside the files.
IV) Once the infected file is opened it starts to spread in all the computer .
V) Computer Virus starts deleting the files one by one.
VI) And at last the whole file is completely finished.
VII) The virus remains inside the disks until we formats the disks.

How does Viruses Enter in our Computer ?
The main path which provides the virus to enter inside the computer is the Internet.
The virus enters the computer by sharing networks also.
Inserting the Floppyies ,pen drivers, or CD which consist of virus.
By playing online games.
Watching online movies , plays.
Using any online website or conversation.
By downloading the online and free softwares.
Using artificial windows .
Using the torrent software for downloading.
These all possibilities are also known as Vulnerabilites.

Computer First Virus :
The First Computer Virus made by the programmer is :
Elk Cloner — is one of the first known microcomputer viruses that spread "in the wild," i.e., outside the computer system or lab in which it was written. It was written around 1982 by a 15-year-old high school student named Richard "Rich" Skrenta for Apple II systems. 

The virus infected thousands of machines, but was harmless: It merely displayed a poem across the user's screen. 


Other Essays Like Computer Virus

Dawkins Viruses of the Mind Essay

1797 words - 8 pages been infected. Dawkins sees that people become more susceptible to faults in their thinking and he blames this on their religious views, and this can be spread easily when a person who has been infected presents their ideas to other individuals. Dawkins then goes into detail with comparing the viral effect of religions on individuals to a dangerous computer virus. When a computer has become infected with a virus, it is not always obvious

Technology Essay

837 words - 4 pages sure my computer update the new system automatically. 2) Identify the Virus Software running on your computer. Is your Virus Software current and up-to-date. Have you downloaded the latest virus definitions? If not, do so and note which ones you downloaded. Run a virus scan on your computer and note your results.

 As a Mac user, I didn’t worry about malware like Windows users do. But I still install virus software for my computer called


2075 words - 9 pages shifting threats of information technology and computer systems. For the organization's clients, subsidizing the free allocation of anti-virus software to home users may cost more than using other methods of network security. At the end of Vamosi's article he asks the question "Would you still pay for antivirus software if a dependable, free option were accessible?" My respond is, of course, not, who would?Connection between company network and home

Ethics in Software Industry

1183 words - 5 pages 30. The Personal security can be achieved using User Id and Password 31. Personnel Security is Protecting the data and computer against dishonesty / negligence of employees 32. Piracy is Making and using duplicate h/w, s/w 33. Virus is a self-replicating prg that can damage data, files, computer 34. There are 57000 known virus programs are in existence 35. Running some other s/w on idle machine without the knowledge of the organisation is

How To Make Your Computer Safe

849 words - 4 pages outgoing traffic originating from a virus infection.Solution: Check if your Windows Firewall is switched on.Viruses and Spyware: A virus is a file written with the sole intention of doing harm, or for criminal activity. There are many types of virus.The RisksViruses and spyware can attack your computer via the following means:Opening infected email attachments such as .exe files.Opening infected files from web-based digital file delivery companies (for

Computer Security

1158 words - 5 pages in the loss of confidentiality and availability , and makes the integrity of the data stored on the disk suspect. Regular backups allow for recovery of the data, but backups alone cannot address confidentiality. What can home users do to protect themselves from such computer attacks? Use virus protection software: All users should use a good virus protection software to protect their computers. Be sure to keep your anti-virus

Home Internet Security

963 words - 4 pages . Updated anti-virus software is very important for dealing with threats such as viruses, Trojans, worms, etc. Keeping up with Windows security updates will do a great deal to close know security holes in various Microsoft products. Depending on the value of data to be protected, there are many encryption schemes available at many different price levels to secure information both on the computer as well as information sent and received. Default

Computer Fraud

1037 words - 5 pages . He caused harm to many universities and government computers by releasing a worm and was the creator of the first computer virus. He argued that he had only just exceeded his authorized access and not accessed the computers without authorization. To exceed authorization defined by the Computer Fraud and Abuse Act as “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser

Sec 280 Week 4 Case Study

2410 words - 10 pages compromise your bank account. If the Trojan is really powerful, it can take over your entire security system as well. As a result, a Trojan can cause many types of damage starting from your own computer to your online account. 2. Virus. Looking at the technology 10 years back, Virus is something really popular. It is a malicious program where it replicates itself and aim to only destroy a computer. The ultimate goal of a virus is to ensure that the

Computer Network & Information Security

1478 words - 6 pages of confidentiality and availability, and therefore makes the integrity of the data stored on the disk questionable. Regular backups allow for recovery of the data, but backups alone cannot address confidentiality. What can home users do to protect themselves from such computer attacks? (1.)Use virus protection software: All users should use reputable and trustworthy virus protection software to protect their computers. Be sure to keep your anti

Why Shouldn't You Illegally Download Music?

1666 words - 7 pages against them, they would have to pay a fine and most likely go back to jail to complete their sentence. All of these fines and money spent of lawyers and bails make paying for a CD sound like less of a problem. Before illegally downloading, a person should think about how much time and money they might end up costing themselves. Viruses are a computer user’s worst nightmare. If a computer gets a virus, all the data on said computer could be lost

Related Papers

Viruses, Worms And Trojans, Oh My!

1320 words - 6 pages Viruses, Worms and Trojans, Oh my! Abstract Viruses, Worms or Trojans ever wonder what the differences between these are, or how they invade your computer. What they actually do to your system? I will start this research paper with a brief history on these villains from one of the first viruses created, through the year 2000 when a vicious virus sprang into action and spread worldwide. In the following pages I will give you just what you are

How To A Computer In Automotive Technology?

563 words - 3 pages MEASURE COMPUTER MEMORY 4 COMPUTER VIRUS 5 COMPUTER TRAINING AT UIRI Computer training at UIRI is taken as course .Those who greatly appreciates it takes it. Training is being carried out in shifts, the morning and afternoon shift. Training takes a period of one month and after wards a candidate is awarded a certificate. Life is what you make of it, if you take it in an easy way it also does the same. Late coming is prohibited, so all

Computer Security Essay

630 words - 3 pages can slow your computer down by loading advertisements and can make your computer unstable. The next threat is called a backdoor Trojan. This threat allows someone to take control of a computer over the internet without the user permission. The backdoor Trojan can be deployed on the user computer by opening a link in spam mail. One of the first threats was the boot sector virus which was deployed on a computer by booting a computer by an infected

Worms, Viruses & Trojans Essay

1422 words - 6 pages information, and software program manipulation, malfunction or deletion. Other malware threats can leave a system highly vulnerable for future attacks without the user even noticing an effect. The most common examples of malware are viruses, worms, and Trojans. (What is malware?) (Wilson Technology Group, Inc., 2011) A computer virus is malware that has the power to copy itself to other computer systems. Mainly, it will attach itself to an