Virus

Viruses are generally developed with a definite intention to cause damage to computer files or at the very least cause inconvenience and annoyance to computer users. A virus usually attaches itself to a program or file and t hen copies itself into other programs and files with which it comes in contact.

computer virus

Types of Virus

Trojan horses

The 'Trojan Horse' is a very apt name for a particularly nasty type of virus. Although technically not a virus, a Trojan Horse is in many ways a more important treat to be aware off. A Trojan Horse must be installed on your computer to become effective. The Trojan Horse has the ability to attach itself to another programme then install itself onto your machine covertly when you install the programme it resides within.
Many Trojan Horses are 'key-logger' programmes that record every key press on your keyboard and store them in a log file. This log file is then e-mail to the person who sent the Trojan Horse to you in a convert way every time you access the Internet. Everything you type; e-mails, letters, credit card numbers, passwords, phone numbers etc. are all logged and received by the hacker, your privacy is completely compromised. Some more advanced key-loggers or password sniffers also keep account of all of the web sites that you have visited and when.

Worms

Worms have the ability to replicate themselves, and generally do not require human interactivity to do so. They may be designed to e-mail themselves to other computers. Worms copy themselves from computer to computer rather than file to file like most viruses, and because they require no human help to do so, they can spread much more rapidly through a system than a normal virus.

computer worms
A Worm may arrive in an unsolicited e-mail in an attachment that tempts you to open it, once you do the worm spreads to your computer. E-mail Worms that have the ability to replicate and e-mail themselves to many people simultaneously have resulted in the crashing of e-mail severs in the past due to the excessive strain of all the traffic!

Protection against viruses

When it comes to protecting your computer from virus the proverb ‘Precaution is better than cure’ is very much applicable.  Some precautions could be

  • Any executable .EXE files should not be opened unless you trust the sources.
  • Never open unsolicited e-mail.
  • Use reliable virus protection software.
  • Always use computer firewall. Firewall software acts as a secure barrier between your computer and the outside world. It monitors all traffic to and from your computer, and decides whether or not this is normal Internet activity or an unauthorised security risk.
  • Avoid using flash discs, floppy disc which were used on other computer. In case you cannot avoid, do a virus scan before using these devices.
  • Viruses may spread through infected floppy discs, flash drives (pen drives), downloads from internet or through e-mails.


New Youtube Channel - ThinkIGCSE

Hi Everyone, I have launched a new YouTube channel with more than a 100 videos on  Economics and Business Studies, tailored specifically for IGCSE and A Level and IBDP students.

Subscribe now and join us on this learning journey: @thinkIGCSE

Exciting News!

IMPORTANT MESSAGE

Quizzes and worksheets on this website have been developed in Flash format. Flash is no more supported by browsers. Therefore, you might see blank pages on some instances. Install Flash player plugin for Chrome from Chrome Web Store. Click here 

Similarly, for other web browsers you will have to activate the relevant flash player plugins.

JOIN OUR ONLINE COURSES

Save
Cookies user preferences
We use cookies to ensure you to get the best experience on our website. If you decline the use of cookies, this website may not function as expected.
Accept all
Decline all
Read more
Analytics
Tools used to analyze the data to measure the effectiveness of a website and to understand how it works.
Google Analytics
Our website uses Google Analytics to understand how you interact with our site and improve your browsing experience. These cookies collect information in an anonymous form, including the number of visitors to the site, where visitors have come from, and the pages they visited. The data helps us analyze trends and user behavior to enhance our website's functionality and content.
Accept
Decline
Marketing
Set of techniques which have for object the commercial strategy and in particular the market study.
Marketing
Our website uses Google marketing cookies to deliver personalized ads and measure the effectiveness of our advertising campaigns. These cookies track your online activity to help us show you relevant ads on Google services and partner websites.
Accept
Decline