![]() ![]() Examples of known file infector viruses include Jerusalem and Cascade. After memory becomes infected, any uninfected executable that runs becomes infected. Many of these viruses are memory resident. The can infect other files when an infected program is run from floppy, hard drive, or from the network. These viruses normally infect executable code, such as. There are five recognized types of viruses: File infector virusesįile infector viruses infect program files. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss. As a result, they often cause erratic behavior and can result in system crashes. They typically take up computer memory used by legitimate programs. Even these benign viruses can create problems for the computer user. Others are not designed to do any damage, but simply to replicate themselves and make their presence known by presenting text, video, and audio messages. Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Viruses can infect desktop computers and network servers alike. For example, it may replace other executable files with a copy of the virus infected file. It will often place its own code in the path of execution of another program. What is a virus?Ī computer virus is a small program written to alter the way a computer operates, without the permission or knowledge of the user. This document discusses viruses, Trojans, worms, and hoaxes and ways to prevent them. The term virus is often used as a generic reference to any malicious code ("malware") that is not, in fact, a true computer virus. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |