In most cases, If a file that contains virus Is executed or popped onto another computer, then that computer will also be "Infected" by the same virus. A virus can be Introduced to a computer system along with any software program. For Internet users, this threat can come from downloading files through FTP (file transfer protocol), or referencing email attachments. (Please refer to our web page on Handling Email's File Attachments for details. ) What can Viruses do? Slow down email. Viruses that spread by email, such isobar, can generate so much email traffic that servers slow down or crash.
Even if this doesn't happen, impasses may react to the risk by shutting down servers anyway. Steal confidential data. The Bugbear-D worm records the user's keystrokes, including passwords, and gives the virus writer access to them. Use your co
...mputer to attack websites. Modem used infected computers to flood the SOC software company's website with data, making the site unusable (a denial of service attack). Let other users hijack your computer. Some viruses place"backdoor Trojan" on the computer, allowing the virus writer to connect to your computer and use it for their own purposes.
Corrupt data. The Compatible virus makes changes to the data in Excel spreadsheets. Delete data. The Sarcasm worm may attempt to delete or overwrite the hard disk on a certain day. Disable hardware. CHI, also known as Coherency, attempts to overwrite the BIOS chip on April 26, making the computer unusable. Play pranks. The Ninety-D worm made computers beep sporadically for several hours one morning. The Remedy Install anti-virus software and update It regularly Anta-plus programs can detect and often disinfec
viruses. If the software offers on-access virus checking, use It. SE footwear patches to close security loopholes Watch out for "patches" for your operating system. These often close loopholes that make you vulnerable to viruses. Use firewalls A firewall can prevent unauthorized access to your network and also prevent viruses sending out Information. Keep backups of all your data Keep backups of all data and software, Including operating systems. If you are affected by a virus, you can replace your files and programs with clean copies.
Beetroots Virus -A virus which attaches itself to the first part of the hard disk that is read by the imputer upon boot up.
These are normally spread by floppy disks.
Memory Resident Viruses: - this reside in a computers volatile memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes.
Polymorphic Viruses: -A polymorphic virus not only replicates itself by creating multiple files of itself, but it also changes it's digital signature every time it replicates. This makes it difficult for less sophisticated antivirus software to detect That's all folks!!!
- Computer File essays
- Desktop Computer essays
- Servers essays
- Coronavirus essays
- Zika Virus essays
- Camera essays
- Cell Phones essays
- Computer essays
- Ipod essays
- Smartphone essays
- Animal Cruelty essays
- Charles Manson essays
- Crime Prevention essays
- Crime scene essays
- Criminal Justice essays
- Criminology essays
- Cyber Crime essays
- Damages essays
- Detention essays
- Distracted Driving essays
- Drug Trafficking essays
- Drunk Driving essays
- Forensic Science essays
- Gang essays
- Hate Crime essays
- Homicide essays
- Identity Theft essays
- Juvenile Crime essays
- Juvenile Delinquency essays
- Juvenile Justice System essays
- Law Enforcement essays
- Murder essays
- Organized Crime essays
- Penology essays
- Piracy essays
- Prison essays
- Property Crime essays
- Prostitution essays
- Punishment essays
- Punishments essays
- Rape essays
- Robbery essays
- Serial Killer essays
- Sexual Assault essays
- Sexual Assault on College Campuses essays
- Sexual Harassment essays
- Sexual Offence essays
- Stealing essays
- Surveillance essays
- Ted Bundy essays