<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d11473549\x26blogName\x3dPDA+and+Laptop+Today+Blog\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLUE\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://pdatoday.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://pdatoday.blogspot.com/\x26vt\x3d-4872991368707470484', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>

Español | Deutsche | Français | Italiano | Português

Wednesday, June 01, 2005

Computer Virus Basics


By: The Editor

Computer Infections can be broken up into 4 main categories which are explained in detail below:

Viruses
Computer Viruses are small pieces of software that attach themselves to real programs. An example would be a virus that attaches itself onto windows explorer. Each time you run the program windows explorer the virus will also be executed and perform the function that it was meant to perform. This can be several things such as damaging files on your computer, or erasing them all together. This is also the time in which the virus will try to spread itself onto other programs and even other computers! (continued...)

Worms
A worm just like a virus is a small piece of software. However worms rather then relying on an external program to function, will run themselves over computer networks and security holes to spread. The worm will scan the network from it’s host computer until it finds another computer that it can attach itself to. It will then continue this process to replicate. Because this type of infection runs by itself it can have devastating impacts. The Mydoom worm is estimated to have infected over a quarter million computers in a single day when it first launched back in March 1999.

Trojan Horses
A Trojan horse is a computer program that claims to be one thing, but is actually another. For example you might receive a Trojan horse that is disguised as an image, but when you go to open the file, it will do whatever it is that it was written to do.

E-mail Viruses
Email Viruses are very common. They work by spreading themselves through email messages. Once they infect a computer, they will then go ahead and replicate themselves by automatically mailing out again to everyone in the victim’s e-mail address book. Several of these virus’s have raced through the internet. Examples of email virus’s are the Melissa Virus, and the ILOVEYOU virus.

Save Money On Pocket PC Software