What is a Computer Virus - Types of Computer Viruses
Read this page to know what exactly is a computer virus and what are the types of computer viruses.
What Is A Computer Virus
A virus is a parasitic program that infects another legitimate program, which is sometimes called the host. It modifies the host and saves a copy of itself on the host computer. Computer viruses are programmed to do harm once they infect the victim’s system. They are designed to do various kinds of damage. But the ability to do damage is not what defines a virus. According to Wikipedia, “A computer virus is a computer program that can copy itself and infect a computer”. So to qualify as a virus, a program must be able to replicate itself. This can mean copying itself to different places on the same computer or looking for ways to reach other computers, such as by infecting disks or traveling across networks. Viruses can be programmed to replicate and travel in many ways.
Some Common Ways To Pick Up A Virus
- Receiving an infected file attached to an e-mail message, or a virus hidden within the message itself. E-mail has become the single most common method for spreading viruses, especially now that so many people use the internet to exchange messages and files.
- Viruses can also be spread through online chat rooms and instant messenger programs.
- Receiving an infected disk from another user. In this case, the virus could be stored in the boot sector of the disk or in an executable file on the disk.
- Copying to your disk a document file that is infected with a macro virus. An infected document might be copied from another disk or received as an attachment to an e-mail message.
What Can A Virus Do?
The majority of computer viruses are relatively harmless; their purpose is to annoy their victims rather than to cause specific damage. Such viruses are described as benign. Other viruses are indeed malicious, and they can do great damage to a computer system if permitted to run. Viruses can be programmed to do many kind of harm, including the following:
- Copy themselves to other programs or areas of a disk.
- Replicate as rapidly and frequently as possible, filling up the infected system’s disk and memory, rendering the system useless.
- Display information on the screen.
- Modify, corrupt, or destroy selected files.
- Erase the contents of entire disks.
- Lie idle for a specified time or until a given condition is met, and then become active.
- Open a “Back Door” to the infected system that allows someone else to access and even take control of the system through a network or internet connection.
This list is by no means comprehensive. Virus programmers can be extremely creative, and many create viruses to perform a specific type of task, sometimes with a specific victim in mind. Regardless you need to protect your system against all kinds of viruses, because nearly anyone can strike at any time, given the right circumstances. Depending on your source of information, different types of viruses may be described in slightly different ways. Some specific categories of viruses include the following:
- Bimodal, Bipartite, or Multipartite Viruses:
This type of virus can infect both files and the boot sector of a disk.
The two most prevalent types of bombs are time bombs and logic bombs. A time bomb hides on the victim’s disk and waits until a specified date before running. A logic bomb may be activated by a date, a change to a file, or a particular action taken by a user or a program.
- Boot Sector Viruses:
Regarded as one of the most hostile types of virus, a boot sector virus infects the boot sector of a hard disk. This area of the disk stores essential files the computer accesses during start-up.
- Cluster Viruses:
This type of virus makes changes to a disk’s file system. If any program is run from the infected disk, the program causes the virus to run as well. This technique creates the illusion that the virus has infected every program on the disk.
- E-Mail Viruses:
E-mail viruses can be transmitted via e-mail messages sent across private networks or the internet. Some e-mail viruses are transmitted as an infected attachment.
- File-Infecting Viruses:
This type of virus infects program files on a disk. When an infected program is launched, the virus’s code is also executed.
- Joke Programs:
Joke programs are not viruses and do not inflict any damage. Their purpose is to frighten their victims into thinking that a virus has infected and damaged their system.
- Macro Viruses:
A macro virus is designed to infect a specific type of document file, such as Microsoft word or Excel files. These documents can include macros, which are small programs that execute commands. A macro virus disguised as a macro, is embedded in a document file and can do various levels of damage to data, from corrupting documents to deleting data.
- Polymorphic, Self-Garbling, Self-Encrypting Viruses:
This type of virus can change itself each time it is copied, making it difficult to isolate.
- Stealth Viruses:
These viruses take up residence in the computer’s memory, making them hard to detect. They also can conceal changes they make to other files, hiding the damage from the user and the operating system.
- Trojan Horses:
A trojan horse is a malicious program that appears to be friendly. For example, Trojan Horses appear to be games. Trojan Horses are not technically viruses as they do not duplicate themselves, but because they can do harm, many experts consider them to be a type of virus.
A worm is a program whose purpose is to duplicate itself. An effective worm will fill entire disks with copies of itself and will take up as much space as possible in the host system’s memory. Safeguarding a system against viruses is not difficult if you have a little knowledge and some utility software. Start by being aware that viruses can come from many sources-even sources you trust. For example, an e-mail virus may arrive in your inbox disguised as a message from a friend or colleague because it has already infected that person’s computer. A homemade data CD can be infected too. the best precaution is to treat all e-mail messages and disks as potential carriers of infection. Checking for viruses requires antivirus software, which scans your computer’s memory and disks for known viruses and eradicates them. After it is installed on your system and activated, a good antivirus program checks for infected files automatically every time you insert any kind of disk or download a file via a network or internet connection. Sophisticated virus scanners can also alert you if a web page attempts to load suspicious code onto your PC. Some popular antivirus programs:
- McAfee VirusScan
- Norton Antivirus
However, simply having antivirus software on your computer is not enough to keep viruses away. This is where casual computer users slip up and allow their systems to be infected.
Stay upto date with latest news about viruses:
It’s also a good idea to stay upto date on the latest news about viruses. A good way is to visit the website of your antivirus software program’s developer. A few other sources of general virus-related information are