SlideShare a Scribd company logo
What are Computer Viruses?
Computer Virus Definition
You have likely heard that it is essential to prevent viruses from entering your computer. However,
what exactly are computer viruses precisely? Computer viruses are a kind of malware, known as
malware, that circulates among computers and causes damage to the software and data.
Computer viruses seek to destroy the systems, cause significant operational issues, and ultimately
result in leaks and loss of data. The most important thing to understand regarding computer viruses
is that they are specifically designed to spread through software and systems. Computer viruses are
typically attached to host files that can be executed, which results in viruses executing whenever an
open file is accessed. The virus then spreads through the software or document that it is connected
to via drives, networks, file-sharing applications, or virus-infected attachments to emails.
Read how to turn off malwarebytes notifications
Common Signs of Computer Viruses
You have likely heard about the importance of being able to prevent viruses from entering your
system, But what exactly are computer viruses? A computer virus is likely to be detrimental to the
system it lives on. It could be discovered by observing common indicators of performance decline,
such as:
Speed of System
A computer that is running slower than usual is among the most frequent signs that the system is
suffering from a virus. This could be the result of the system slowing down and also web speed and
applications being affected. If a system does not have robust programs or applications running and is
sluggish, this could be a sign that it is affected by an infection.
Pop-up Windows
Unwanted pop-up windows that appear on a computer or the web browser are an obvious indicator
of an infection on your computer. Unwanted pop-ups could be an indication of viruses, malware or
spyware that is affecting devices.
Self-executing programs
If a computer program suddenly closes without warning, the software is likely affected by malware
or viruses. Another indication of an infection is when programs do not load when you select them by
the Start menu or desktop icon. When this happens, the next step is to conduct the virus scan and
eliminate all files from programs that are not suitable for use.
Accounts Are Being Logged Out
Certain viruses are created to attack specific programs that can cause the application to crash or
force users to sign out automatically of the application.
The device crashes.
Computer crashes and system crashes, as well as the computer itself abruptly shutting down, are
typical indicators of the presence of a virus. Computer viruses cause computers to perform a variety
of bizarre ways. This could include opening files on their own, displaying strange errors, or pressing
keys randomly.
Mass Emails are being sent via Your Email Account.
Computer viruses are typically transmitted through emails. Hackers may make use of email accounts
belonging to other people to distribute malware and conduct more extensive cyberattacks. If an
account on email has sent emails to an outbox that the user did not send, it could be an indication of
an infection on the computer.
Modifications to your Homepage
Any sudden changes on the computer, such as your system's homepage being changed or browser
settings being changed--are indicators of a virus on your computer might be on the device.
What are the ways that computer viruses attack and spread?
In the beginning of computing, infections could be transmitted through floppy disks between
computers using floppy drives. Today, viruses can be transmitted through hard disks as well as
Universal Serial Bus (USB) devices; however, they tend to spread via the internet between devices.
Computer viruses can be transmitted through email, and some are even able to hijack email
programs to spread. Some may also be attached to legitimate software, in software packs or infect
code as well as other viruses. They may be downloaded from a compromised store for applications
as well as code repositories infected with malware. One of the main characteristics of a computer
virus is that it requires the victim to execute its code or payload. That is, the host program must be
running.
Different types of computer viruses
There are many types of viruses for computers that are able to cause damage to devices. This article
will discuss computer virus protection and ways to remove computer viruses.
Resident Virus
The virus spreads by infecting software on the host computer. A resident virus accomplishes this by
infecting programs as users open them. Non-resident viruses are capable of infecting executable files
even when the program is not running.
Multipartite Virus
Multipartite viruses use different ways to spread to computers. It is most likely to remain in the
memory of the computer to infect the hard disk. It will later spread to infect other drives by altering
the contents of applications. This causes performance lag and applications to run out of memory.
Multipartite viruses can be prevented by avoiding opening attachments that come from non-trusted
sources and installing a trusted antivirus program. Also, it can be avoided by cleansing the boot
sector and the entire disk of your computer.
Direct Action
Direct action viruses access the memory of a computer's central system and are able to infect all
files, programs and folders within the autoexec.bat path prior to deleting the file. The virus usually
affects the performance of a computer. However, it can also destroy every single file on a hard disk
of the computer as well as any USB device connected to it. Direct-action viruses can be prevented by
using antivirus scanners. They are simple to spot, as is the process of restoring damaged files.
Browser Hijacker
A browser hijacker can alter the settings of browsers on the internet, including changing the
homepage, altering the new tab's homepage, and altering the search engine that is the default.
Technically speaking, it is not a virus, as it does not infect files. However, it can cause much harm to
users of computers who will often not be in a position to recover the homepage of their browser or
change it to a search engine. There is also the possibility of ads that cause unwanted pop-ups and
ads.
Browser hijackers usually attach to free software as well as malicious applications downloaded from
untrusted sites or app stores. So, only use reputable software and trustworthy antivirus software.
Overwrite Virus
Overwrite viruses can be extremely harmful. They can erase the data and replace it by modifying the
content of files or even code. After files are infected, they cannot be repaired, and the virus may
cause damage to Windows, DOS, Linux, and Apple systems. The only way that this virus can be
eradicated is to delete all the affected files, which could result in a devastating loss of data. The best
method to guard against overwriting viruses is to utilize a reliable antivirus program and ensure that
it is updated.
Web Scripting Virus
Web scripting virus compromises browser security on the internet, allowing hackers to modify web
pages with malicious code, also known as client-side scripting. This allows cybercriminals to attack
prominent sites, like social networking websites, as well as email providers and all sites that allow
reviews or input from users. The attackers can make use of the virus to send out spam or commit
fraud and even damage servers' files.
The protection against web scripting depends on the use of real-time browser protection software,
utilizing cookies security, turning off the scripts and employing malware removal tools.
File Infector
File infectors are among the most commonly encountered computer viruses. It alters files after they
are opened and may quickly be spread throughout networks and systems. The majority of the
affected files have .exe and .com extensions. The most effective way to stay clear of virus-infected
files is to download only legitimate software and use antivirus software.
Network Virus
Network viruses pose a serious risk as they could destroy the entire computer network. They are
usually difficult to identify, as the virus can be hidden in any computer connected to the network
that is affected. They can quickly reproduce and spread via the internet to other devices that are
connected to the internet. Security-minded, robust antivirus software, as well as advanced firewalls,
are vital for preventing network viruses.
Boot Sector Virus
Boot sector viruses are a threat to the master boot record (MBR). The virus inserts its code into the
partition table and then transfers to the primary memory once a computer reboots. Its presence can
be manifested in boot-up issues, system performance issues, and the hard drive not being able to
locate. The majority of modern computers have protections for the boot sector that limit the risk of
this kind of virus.
How to guard against the virus that causes boot sector problems include the need to ensure that
disks are written-protected and that you do not start the computer using external drives that are not
trusted.
Also Read How does antivirus software work step by step?
Learn more about computer viruses Through Examples
There are a variety of common examples of what computer users and internet users consider to be
viruses. However, they are actually not true.
Is Trojan a Virus?
A Trojan horse form of software that claims to be something it is not in order to be able to access
devices and infect them with malware. So it is a Trojan horse virus, a virus disguised as something
that it is not. For instance, Trojan horse viruses are often hidden in unofficial games or applications,
file-sharing websites and bootlegged films.
Are Worms Viruses?
A computer worm is not an actual virus. Worms do not require a host system, and they can move
between networks and systems without any user intervention, while viruses require users to run
their software.
Is Ransomware a virus?
Ransomware occurs when attackers block victims from accessing their systems or files and require a
ransom in order to gain access. The virus can be used to launch ransomware-related attacks.
Is Rootkit a virus?
A rootkit is not an infection. Rootkits are software programs that allow attackers the ability to access
systems. They are not able to self-replicate or spread through systems.
What is a Software Bug an infection?
"Bug" can be a popular word that describes problems in computers. However, it is not an infection.
A glitch or error in the code of software, which hackers are able to use to launch a cyberattack or
propagate malware.
How to Protect Your Computer from Viruses
There are a variety of ways to shield your PC from malware, such as:
Make sure you are using a trusted antivirus product
The security of computer antivirus is essential to ward off malware attacks and keep computers from
getting infected with viruses. These concepts for antivirus will guard the devices against infection by
conducting regular checks and also the detection and blockage of malware.
Avoid Clicking Pop-up Advertisements
unwelcome pop-up advertisements are more likely to be connected to malware and viruses on
computers. Avoid clicking on pop-up ads since this can result in accidentally downloading viruses
onto a computer.
Make sure you scan your email attachments.
A standard method of protecting your computer from viruses is to be cautious about attachments to
emails, which are frequently used to transmit malware. Antivirus programs for computers can be
utilized to check emails for any viruses.
Check the Files You Download with File-sharing Applications.
File-sharing applications, especially non-official websites, are well-known as a popular source for
attackers to distribute viruses on computers. Avoid downloading games, apps or software from non-
official sites and ensure that you have scanned the downloaded files via any file-sharing application.
How Fortinet can help?
The Fortinet antivirus program protects companies from the most recent viruses, spyware and other
threats. The advanced detection engine helps users avoid downloading the most recent and most
advanced threats and also prevents viruses from getting a foothold within networks of
organizations. It also minimizes the risk of data loss, safeguards against new malware variants and
keeps companies current by releasing regular updates.

More Related Content

PPTX
Computer virus
DOCX
Computer virus
PPT
PPTX
PPTX
Computer virus
PDF
COMPUTER VIRUS blog.pdf
PPT
Computer virus 18
PPTX
Computer virus
Computer virus
Computer virus
Computer virus
COMPUTER VIRUS blog.pdf
Computer virus 18
Computer virus

Similar to What are Computer Viruses.pdf (20)

ODP
Virus and antivirus final ppt
PPT
Itc lec 15 Computer security risks
PPTX
virus 2014 more design 2014
PPTX
Types of Virus & Anti-virus
PPTX
Computer viruses
PDF
computer virus Report
DOCX
COMPUTERS ( types of viruses)
PPTX
Computervirus
PPT
Computer Virus And Antivirus-Sumon Chakraborty
PPTX
Computer viruses
PPT
Presentation2
PPTX
Introduction to Computer Virus
PPTX
Computer Viruses
PPT
Virus project
PPTX
PPT on information technology laws description
PPT
11 virus vs. antivirus
PPTX
Viruses notes
PPTX
PPT
Viruses notes1
Virus and antivirus final ppt
Itc lec 15 Computer security risks
virus 2014 more design 2014
Types of Virus & Anti-virus
Computer viruses
computer virus Report
COMPUTERS ( types of viruses)
Computervirus
Computer Virus And Antivirus-Sumon Chakraborty
Computer viruses
Presentation2
Introduction to Computer Virus
Computer Viruses
Virus project
PPT on information technology laws description
11 virus vs. antivirus
Viruses notes
Viruses notes1
Ad

More from Blogger (15)

PDF
How Antivirus Programming Can Shield Your Advanced World.pdf
PDF
Demonstrated Techniques to Safeguard Your PC from Malware Dangers.pdf
PDF
Hollywood's Most Persuasive Male Entertainers.pdf
PDF
How do Antivirus Programs work step-by-step.pdf
DOCX
Consider an occupation in nursing.
PDF
10 Hollywood Actors Who Have Completely Absent From Our Screens.pdf
PDF
The Uses for Nylon and Polyester.pdf
PDF
Most educated Hollywood actors that will surprise you.pdf
PDF
The 10 Top-Grossing Actors of All Time.pdf
PDF
To 10 wealthiest actors on the planet in 2023.pdf
PDF
10 of the Top international Destinations that Solo travellers can enjoy..pdf
PDF
How do you become a nurse.pdf
PDF
The 10 Greatest Actors of Our Time.pdf
PDF
10 Hollywood stars on Instagram that you shouldn't miss!.pdf
PDF
5 Top Attractions in the United Kingdom.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
Demonstrated Techniques to Safeguard Your PC from Malware Dangers.pdf
Hollywood's Most Persuasive Male Entertainers.pdf
How do Antivirus Programs work step-by-step.pdf
Consider an occupation in nursing.
10 Hollywood Actors Who Have Completely Absent From Our Screens.pdf
The Uses for Nylon and Polyester.pdf
Most educated Hollywood actors that will surprise you.pdf
The 10 Top-Grossing Actors of All Time.pdf
To 10 wealthiest actors on the planet in 2023.pdf
10 of the Top international Destinations that Solo travellers can enjoy..pdf
How do you become a nurse.pdf
The 10 Greatest Actors of Our Time.pdf
10 Hollywood stars on Instagram that you shouldn't miss!.pdf
5 Top Attractions in the United Kingdom.pdf
Ad

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Approach and Philosophy of On baking technology
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Big Data Technologies - Introduction.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
MIND Revenue Release Quarter 2 2025 Press Release
sap open course for s4hana steps from ECC to s4
Approach and Philosophy of On baking technology
Machine learning based COVID-19 study performance prediction
Big Data Technologies - Introduction.pptx
20250228 LYD VKU AI Blended-Learning.pptx

What are Computer Viruses.pdf

  • 1. What are Computer Viruses? Computer Virus Definition You have likely heard that it is essential to prevent viruses from entering your computer. However, what exactly are computer viruses precisely? Computer viruses are a kind of malware, known as malware, that circulates among computers and causes damage to the software and data. Computer viruses seek to destroy the systems, cause significant operational issues, and ultimately result in leaks and loss of data. The most important thing to understand regarding computer viruses is that they are specifically designed to spread through software and systems. Computer viruses are typically attached to host files that can be executed, which results in viruses executing whenever an open file is accessed. The virus then spreads through the software or document that it is connected to via drives, networks, file-sharing applications, or virus-infected attachments to emails. Read how to turn off malwarebytes notifications Common Signs of Computer Viruses You have likely heard about the importance of being able to prevent viruses from entering your system, But what exactly are computer viruses? A computer virus is likely to be detrimental to the system it lives on. It could be discovered by observing common indicators of performance decline, such as: Speed of System A computer that is running slower than usual is among the most frequent signs that the system is suffering from a virus. This could be the result of the system slowing down and also web speed and applications being affected. If a system does not have robust programs or applications running and is sluggish, this could be a sign that it is affected by an infection. Pop-up Windows
  • 2. Unwanted pop-up windows that appear on a computer or the web browser are an obvious indicator of an infection on your computer. Unwanted pop-ups could be an indication of viruses, malware or spyware that is affecting devices. Self-executing programs If a computer program suddenly closes without warning, the software is likely affected by malware or viruses. Another indication of an infection is when programs do not load when you select them by the Start menu or desktop icon. When this happens, the next step is to conduct the virus scan and eliminate all files from programs that are not suitable for use. Accounts Are Being Logged Out Certain viruses are created to attack specific programs that can cause the application to crash or force users to sign out automatically of the application. The device crashes. Computer crashes and system crashes, as well as the computer itself abruptly shutting down, are typical indicators of the presence of a virus. Computer viruses cause computers to perform a variety of bizarre ways. This could include opening files on their own, displaying strange errors, or pressing keys randomly. Mass Emails are being sent via Your Email Account. Computer viruses are typically transmitted through emails. Hackers may make use of email accounts belonging to other people to distribute malware and conduct more extensive cyberattacks. If an account on email has sent emails to an outbox that the user did not send, it could be an indication of an infection on the computer. Modifications to your Homepage Any sudden changes on the computer, such as your system's homepage being changed or browser settings being changed--are indicators of a virus on your computer might be on the device. What are the ways that computer viruses attack and spread? In the beginning of computing, infections could be transmitted through floppy disks between computers using floppy drives. Today, viruses can be transmitted through hard disks as well as Universal Serial Bus (USB) devices; however, they tend to spread via the internet between devices. Computer viruses can be transmitted through email, and some are even able to hijack email programs to spread. Some may also be attached to legitimate software, in software packs or infect code as well as other viruses. They may be downloaded from a compromised store for applications as well as code repositories infected with malware. One of the main characteristics of a computer virus is that it requires the victim to execute its code or payload. That is, the host program must be running. Different types of computer viruses There are many types of viruses for computers that are able to cause damage to devices. This article will discuss computer virus protection and ways to remove computer viruses. Resident Virus
  • 3. The virus spreads by infecting software on the host computer. A resident virus accomplishes this by infecting programs as users open them. Non-resident viruses are capable of infecting executable files even when the program is not running. Multipartite Virus Multipartite viruses use different ways to spread to computers. It is most likely to remain in the memory of the computer to infect the hard disk. It will later spread to infect other drives by altering the contents of applications. This causes performance lag and applications to run out of memory. Multipartite viruses can be prevented by avoiding opening attachments that come from non-trusted sources and installing a trusted antivirus program. Also, it can be avoided by cleansing the boot sector and the entire disk of your computer. Direct Action Direct action viruses access the memory of a computer's central system and are able to infect all files, programs and folders within the autoexec.bat path prior to deleting the file. The virus usually affects the performance of a computer. However, it can also destroy every single file on a hard disk of the computer as well as any USB device connected to it. Direct-action viruses can be prevented by using antivirus scanners. They are simple to spot, as is the process of restoring damaged files. Browser Hijacker A browser hijacker can alter the settings of browsers on the internet, including changing the homepage, altering the new tab's homepage, and altering the search engine that is the default. Technically speaking, it is not a virus, as it does not infect files. However, it can cause much harm to users of computers who will often not be in a position to recover the homepage of their browser or change it to a search engine. There is also the possibility of ads that cause unwanted pop-ups and ads. Browser hijackers usually attach to free software as well as malicious applications downloaded from untrusted sites or app stores. So, only use reputable software and trustworthy antivirus software. Overwrite Virus Overwrite viruses can be extremely harmful. They can erase the data and replace it by modifying the content of files or even code. After files are infected, they cannot be repaired, and the virus may cause damage to Windows, DOS, Linux, and Apple systems. The only way that this virus can be eradicated is to delete all the affected files, which could result in a devastating loss of data. The best method to guard against overwriting viruses is to utilize a reliable antivirus program and ensure that it is updated. Web Scripting Virus Web scripting virus compromises browser security on the internet, allowing hackers to modify web pages with malicious code, also known as client-side scripting. This allows cybercriminals to attack prominent sites, like social networking websites, as well as email providers and all sites that allow reviews or input from users. The attackers can make use of the virus to send out spam or commit fraud and even damage servers' files. The protection against web scripting depends on the use of real-time browser protection software, utilizing cookies security, turning off the scripts and employing malware removal tools.
  • 4. File Infector File infectors are among the most commonly encountered computer viruses. It alters files after they are opened and may quickly be spread throughout networks and systems. The majority of the affected files have .exe and .com extensions. The most effective way to stay clear of virus-infected files is to download only legitimate software and use antivirus software. Network Virus Network viruses pose a serious risk as they could destroy the entire computer network. They are usually difficult to identify, as the virus can be hidden in any computer connected to the network that is affected. They can quickly reproduce and spread via the internet to other devices that are connected to the internet. Security-minded, robust antivirus software, as well as advanced firewalls, are vital for preventing network viruses. Boot Sector Virus Boot sector viruses are a threat to the master boot record (MBR). The virus inserts its code into the partition table and then transfers to the primary memory once a computer reboots. Its presence can be manifested in boot-up issues, system performance issues, and the hard drive not being able to locate. The majority of modern computers have protections for the boot sector that limit the risk of this kind of virus. How to guard against the virus that causes boot sector problems include the need to ensure that disks are written-protected and that you do not start the computer using external drives that are not trusted. Also Read How does antivirus software work step by step? Learn more about computer viruses Through Examples There are a variety of common examples of what computer users and internet users consider to be viruses. However, they are actually not true. Is Trojan a Virus? A Trojan horse form of software that claims to be something it is not in order to be able to access devices and infect them with malware. So it is a Trojan horse virus, a virus disguised as something that it is not. For instance, Trojan horse viruses are often hidden in unofficial games or applications, file-sharing websites and bootlegged films. Are Worms Viruses? A computer worm is not an actual virus. Worms do not require a host system, and they can move between networks and systems without any user intervention, while viruses require users to run their software. Is Ransomware a virus? Ransomware occurs when attackers block victims from accessing their systems or files and require a ransom in order to gain access. The virus can be used to launch ransomware-related attacks. Is Rootkit a virus?
  • 5. A rootkit is not an infection. Rootkits are software programs that allow attackers the ability to access systems. They are not able to self-replicate or spread through systems. What is a Software Bug an infection? "Bug" can be a popular word that describes problems in computers. However, it is not an infection. A glitch or error in the code of software, which hackers are able to use to launch a cyberattack or propagate malware. How to Protect Your Computer from Viruses There are a variety of ways to shield your PC from malware, such as: Make sure you are using a trusted antivirus product The security of computer antivirus is essential to ward off malware attacks and keep computers from getting infected with viruses. These concepts for antivirus will guard the devices against infection by conducting regular checks and also the detection and blockage of malware. Avoid Clicking Pop-up Advertisements unwelcome pop-up advertisements are more likely to be connected to malware and viruses on computers. Avoid clicking on pop-up ads since this can result in accidentally downloading viruses onto a computer. Make sure you scan your email attachments. A standard method of protecting your computer from viruses is to be cautious about attachments to emails, which are frequently used to transmit malware. Antivirus programs for computers can be utilized to check emails for any viruses. Check the Files You Download with File-sharing Applications. File-sharing applications, especially non-official websites, are well-known as a popular source for attackers to distribute viruses on computers. Avoid downloading games, apps or software from non- official sites and ensure that you have scanned the downloaded files via any file-sharing application. How Fortinet can help? The Fortinet antivirus program protects companies from the most recent viruses, spyware and other threats. The advanced detection engine helps users avoid downloading the most recent and most advanced threats and also prevents viruses from getting a foothold within networks of organizations. It also minimizes the risk of data loss, safeguards against new malware variants and keeps companies current by releasing regular updates.