Join 100,607 users already on read.cash

Computer virus

19 37 exc
Avatar for Kawser199
Written by   268
2 years ago

A computer virus is a type of special software program that enters a computer user unknowingly and performs malicious activities. Some computer viruses are so powerful that they carry out harmful activities inside the computer without letting the user know its location and destroy important data. Computer viruses are programmed in such a way that they do not require a separate user to spread them. Once created, a virus spreads from one computer to another by copying itself.

Computer viruses cannot make their own copies or spread from one computer to another using any medium. All viruses are created by programmers. Initially a virus enters the boot sector of the computer's operating system and disrupts the normal functioning of the operating system. Mail functions the computer by modifying different types of programs. The full form of the VIRUS name is - “Vital Information Resources Under Siege”.

Computer viruses are like viruses and bacteria that attack the human body. In the same way that viruses and bacteria that invade the human body enter the human body through one means or another, computer viruses use one means or another to move from one computer to another. Such as USB devices, malicious websites, software full of viruses, etc.

Before a computer virus can be spread using any medium, it must be properly programmed to do certain things. This means that each virus is programmed differently to perform different tasks.

Computer viruses are also called by different names such as Worm, Malware, Ransomware etc. Each of them has a different way of working with the name. Viruses are divided into different categories based on the type of work they do. These are,

  • Boot sector viruses

  • Program viruses

  • Multipartite viruses

  • Stealth viruses

  • Macro viruses

  • Polymorphic viruses

  • Active X viruses

  • Browser hijacker

  • Resident viruses

  • File infector viruses

  • Rootkit viruses

In many cases computer viruses are compared to time bombs. Because it can be programmed and kept invalid for a certain period of time. After that time, the virus is activated and works according to the program. The algorithms of these viruses are so powerful that it is almost impossible to recover the infected system because all the viruses are used to damage many large systems.

These viruses are made so powerful that as soon as they are activated, they completely destroy the entire system. Destroying security systems leads to data encryption, decryption and theft. Devices under any type of network that are software dependent can be hacked using viruses.

Computer viruses are now used to commit many major crimes. Hackers use viruses to hack and steal information. Viruses are used to steal important personal information or important information of a country's government. The main purpose of these hacks is to steal money or any other assets by blackmailing important information. Computer viruses cause billions of dollars in damage every year.

Microsoft Windows platform is the most vulnerable to virus attacks. Software developers create antivirus programs to protect computers from virus attacks. But all these antivirus programs are of no use because new viruses are constantly being created.

Harmful aspects of computer viruses

  • The computer slows down by corrupting the operating system files

  • Temporarily crashes or deletes some programs

  • Destroys the boot sector of the operating system

  • Sending personal information stored on a computer to another person

  • Delete all data stored on the hard drive

  • Destroy the hard drive completely

  • Showing unnecessary and annoying messages on the computer screen

Some viruses can alter the voltage rating of the computer's hardware, damaging the circuit and causing the computer to crash completely.

Some malware is known as computer virus

  • Computer Worms

  • Trojan horse

  • Spam virus

  • Spyware

  • Zombies

History of the onset of computer viruses

The world's first computer virus was created in 1971. Robert Thomas was the first to create a computer virus. He was an engineer at BBN Technologies. The first computer virus was called "Creeper". The virus enters the ARPANET's mainframe's TENEX operating system via a floppy disk. It was a boot sector virus. The virus displays a message on a computer screen that reads "I'm the creeper: Catch me if you can."

The second computer virus was created in 1982 by Richard Skrenta. It was a boot sector virus. Its name is "Elk Cloner". Richard Skrenta was only 15 years old when he made it. He was then a ninth grader. This he made for the purpose of having fun with his friends. Apple II enters the operating system via a floppy disk. Elk Cloner would show a poem on the screen of an infected computer. It was like,

“Elk Cloner: The program with a personality

  • It will get on all your disks

  • It will infiltrate your chips

  • Yes, it’s Cloner!

  • It will stick to you like glue

  • It will modify RAM too

  • Send in the Cloner! ”

In 1986, two Pakistani brothers, Basit and Abzad Farooq, created another boot sector virus called "Brain". She was 17 at the time and Amjad was 24. It was built for the IBM PC operating system. They created it for the purpose of stopping piracy of the medical software of their Brain Computer Services. It was not a harmful virus like Elk Cloner. It would only replace the boot sector with another infected boot sector. This would waste a few kilobytes of space which was much more valuable at that time. The computer would be slow and would not allow the user to save any work. Brain message was displayed on the computer screen-

“Welcome to the Dungeon (c) 1986 Basit & Amjad (pvt) Ltd. BRAIN COMPUTER SERVICES 730 NIZAB BLOCK ALLAMA IQBAL TOWN LAHORE-PAKISTAN PHONE: 430791,443248,280530. Beware of this VIRUS. Contact us for vaccination ………… $ # @% $ @ !! ”

Let's take a brief look at some of the harmful viruses

File infectors

This virus attaches itself to the program file and modifies the extension of the program file to enter the file or system file with the .exe extension. When an infected program is run, the file infectors virus runs with that program. This prevents the system's program files from working normally. Which causes the system to perform mail functions and become slow.

Macro viruses

It targets macro language commands from Microsoft Word or any other program. A macro is a key stroke embedded command saved in the command section of a document file that we press while typing on the keyboard. The macro virus inserts the malicious code into the word file in those comment sections. Microsoft has closed the macro command section in newer versions to protect Microsoft Word from macro viruses.

Overwrite viruses

Some viruses are specifically designed to destroy any software file data file. After infecting a system, the Overwrite virus starts overwriting the system's program files. When overwriting, the command program code inside the virus is inserted into the program code of the system file. This changes the program of the system and the system can not run normally. Overwrite virus can install new code files inside the application which can later spread inside the application or system file of another device.

Polymorphic viruses

This virus is a type of malware. It changes its code every time an infected file is executed after accessing an infected system file. This virus works to circumvent antivirus programs. Because its name changes every time the new code changes. As a result, the antivirus may not recognize the program instead. This makes it easier for the virus to work and can stay inside the system for a long time and spread to other systems.

Resident viruses

The virus enters the system memory or RAM. The original virus does not need to be inserted into any program or application file even if the virus is removed from the system. Even then it can reload what the virus pre-loaded from the system memory or RAM saved when a space MB is finished. When a specific program or application loads the operating system then the virus is reactivated. This may be because it can easily evade antivirus programs and stay hidden inside the system memory for a long time.

Rootkit viruses

This malware installs an unauthorized rootkit file inside the system so that hackers can have complete control over the entire system. It can delete or add any new program starting from any kind of modification in the system. It is designed to bypass antivirus or anti-malware programs. Newer anti-malware antivirus program software includes rootkit scanning tools in their software.

Some of the best harmful viruses of all time

  • Storm Worm

  • Leap-A / Oompa-A

  • Sasser and Netsky

  • MyDoom

  • 5.SQL Slammer / Sapphire

  • Nimda

  • Code Red and Code Red II

  • The Klez Virus

  • ILOVEYOU

  • Melissa

How to remove virus from computer

There are two ways to remove viruses from a computer. The first is to find viruses in an infected area and remove them manually. But not all viruses can be removed in this way. It is possible to remove some minor malware. The second method is to install a good antivirus program inside the computer, scan the whole system to remove the virus and keep the antivirus program updated regularly.

What to do to protect your computer from viruses

Next, make sure that no virus enters the computer. That's why you need to be careful when using USB devices inside the computer. If necessary, the USB device should be scanned with an antivirus program. You need to know about this before browsing any website.

Before installing any software, they need to be scanned with an antivirus program. Any abnormal files found inside the computer should be removed. If the computer suddenly slows down or you have trouble running an application, or if there are abnormal behaviors inside the application, you need to scan the entire system with an antivirus program and remove the virus.

Sponsors of Kawser199
empty
empty
empty

@TheRandomRewarderThank you for your Tipping.....

12
$ 0.00
Avatar for Kawser199
Written by   268
2 years ago
Enjoyed this article?  Earn Bitcoin Cash by sharing it! Explain
...and you will also help the author collect more tips.

Comments

computer virus is very harmful for our computer so it's dangerous in our life

$ 0.00
2 years ago

Computer virus is very hurmful for our computer

$ 0.00
2 years ago

Computer virus is very dangerous for every computer... It's yo be lazy on computer.. computer is lower working... It's very harmful

$ 0.00
2 years ago

Computer virus is very bad for us. Some malware can destroy our computer and al software. Always we should use anti virus as well

$ 0.00
2 years ago

Yes... You thought all Right... Thanks again...

$ 0.00
2 years ago

You are most welcome

$ 0.00
2 years ago

Computer virus is very harmful for all device...

$ 0.00
2 years ago

Amazing article by you my friend

$ 0.00
2 years ago

Thanks

$ 0.00
2 years ago

It's very important Article for us....

$ 0.00
2 years ago

I learned a lot thanks for information dear

$ 0.00
2 years ago

Thank you @Sukreya sister...

$ 0.00
2 years ago

Very informative and good written. Keep it up.

$ 0.00
2 years ago

Thank you so much bro...

$ 0.00
2 years ago

nice article,carry on

$ 0.00
2 years ago

Thanks @Raindrop

$ 0.00
2 years ago

wellcome

$ 0.00
2 years ago

Informative article dear

$ 0.00
2 years ago

Thank you @raman

$ 0.00
2 years ago