Free birthday messages,christmas sms,love quotes,facebook quotes

About us | Read about your privacy   

Do you like ? Then .. Facebook !!


 Basic guide to blog
Free pictures for blogs
Guide for beginners

 Antivirus for cell phones
Beyond the iphone
Free applications
Free games
I phone on business
Lost cellphone ?
Tips to buy a cellphone
 Verizon voyager|I phone
Viruses in Cellphones


 Computers /Internet
 Computers past & present
Computer virus
Computer worm
Data theft
Delete history internet
Drivers download for free
Fix your PC
Free adware removal soft
 Free online antivirus scanner
Freeware download soft
 Guide to eliminate virus
 How to create password
 How to erase temp files
 How to eliminate trojans
 How to make a Backup
 How to remove spywares
 How virus damage pc
 Increase your pc security
Internet security
Internet history
Pc maintenance
Pendrives to transfer data
 Speed up downloads
Tips to buy a notebook
Tips to increase battery pw
 Windows 7

 How to be romantic
 How to flirt
How to say I love You
Places to date
Seducing a woman
Teens flirting tips
What to talk while dating
Where to go for dating

 Free usa tv channels 
Digital Terrestrial Television

 Digital TV
 Digital TV in the USA
 How to watch TV online
 Pay per view in the USA
 Satellite TV

Beautiful messages
 Best lies statuses
Love thank you
Nice wordings
Friend's day phrases
Sadness love statuses
Sweet phrases

Encouragement texts
Best friendship texts
Tender messages
Tender quotations
Texts for facebook
Texts about friendship
Texts to special friend

How to seduce an acuarius
How to seduce a cancer
How to seduce a capricorn
How to seduce a leo
How to seduce a libra
How to seduce a pisces
How to seduce a sagittarius
How to seduce a scorpio
How to seduce a virgo

How computer virus work

computer virus,how computer viruses work,free antivirus removal programs,virus history,free antivirus software protecting,free antivirus ,computer infected with virus,computer virus,how computer viruses work

Computer virus:
A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The term "virus" is also commonly used, albeit erroneously, to refer to many different types of malware and adware programs.


The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus.

A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive. Meanwhile viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer.

Viruses are sometimes confused with computer worms and Trojan horses. A worm can spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a file that appears harmless.

Worms and Trojans may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when executed. In general, a worm does not actually harm either the system's hardware or software, while at least in theory, a Trojan's payload may be capable of almost any type of harm if executed.

Some can't be seen when the program is not running, but as soon as the infected code is run, the Trojan horse kicks in. That is why it is so hard for people to find viruses and other malware themselves and why they have to use spyware programs and registry processors.

Most personal computers are now connected to the Internet and to local area networks, facilitating the spread of malicious code. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, Instant Messaging and file sharing systems to spread, blurring the line between viruses and worms.

Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware.
Some malware are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Other malware programs are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages.

computer virus,how computer viruses work,free antivirus removal programs,virus history,free antivirus software protecting,free antivirus ,computer infected with virus,computer virus,how computer viruses work

Even these less sinister malware programs can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, much malware is bug-ridden, and these bugs may lead to system crashes and data loss. Many CiD programs are programs that have been downloaded by the user and pop up every so often. This results in slowing down of the computer, but it is also very difficult to find and stop the problem.


Virus History:
The Creeper virus was first detected on ARPANET, the forerunner of the Internet in the early 1970s. It propagated via the TENEX operating system and could make use of any connected modem to dial out to remote computers and infect them. It would display the message "I'M THE CREEPER : CATCH ME IF YOU CAN.".

It is possible that the Reaper program, which appeared shortly after and sought out copies of the Creeper and deleted them, may have been written by the creator of the Creeper in a fit of regret.

A common misconception is that a program called "Rother J" was the first computer virus to appear "in the wild" — that is, outside the single computer or lab where it was created, but that claim is false. See the Timeline of notable computer viruses and worms for other earlier viruses. It was however the first virus to infect computers "in the home". Written in 1982 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread by floppy disk. This virus was originally a joke, created by a high school student and put onto a game on floppy disk. On its 50th use the Elk Cloner virus would be activated, infecting the computer and displaying a short poem beginning "Elk Cloner: The program with a personality".

The first PC virus in the wild was a boot sector virus called (c)Brain, created in 1986 by the Farooq Alvi Brothers, operating out of Lahore, Pakistan. The brothers reportedly created the virus to deter pirated copies of software they had written. However, analysts have claimed that the Ashar virus, a variant of Brain, possibly predated it based on code within the virus.

Before computer networks became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of the personal computer, many users regularly exchanged information and programs on floppies. Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector, ensuring that they would be run when the user booted the computer from the disk, usually inadvertently. PCs of the era would attempt to boot first from a floppy if one had been left in the drive. This was the most successful infection strategy until floppy disks fell from favour, making boot sector viruses the most common in the wild.

Traditional computer viruses emerged in the 1980s, driven by the spread of personal computers and the resultant increase in BBS and modem use, and software sharing. Bulletin board driven software sharing contributed directly to the spread of Trojan horse programs, and viruses were written to infect popularly traded software. Shareware and bootleg software were equally common vectors for viruses on BBS's.[citation needed] Within the "pirate scene" of hobbyists trading illicit copies of retail software, traders in a hurry to obtain the latest applications and games were easy targets for viruses.

Since the mid-1990s, macro viruses have become common. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel. These viruses spread in Microsoft Office by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most of these viruses were able to spread on Macintosh computers as well. Most of these viruses did not have the ability to send infected e-mail. Those viruses which did spread through e-mail took advantage of the Microsoft Outlook COM interface.

Macro viruses pose unique problems for detection software. For example, some versions of Microsoft Word allowed macros to replicate themselves with additional blank lines. The virus behaved identically but would be misidentified as a new virus. In another example, if two macro viruses simultaneously infect a document, the combination of the two, if also self-replicating, can appear as a "mating" of the two and would likely be detected as a virus unique from the "parents".

A virus may also send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend (a trusted source) follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating.

The newest species of the virus family is the cross-site scripting virus. The virus emerged from research and was academically demonstrated in 2005.This virus utilizes cross-site scripting vulnerabilities to propagate. Since 2005 there have been multiple instances of the cross-site scripting viruses in the wild, most notable sites affected have been MySpace and Yahoo.
Published by: ,

computer virus,how computer viruses work,free antivirus removal programs,virus history,free antivirus software protecting,free antivirus ,computer infected with virus,computer virus,how computer viruses work


You also can visit:

Basic guide to eliminate virus from pc
Computers past and present

Computer virus
Computer worms
Delete clear history internet
Drivers download for free
E-mail spam
Fix windows pc problems
Free adware removal software
Free sms text message
Freeware shareware downloads
How viruses damage our pc
How to erase search internet history completely
How to eliminate trojan horses
How to eliminate virus
How to remove computer worm
How to remove spywares
Increase pc security
Increasing notebook battery power
Internet history
Internet security basics
Notebook buying tips
Notebook life story
Pendrive to transport data
Spyware softwares
Speed up your pc
Where to find free images for blogs
Windows 7

First job hunting
How much to earn
Job markets
Job searching
Jobs in Canada
Jobs in UK
 Jobs in USA
Job interview mistakes
Team work
The personal interviuw 


 Migration to

 Advantages of Canada

 Australian work market
 Immigrate to Australia
 Jobs in Australia
 Tips for new immigrats
 Types of visas
 Working legally in Australia

 Migration to

Advantages of Canada
 Canada generalities
Canada opportunities
 Help for new migrants
 Migrate legally to Canada
 Migrate to Quebec
 Opportunities in Canada
 Obtain Canadian citizenship
 Professionals in Canada
 Working legally in Canada

Migration to New
Inmigrating to New Zealand
Opportunities in Nz
Working in New Zealand

 to Usa

Health system 
 How to apply for a job
 How to obtain greencard
 How to obtain driver license
 Income taxes
 Job opportunities in Usa
 Marriage with usa citizen
 Scholarships in Usa
 Types of visas for the Usa

How to edit photos

Gratitude letters
Engineer goals
Engineer profile
Engineer skills
 How to make a cover letter 
How to make a resume
How to post a resume
Objectives samples
Personal goals samples
Personal profile samples
Professional profile
Professional skils samples
Recommendation letters
Resumes for over 40


 Sms Worldwide
 Free sms-mms
 Free country code x sms
Christmas sms
Fathers day sms
Flirting sms
Friendship sms
Funny sms
Good morning sms
Good night sms
Happy birthday sms
Kissing sms
Love sms
Missing you sms
Mothers day sms text
New year sms
Nice sms
Positive sms 
Sms poems
Country codes for sms
At & t text sms messages
Nextel text messages
Sprint text messages
Skytel text message
T-mobile text message
Verizon text messages
 Virgin mobile sms 

 Tips & tricks
 Powerpoint tips
Speed up your pc

 Fly low cost
Fly low cost  to Usa
 How to fly cheap
Travel to Europe

 Tv channels
 Free Usa tv Channels

 Love wordings
 Love words for my wife
 Nice words to women
 Gratitud for condolences
 Words you can do it

Using cookies

We want you to enjoy your visit to our website. That's why we use cookies to enhance your experience. By staying on our website you agree to our use of cookies . Cookies policy, click the link for more information.