Today’s viruses are far more potent than the beginner versions we saw several decades ago. Viruses may be sent by opening email attachments, clicking on spam, visiting corrupt websites and links online, opening spreadsheets or even the original method—infected disks. But the Internet is now the superhighway for virus transmission.
Some aggressive viruses—such as the Melissa virus—automatically duplicate copies of itself to the first 50 people in your computer email address book. A frightening prospect—opening an email from someone you trust to be greeted by a virus, and that’s exactly what the author is counting on, your trust.
The damage caused by these viruses varies from minor delays in computer function to complete destruction of your hard drive. For companies, the price is far higher. A downed website can cost a company millions of dollars a day.
How does the virus infect your computer? Because floppy use is nearly extinct and the majority of CDs that change hands cannot be altered, you will most likely bump into a virus through online activity.
Some viruses attack your boot sector, the start up section of your hard drive. Other viruses infect executable program files, activating each time the program is started. The virus travels into the memory and further copies itself.
Macro-viruses are the most common type of computer virus. This type of virus attacks data files containing macros. Macros are lists of commands or actions found under key headings. The virus resembles a macro but when the file is opened, the virus is activated.
Multi-partite viruses are a combination of the boot sector and file virus. These begin in the boot sector and affect both your boot records and program files.
No comments:
Post a Comment