0% found this document useful (0 votes)
69 views2 pages

T Ro G e N: Computer Viruses

Computer viruses are programs that can alter or destroy data on computer systems. They can spread from one computer to another through removable media like floppy disks, or through networks and remote connections. There are several types of viruses, including worms that duplicate themselves to spread to multiple systems, Trojan horses that are disguised as useful programs but also carry hidden malicious code, and time bombs or logic bombs that lay dormant until a specific date or event triggers them to activate and cause harm.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views2 pages

T Ro G e N: Computer Viruses

Computer viruses are programs that can alter or destroy data on computer systems. They can spread from one computer to another through removable media like floppy disks, or through networks and remote connections. There are several types of viruses, including worms that duplicate themselves to spread to multiple systems, Trojan horses that are disguised as useful programs but also carry hidden malicious code, and time bombs or logic bombs that lay dormant until a specific date or event triggers them to activate and cause harm.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

COMPUTER VIRUSES

A Computer virus is a program designed to alter or destroy the data stored on a Computer
system. Computer viruses can be passed from one to another on floppy disks, over networks
and remote modem connections. These include worms, Trojan horse, time bombs, file
infectors, macro viruses, and boot sector viruses.
orm is a program whose
purpose is to duplicate
itself. An effective worm
will fill entire disks with copies of itself,
and it can spread to multiple
he middle of a useful program.
The program does do something
useful but also, via the Trojan
horse the background. Sometime a Trojan
horse is disguised as a game or a utility
program that users will find appealing,
them when the users are running the
game, they discover that they have
loaded another animal entirely. A Trojan
horse may erase the data on the hard disk
or cause other damage.
ime bombs and logic bombs are
designed to sit harmlessly on a
system until certain even or date
causes the program to become active.
Some bombs are activated by a date, a
change to a file, or a particular action
taken by a user or a program. This virus is
designed to destroy the contents of any
hard disk that it is hidden on.
ile Infectors: Most viruses are
file infectors that spread from
program and do damage to files
(such as Exe or Com files) data
and directories. A file infector virus hidden
on a floppy disk will transfer itself to any
hard disk.
acro virus is designed to
infect a specific type of
document file, such as
Microsoft word or excel files. These types
of documents can include macro, which
are small programs that execute
commands.
oot sector virus: Regards as one
of the most hostile type of virus,
a boot sector virus infects the
boot record of a hard of floppy
disk. (A boot sector is a special area of a
disk that stores essential files the
computer access during startup). The virus
moves the boot sectors data to a
different part of the disk or can make the
data stores on the disk inaccessible. When
the computer is started, the virus copies
W
T
ro
g
e
n

Horse refers
to illegal
T
F
M
B
itself into memory where it can hide and
infect other disks.

You might also like