Computer Virus
Computer Virus
- Definition : A computer virus is a type of malicious software (malware) that replicates itself by
modifying other computer programs and inserting its own code. It spreads from one computer to
another, often without the user's knowledge or consent, and can cause various harmful effects,
including data loss, system corruption, and disruption of normal computer operations.
Computer viruses can spread through various modes of transmission, often exploiting
vulnerabilities in software or taking advantage of human behavior. Here are some common modes
of virus transmission:
1. Email Attachments : Viruses often spread through email attachments disguised as legitimate
files or documents. When users download and open these attachments, the virus can infect their
computer and spread to other contacts in their email address book.
2. Infected Websites : Visiting compromised websites or clicking on malicious links can lead to
virus infection. Drive-by downloads occur when malware is automatically downloaded and
installed on a user's computer without their knowledge while visiting a compromised website.
3. File Sharing Networks : Sharing infected files over peer-to-peer (P2P) networks or downloading
files from untrusted sources can spread viruses. Users may unknowingly download infected files
while sharing or downloading content through file-sharing applications.
4. Removable Media : Viruses can spread through infected USB drives, external hard drives, or
other removable media. When users connect infected removable media to their computer, the virus
can transfer to their system and potentially spread to other connected devices.
5. Social Engineering : Viruses may spread through social engineering tactics, such as phishing
emails or deceptive advertisements. These tactics trick users into downloading and executing
malware by pretending to be legitimate entities or offering enticing offers or information.
6. Software Vulnerabilities : Exploiting vulnerabilities in software, operating systems, or network
protocols is another common method of virus transmission. Attackers may develop exploits or
malware that target known vulnerabilities to infect systems and spread the virus.
7. Malicious Downloads : Users may unintentionally download malware from malicious websites,
online advertisements, or fake software downloads. Attackers distribute malware through fake
software updates, cracked software, or deceptive download links.
8. Network Vulnerabilities : Viruses can spread through network vulnerabilities, such as
unsecured network shares or outdated network protocols. Once inside a network, viruses can
propagate to other connected devices and systems, leading to widespread infection.
1
9. Social Media and Messaging Platforms : Viruses can spread through social media platforms,
messaging apps, or other online communication channels. Attackers may use malicious links,
attachments, or messages to distribute malware to unsuspecting users.
10. Drive-by Downloads : Drive-by downloads occur when malware is automatically downloaded
and installed on a user's computer without their knowledge while visiting a compromised website.
This method exploits vulnerabilities in web browsers or browser plugins to execute malicious code
on the user's system.
types of computer viruses:
2
- They exploit vulnerabilities in network protocols or software to infect and spread to other
computers connected to the same network.
6. Trojans :
- Trojans disguise themselves as legitimate software or files to trick users into executing them.
- Unlike viruses, Trojans do not replicate but can perform various malicious actions, such as
stealing data, installing backdoors, or facilitating remote access.
7. Ransomware :
- Ransomware encrypts files on the victim's computer and demands a ransom payment (usually in
cryptocurrency) in exchange for the decryption key.
- It typically spreads through malicious email attachments, infected websites, or exploit kits.
8. Adware :
- Adware displays unwanted advertisements or redirects users to malicious websites to generate
revenue for the attacker.
- It often comes bundled with legitimate software or is installed inadvertently by users.
9. Spyware :
- Spyware covertly monitors and collects sensitive information from the victim's computer, such
as browsing habits, keystrokes, or personal data.
- It can be used for identity theft, espionage, or targeted advertising purposes.
10. Rootkits :
- Rootkits are stealthy malware designed to conceal their presence on the infected system.
- They often exploit vulnerabilities to gain root access or administrative privileges, allowing them
to control the system and evade detection by antivirus software.
3
3. Unexplained Pop-ups or Ads : If you start seeing an influx of pop-up advertisements or
notifications, especially ones unrelated to the websites you're visiting, it could be a sign of adware
or potentially unwanted programs (PUPs) installed by the virus.
4. Changes in Browser Settings : Viruses, particularly browser hijackers, may alter your web
browser's homepage, search engine, or default settings without your consent. You may notice your
browser behaving differently or redirecting you to unfamiliar websites.
5. Missing or Modified Files : Viruses can delete, modify, or encrypt files on your computer. You
may discover files missing, renamed with unfamiliar extensions, or replaced with corrupted
versions. Some viruses may also encrypt files and demand ransom for decryption.
6. Unexplained Network Activity : If your internet connection seems unusually slow or you notice
excessive data usage, it could indicate that a virus is communicating with remote servers,
downloading or uploading data in the background, or participating in malicious activities like
DDoS attacks.
7. Security Software Issues : Viruses often attempt to disable or bypass antivirus and security
software to avoid detection and removal. You may find that your antivirus program is disabled,
unable to update, or displaying errors when trying to scan for threats.
8. Unexpected Pop-ups or Warnings : Some viruses display fake security alerts or warning
messages to trick users into taking specific actions, such as downloading more malware or paying
for fake tech support services. These pop-ups often use scare tactics to intimidate users.
9. Unusual System Behavior : Any unexpected behavior or changes in your computer's operation,
such as programs launching or closing on their own, unfamiliar icons appearing on the desktop or
taskbar, or changes in system settings, could indicate a virus infection.
10. High CPU or Memory Usage : You may notice unusually high CPU or memory usage even
when the computer is idle. Viruses often consume system resources to perform malicious activities
in the background, causing performance degradation.
4
3. Conficker : Also known as Downup, Downadup, or Kido, Conficker emerged in 2008 and
quickly became one of the most widespread and persistent computer worms. It exploited
vulnerabilities in Windows operating systems and spread across networks, infecting millions of
computers and forming a botnet.
4. Stuxnet : Discovered in 2010, Stuxnet was a highly sophisticated computer worm designed to
target and sabotage industrial control systems, particularly those used in Iran's nuclear program. It
was the first known malware designed to cause physical damage to machinery.
5. WannaCry : WannaCry ransomware gained worldwide attention in May 2017 when it infected
hundreds of thousands of computers across over 150 countries. It exploited a vulnerability in
Microsoft Windows systems and encrypted files, demanding a ransom payment in Bitcoin for their
release.
6. Code Red and Nimda : Code Red, discovered in July 2001, and Nimda, discovered in September
2001, were two of the most significant worms to hit the internet at the time. Code Red targeted
servers running Microsoft's Internet Information Services (IIS), while Nimda spread through
8. Mydoom : Mydoom, also known as Novarg, was a prolific email worm that appeared in January
2004. It spread via email attachments and peer-to-peer networks, creating a backdoor on infected
systems and launching distributed denial-of-service (DDoS) attacks on specific websites.
5
Word Documents in Office 2019:
1. Password Protection:
- Open the Word document you want to secure.
- Click on "File" in the top-left corner.
- Select "Info" from the left-hand menu.
- Click on "Protect Document" and then choose "Encrypt with Password."
- Enter a strong password and confirm it.
- Click "OK" to apply the password protection to the document.
2. Restrict Editing:
- Open the Word document.
- Click on the "Review" tab in the ribbon.
- Select "Restrict Editing."
- Enable restrictions by checking the box "Allow only this type of editing in the document."
- Choose the desired editing restrictions, such as limiting formatting changes or restricting editing
to specific individuals or groups.
- Click "Yes, Start Enforcing Protection."
- Enter a password if prompted and click "OK" to apply the editing restrictions.
3. Mark as Final:
- Open the Word document.
- Click on "File" and then select "Info."
- Click on "Protect Document" and choose "Mark as Final."
- Confirm the action by clicking "OK."
1. Password Protection:
6
- Open the Excel workbook you want to secure.
- Click on "File" in the top-left corner.
- Select "Info" from the left-hand menu.
- Click on "Protect Workbook" and then choose "Encrypt with Password."
- Enter a strong password and confirm it.
- Click "OK" to apply the password protection to the workbook.