0% found this document useful (0 votes)
18 views7 pages

Computer Virus

A computer virus is a type of malware that replicates itself by modifying other programs and can spread through various means such as email attachments, infected websites, and removable media. Common types of computer viruses include file infector viruses, macro viruses, and ransomware, each with distinct methods of infection and impact. Symptoms of a virus infection may include slow performance, frequent crashes, and unexplained pop-ups, indicating potential harm to the system.

Uploaded by

Erick ochieng
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views7 pages

Computer Virus

A computer virus is a type of malware that replicates itself by modifying other programs and can spread through various means such as email attachments, infected websites, and removable media. Common types of computer viruses include file infector viruses, macro viruses, and ransomware, each with distinct methods of infection and impact. Symptoms of a virus infection may include slow performance, frequent crashes, and unexplained pop-ups, indicating potential harm to the system.

Uploaded by

Erick ochieng
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Computer Virus

- Definition : A computer virus is a type of malicious software (malware) that replicates itself by
modifying other computer programs and inserting its own code. It spreads from one computer to
another, often without the user's knowledge or consent, and can cause various harmful effects,
including data loss, system corruption, and disruption of normal computer operations.
Computer viruses can spread through various modes of transmission, often exploiting
vulnerabilities in software or taking advantage of human behavior. Here are some common modes
of virus transmission:
1. Email Attachments : Viruses often spread through email attachments disguised as legitimate
files or documents. When users download and open these attachments, the virus can infect their
computer and spread to other contacts in their email address book.
2. Infected Websites : Visiting compromised websites or clicking on malicious links can lead to
virus infection. Drive-by downloads occur when malware is automatically downloaded and
installed on a user's computer without their knowledge while visiting a compromised website.
3. File Sharing Networks : Sharing infected files over peer-to-peer (P2P) networks or downloading
files from untrusted sources can spread viruses. Users may unknowingly download infected files
while sharing or downloading content through file-sharing applications.
4. Removable Media : Viruses can spread through infected USB drives, external hard drives, or
other removable media. When users connect infected removable media to their computer, the virus
can transfer to their system and potentially spread to other connected devices.
5. Social Engineering : Viruses may spread through social engineering tactics, such as phishing
emails or deceptive advertisements. These tactics trick users into downloading and executing
malware by pretending to be legitimate entities or offering enticing offers or information.
6. Software Vulnerabilities : Exploiting vulnerabilities in software, operating systems, or network
protocols is another common method of virus transmission. Attackers may develop exploits or
malware that target known vulnerabilities to infect systems and spread the virus.
7. Malicious Downloads : Users may unintentionally download malware from malicious websites,
online advertisements, or fake software downloads. Attackers distribute malware through fake
software updates, cracked software, or deceptive download links.
8. Network Vulnerabilities : Viruses can spread through network vulnerabilities, such as
unsecured network shares or outdated network protocols. Once inside a network, viruses can
propagate to other connected devices and systems, leading to widespread infection.

1
9. Social Media and Messaging Platforms : Viruses can spread through social media platforms,
messaging apps, or other online communication channels. Attackers may use malicious links,
attachments, or messages to distribute malware to unsuspecting users.
10. Drive-by Downloads : Drive-by downloads occur when malware is automatically downloaded
and installed on a user's computer without their knowledge while visiting a compromised website.
This method exploits vulnerabilities in web browsers or browser plugins to execute malicious code
on the user's system.
types of computer viruses:

1. File Infector Viruses:


- These viruses attach themselves to executable files (such as .exe or .com files) and replicate when
the infected file is executed.
- They can spread through infected files transferred via email, file-sharing networks, or removable
media.
2. Macro Viruses:
- Macro viruses infect macros within documents, spreadsheets, or other files that support macros
(such as Microsoft Office documents).
- They execute when the infected document is opened, allowing the virus to spread to other
documents or systems.
3. Boot Sector Viruses:
- Boot sector viruses infect the master boot record (MBR) or boot sector of storage devices (such
as hard drives or USB drives).
- They execute when the infected device is booted, allowing the virus to load into memory and
infect the system.
4. Polymorphic Viruses :
- Polymorphic viruses are capable of changing their code or appearance to evade detection by
antivirus software.
- They modify their code each time they replicate, making it difficult for antivirus programs to
recognize and remove them.
5. Worms :
- Worms are self-replicating malware that spread over networks without requiring user
intervention.

2
- They exploit vulnerabilities in network protocols or software to infect and spread to other
computers connected to the same network.
6. Trojans :
- Trojans disguise themselves as legitimate software or files to trick users into executing them.
- Unlike viruses, Trojans do not replicate but can perform various malicious actions, such as
stealing data, installing backdoors, or facilitating remote access.
7. Ransomware :
- Ransomware encrypts files on the victim's computer and demands a ransom payment (usually in
cryptocurrency) in exchange for the decryption key.
- It typically spreads through malicious email attachments, infected websites, or exploit kits.
8. Adware :
- Adware displays unwanted advertisements or redirects users to malicious websites to generate
revenue for the attacker.
- It often comes bundled with legitimate software or is installed inadvertently by users.
9. Spyware :
- Spyware covertly monitors and collects sensitive information from the victim's computer, such
as browsing habits, keystrokes, or personal data.
- It can be used for identity theft, espionage, or targeted advertising purposes.
10. Rootkits :
- Rootkits are stealthy malware designed to conceal their presence on the infected system.
- They often exploit vulnerabilities to gain root access or administrative privileges, allowing them
to control the system and evade detection by antivirus software.

Symptoms of a virus infection


1. Slow Performance: The computer may run significantly slower than usual, taking longer to start
up, open programs, or perform basic tasks. This slowdown can occur due to the virus consuming
system resources or interfering with system processes.
2. Frequent Crashes or Errors : The computer may crash unexpectedly or display frequent error
messages, indicating instability in the operating system or applications. These crashes can occur
during normal use or when attempting to perform specific tasks.

3
3. Unexplained Pop-ups or Ads : If you start seeing an influx of pop-up advertisements or
notifications, especially ones unrelated to the websites you're visiting, it could be a sign of adware
or potentially unwanted programs (PUPs) installed by the virus.
4. Changes in Browser Settings : Viruses, particularly browser hijackers, may alter your web
browser's homepage, search engine, or default settings without your consent. You may notice your
browser behaving differently or redirecting you to unfamiliar websites.
5. Missing or Modified Files : Viruses can delete, modify, or encrypt files on your computer. You
may discover files missing, renamed with unfamiliar extensions, or replaced with corrupted
versions. Some viruses may also encrypt files and demand ransom for decryption.
6. Unexplained Network Activity : If your internet connection seems unusually slow or you notice
excessive data usage, it could indicate that a virus is communicating with remote servers,
downloading or uploading data in the background, or participating in malicious activities like
DDoS attacks.
7. Security Software Issues : Viruses often attempt to disable or bypass antivirus and security
software to avoid detection and removal. You may find that your antivirus program is disabled,
unable to update, or displaying errors when trying to scan for threats.
8. Unexpected Pop-ups or Warnings : Some viruses display fake security alerts or warning
messages to trick users into taking specific actions, such as downloading more malware or paying
for fake tech support services. These pop-ups often use scare tactics to intimidate users.
9. Unusual System Behavior : Any unexpected behavior or changes in your computer's operation,
such as programs launching or closing on their own, unfamiliar icons appearing on the desktop or
taskbar, or changes in system settings, could indicate a virus infection.
10. High CPU or Memory Usage : You may notice unusually high CPU or memory usage even
when the computer is idle. Viruses often consume system resources to perform malicious activities
in the background, causing performance degradation.

Types of computer viruses:


1. ILOVEYOU : One of the most infamous computer viruses, ILOVEYOU spread via email in
May 2000. It originated in the Philippines and quickly became a global threat. Disguised as a love
letter or a greeting card, it infected millions of computers worldwide by overwriting files and
stealing passwords.
2. Melissa : Melissa was a macro virus that targeted Microsoft Word documents and spread
through email attachments in March 1999. Named after a Florida stripper, this virus caused
significant disruption by rapidly infecting computers and overloading email servers.

4
3. Conficker : Also known as Downup, Downadup, or Kido, Conficker emerged in 2008 and
quickly became one of the most widespread and persistent computer worms. It exploited
vulnerabilities in Windows operating systems and spread across networks, infecting millions of
computers and forming a botnet.
4. Stuxnet : Discovered in 2010, Stuxnet was a highly sophisticated computer worm designed to
target and sabotage industrial control systems, particularly those used in Iran's nuclear program. It
was the first known malware designed to cause physical damage to machinery.
5. WannaCry : WannaCry ransomware gained worldwide attention in May 2017 when it infected
hundreds of thousands of computers across over 150 countries. It exploited a vulnerability in
Microsoft Windows systems and encrypted files, demanding a ransom payment in Bitcoin for their
release.
6. Code Red and Nimda : Code Red, discovered in July 2001, and Nimda, discovered in September
2001, were two of the most significant worms to hit the internet at the time. Code Red targeted
servers running Microsoft's Internet Information Services (IIS), while Nimda spread through
8. Mydoom : Mydoom, also known as Novarg, was a prolific email worm that appeared in January
2004. It spread via email attachments and peer-to-peer networks, creating a backdoor on infected
systems and launching distributed denial-of-service (DDoS) attacks on specific websites.

5
Word Documents in Office 2019:

1. Password Protection:
- Open the Word document you want to secure.
- Click on "File" in the top-left corner.
- Select "Info" from the left-hand menu.
- Click on "Protect Document" and then choose "Encrypt with Password."
- Enter a strong password and confirm it.
- Click "OK" to apply the password protection to the document.

2. Restrict Editing:
- Open the Word document.
- Click on the "Review" tab in the ribbon.
- Select "Restrict Editing."
- Enable restrictions by checking the box "Allow only this type of editing in the document."
- Choose the desired editing restrictions, such as limiting formatting changes or restricting editing
to specific individuals or groups.
- Click "Yes, Start Enforcing Protection."
- Enter a password if prompted and click "OK" to apply the editing restrictions.

3. Mark as Final:
- Open the Word document.
- Click on "File" and then select "Info."
- Click on "Protect Document" and choose "Mark as Final."
- Confirm the action by clicking "OK."

Excel Documents in Office 2019:

1. Password Protection:
6
- Open the Excel workbook you want to secure.
- Click on "File" in the top-left corner.
- Select "Info" from the left-hand menu.
- Click on "Protect Workbook" and then choose "Encrypt with Password."
- Enter a strong password and confirm it.
- Click "OK" to apply the password protection to the workbook.

2. Protect Worksheet or Workbook Structure:


- Open the Excel workbook.
- Click on the "Review" tab in the ribbon.
- Select "Protect Workbook" or "Protect Sheet" depending on your preference.
- Choose the protection options you want to apply, such as protecting the structure of the workbook
or limiting editing on specific sheets.
- Enter a password if prompted and click "OK" to apply the protection.

You might also like