• Computer viruses are unwanted software programs or pieces of code.
  • It then interfere with the functioning of the computer.
  • It spread through files, data, and insecure networks.
  • While it enters our system, it can replicate to produce copies of itself to spread from one program to another program and from one infected computer to another computer.
  • There are many antiviruses, which are also a program that can help us to protect our machine from viruses.
  • It scans our system and cleans the viruses detected during the scan. Some of the popular antiviruses include Avast, Quickheal, McAfee, Kaspersky, etc.

Symptoms of a Computer Virus

There are many signs or symptoms which show that a computer is infected with a virus, some of which are as follows:

  • The machine may work slowly, e.g., it will take more time to open or shut down the computer.
  • And opening a file, document, computer application, etc. The operating system and internet speed may get slow.
  • A virus may cause unusual frequent pop-ups on any window.
  • The hard drive may exhibit unusual high activity even when it is not in use.
  • It may cause unwanted changes to our hard drive and may freeze or crash this device.
  • It may be frequent system crashes while doing some other work using the infected system. A blue screen appears when it crashes.
  • Unwanted programs may open or start automatically when we start our computer.
  • Sometimes, the window shuts down unexpectedly without any reason.
  • We may not be able to log into our accounts, to delete the corrupt files, and Blue Screen of Death (BSOD) may appear frequently, and more.
  • Furthermore, the hardware, software, or OS may start malfunctioning leading to crashing the system abruptly.
  • Sometimes, we experience high network activity even if you are not connected to the internet and vice versa.
  • If we see advertisements even when we are not browsing, it may indicate a virus on your computer.
  • We may experience different colours in our display if our computer is affected by a virus.
  • Some specific applications may not work due to viruses are developed to affect those specific applications.
  • Any website may deny access to a computer that is infected by a virus.
  • Our home page may get changed, may see a new toolbar on our screen, and we may be redirected to a different web address instead of the page visited by us initially.
  • One may see strange messages on a computer screen such as error messages.

How Virus Can be Infected?

  • Viruses unfold via devices like floppy disks, CDs, and USB drives.
  • Viruses are frequently transmitted through malicious electronic mail attachments.
  • Shared networks and peer-to-peer sharing can be responsible for virus transmission.
  • Infected websites and downloads from these websites can cause virus infections.
  • Some viruses spread through community .
  • Viruses can be transferred through infected USB drives and special peripheral gadgets.

Types of Computer Virus

Overwrite Virus:

  • It overwrites the code of the host computer system’s file with its own malicious code.
  • The content of the infected file is replaced partially or completely without changing the size of the file.
  • It destroys the original program code by overwriting it with its defective code.
  • The infected files must be deleted or replaced with a new copy because this virus cannot be removed or disinfected.

Append Virus:

  • This virus appends its malicious code to the end of the host program’s file.
  • After that, it alters the file’s header and the file’s header is redirected to the start of the malicious code of the append virus.
  • Thus, this code is executed each time the program runs.
  • Though it does not destroy the host program.
  • It modifies it such a way like it holds the virus code and enables the code to run itself.

Macro Virus :

  • Macro viruses are embedded in files, collectively with Microsoft Word or Excel files.
  • They use the macro language in those files to infect to other documents even as opened.

Boot Virus :

  • Boot region viruses infect the Master Boot Record (MBR) of a garage device
  • It is very hard to eliminate.
  • During the time of booting, virus activates and may spread to exceptional manner to that devices.

Resident Virus :

* Resident viruses keep themselves in the PC’s, making them tough to discover and eliminate. They can infect documents as they are opened or closed.

Non-resident Virus:

  • Non-resident viruses do not keep themselves in the PC’s memory.
  • They infect documents at once and depend upon the host document for execution.

Multipartite Virus :

  • Multipartite virus spreads and infects in multiple ways.
  • It infects both the boot sector and the executable files stored on the hard drive simultaneously.
  • When you turn on a computer, the boot sector virus is triggered as it latches on to the hard drive.
  • The hard drive has the data for starting up the computer.

Once it is triggered, the program files also get infected.

File Infector Virus :

  • It is one of the most commonly found computer viruses.
  • These viruses connect themselves to executable files (e.g., .exe, .com, .dll).
  • It activate while the infected report is executed.
  • They can spread to other files while the infected program is running.

Computer Worm :

  • A Computer worm is similar to a virus but is technically different from the virus.
  •  Worms don’t require a host file.
  • They’re still a form of malware.

Worms self-replicate and spread across networks and devices.

Trojan Horse :

  • A Trojan horse is malware like a virus or a worm.
  • It is technically one-of-a-kind from the virus.
  • While worms are terrific from viruses because they don’t require a bunch of reports, they have, a form of malware.
  • Worms self-replicate and spread throughout networks and gadgets.

Cavity virus:

  • It is also known as a space filler virus.
  • This virus tends to install itself by occupying the empty sections of a file.
  • It is not easy to detect this virus as it fills the empty spaces without changing the size of the file.

CMOS Virus:

  • It infects the CMOS, which stands for complementary metal-oxide semiconductor and is a memory chip that contains the system configuration.
  • This virus can erase or reset the system configuration.

Encrypted Virus:

  • It encrypts its payload to make its detection more difficult.
  • It comprises two parts: an encrypted virus body and a de cryptor, which decrypts the virus when it is executed.
  • After decryption, the virus can execute itself and replicate and become a resident.

Executable Virus:

  • It is a non-resident computer virus that resides in an executable file.
  • Whenever the infected file is executed, it infects the other files.

Rabbit Virus:

  • It is capable of creating new processes.
  • Each of the new processes further creates new processes.
  • This process continues until this virus utilizes all the available resources in the system and, the system falls short of resources.
  • It may slow down and crash the system.

Stealth Virus:

  • It is a hidden computer virus.
  • It specifically attacks operating system processes.
  • It usually hides itself in partitions, files or boot sectors and unnoticed during antivirus or anti-malware scans, so that not able to detect.

How We Can Protect ?

  • Antivirus Software: Antivirus are designed to protect, quarantine, and get rid of viruses from a gadget.
  • Firewalls: Firewalls act as a barrier between a community and potential threats, preventing unauthorized admission to and the spread of viruses.
  • Patch Management: Keeping software, working systems, and programs updated with the current safety patches.
  • Email Filtering: Running email filtering systems can block malicious attachments and hyperlinks, reducing the threat of e-mail-borne viruses.
  • Network Segmentation: Segregating networks into smaller, remoted segments can restrict the spread of viruses inside the occasion of an infection.
  • Backup and Recovery: Regularly back up the data and files and having a recovery plan can minimise the risk.
  • Security Updates: Day to day security updates is must  for effective protection from viruses.

Leave a Reply

Your email address will not be published. Required fields are marked *