Pages Menu
TwitterRssFacebook
Categories Menu

Posted by on Mar 5, 2019 in Technology | 0 comments

A Very Basic Understanding Of Computer Virus

A Very Basic Understanding Of Computer Virus

Basically, a computer virus is a computer program that has the ability to make replicas of itself by inserting a program into another file. Similar to real viruses, they can spread quickly to files on a computer, or even infect files on other computers, both through the network and through the activity of exchanging files. In the meantime, perhaps you also need to try the excellent Free antivirus for helping you guard your own PC against dangerous viruses.

We used to know the distribution of viruses based on the target of the spread, namely the virus boot sector and virus files. The boot sector virus is designed by the manufacturer to infect the boot sector, which is part of a storage media (diskette, hard disk) that is first read by the operating system when the media is accessed. Once the storage media infected by this type of virus is used to boot, the virus stays in memory and is ready to infect other storage media used on the same computer. Later, the boot sector virus developed into a more virulent type, which is known as the partition virus. The partition table is the part of the hard disk that stores CHS data (cylinder /head/sector) which is a guideline for the operating system to carry out the reading process. Once this part is destroyed by a virus, then, of course, the hard disk can no longer be read and all the data in it also floats.

Meanwhile, the virus file works by inserting the program in a file. In the past, when the use of the DOS operating system was still widespread, the target of this type of virus was executable files, namely those whose names ended with the extension.COM or .EXE. In addition to transmission, file viruses often add certain commands to the program code they transmit. Generally, this kind of virus has the character as a “time bomb”, where the virus program will perform its actions at certain times that have been determined by the programmer. This “action” can vary, from the light ones such as displaying messages and sounding speakers, to tampering with deleting data or even formatting the hard disk.

Share This