Friday, August 5, 2011

Virus Overview

Virus Overview


Computer Infections are among the greatest "bogeyman" from the Internet, with attacks by Melissa, ILoveYou, Nimda, and Michelangelo, you will find damage estimations and virus alerts on multilple web sites. But what exactly are they?

The herpes virus is really a program that propagates with other computer systems. Like several types of adware and spyware, it both runs with no user's understanding or permission also it can hinder other programs that want to run on a single computer. Some infections also have a payload, like ticking time tanks. On the given date, or following a certain time following the computer is infected, herpes will "trigger." This trigger can harm files, erase drives, or attack others on the internet.

Infections have two major goals. First, they should be run and placed on the infected computer, and 2, they have to spread with other computer systems. And they have to meet both of these goals without notifying who owns the pc.

You will find a multitude of methods of the herpes virus to contaminate something. Many early infections used the "boot sector" of the floppy disk his or her infection point. When the user powered on the pc by having an infected floppy disk within the drive, the pc would try as well in the floppy. Herpes would infect the machine, but allow it to be seem like the pc had attempted as well from the blank floppy disk. Herpes met both goals simultaneously, because whenever a new disk was placed in to the drive, herpes would put another copy of itself in to the boot sector. Today, floppy disks are much less common, and boot sector infections have basically disappeared.

Probably the most common infection routes today is as simple as email attachment. Many infections today may even search the address book and send emails with no owner's understanding.