You can easily remove Virus from your computer and get it back!
Table of Contents
What is a COMPUTER VIRUS?
Computer virus is a program that is not intended to make your life easier. Computer viruses can spread from one computer to the next by reproducing themselves. Some viruses can affect computers as soon their code is executed. Others stay there until a preconfigured condition has been met.
Viruses can also be disguised in attachments of funny images, greetings cards, or audio and visual files. Downloads from the Internet can also spread computer viruses. They can be hidden in illegal software or other files you download. They can be found in many forms, including backdoors, rootkits, Trojans, rootkits, and worms.
What are the Characteristics Of The PC Viruses?
How Computer Viruses Work
Once the virus is introduced to the system (from one of many possible methods), Computer Viruses will reproduce themselves and attach to any.EXE (randomly generated name). Each virus has a different characteristic and may function differently in each variation.
What does the virus do to your computer?
Computer viruses cannot infect your computer if it is not allowed to execute its code to the RAM. The Computer viruses will be attached to your computer with a Software Wrapping Program (more about Wrapper here). During the infection phase, the virus replicates itself and attaches directly to an.EXE file. This can change at any time the virus is executed or triggered.
As you can see, in a clean computer (left), the.EXE IP will run the Program. However, in an infected system, it will cause the virus to start before the infected programs.
How can a computer get infected with viruses?
How can you protect your computer from viruses?
Because viruses are different from one another and there are many types of viruses, I will only deep dive into a few and give you information about them so you can understand their design and function.
The Klez virus infected victim’s computer with an e-mail message in late 2001. The virus spread itself and sent itself to all contacts in the victim’s address book.
The virus could cause virus-scanning software to stop working and could also be used as a false virus-removal tool. A modified version of this virus can take any name from a victim’s contact list and place it in the “From” field. This is known as spoofing.
Spoofing an e-mail will make it appear that it is coming from a source, but in fact it is coming from another. Spoofing will make it impossible for the recipient to block email from the user.
Melissa was discovered in 1999 and was the first virus to spread from one computer to another without the need for user action.
The virus prompts the recipient open a document, activating the virus. The virus activates itself and can be replicated to send 50 people to 50 addresses in the recipient’s email address book.
MyDoom opens a backdoor in victim’s OS. There were two triggers for the MyDoom virus. The first trigger started a DoS attack (denial of service) on February 1, 2004. The second trigger was activated on February 12, 2004, which stopped the virus from spreading.
Later in the year, MyDoom virus spread to several search engine companies. The virus would send a request to a search engine, and it would use the e-mail addresses found in the search results. This type of attack caused website crashes and slowdowns in search engine services.
Virut virus writes its initial code into GAP at the end of the code section in the original file and redirects the entry points address to that “malicious” code.
Types of viruses
My bl contains more information about virus types.