Question:

What are computer viruses and how do they work?

Computer Viruses and Their Effects

Viruses are software programs, and they can do the same things as any other programs running on a computer. The actual effect on information security or data security of any particular virus depends on how it was programmed by the person who wrote the virus. Some viruses are deliberately designed to damage files or otherwise interfere with your computer's operation, while others don't do anything but try to spread themselves around and compromise internet security. But even the ones that just spread themselves are harmful, since they damage files and may cause other problems in the process of spreading.

Computer Viruses

If your computer is infected with a boot sector virus, the virus tries to write copies of itself to the system areas of floppy disks and hard disks. Then the infected floppy disks may destroy the computer security of other computers that boot from them, and the virus copy on the hard disk will try to infect still more floppies. Some viruses, known as 'multipartite' viruses, can spread both by infecting files and by infecting the boot areas of floppy disks.

What is a Computer Virus?

What is a computer virus? A computer virus is a program designed to compromise computer security and spread itself by first infecting executable files or the system areas of hard and floppy disks and then making copies of itself. Viruses usually operate without the knowledge or desire of the computer user and are a threat to data security. They also may slow down your pc or may corrupt specific files. Viruses often come through email messages but can also come from software installation or just from clicking on a website.

Computer Viruses and Data Security

Viruses have the potential to infect any type of executable code, not just the files that are commonly called 'program files'. For example, some viruses compromise data security and infect executable code in the boot sector of floppy disks or in system areas of hard drives. Another type of virus, known as a 'macro' virus, can damage computer security by infecting word processing and spreadsheet documents that use macros. And it's possible for HTML documents containing JavaScript or other types of executable code to spread viruses or other malicious code.

How do Computer Viruses Work?

Virus programs are not a threat to your information security or computer security until the you run the program containing it. When you execute program code that's infected by a virus, the virus code will also run and try to infect other programs, either on the same computer or on other computers connected to it over a network. And the newly infected programs will compromise internet security as they try to infect yet more programs.

Computer Viruses

When planning your strategy for backing up data (and you should back up your data regularly), always make sure you have a way to restore the information from your backup to the main system, that doesn't involve using the backup itself. It's an important part of data security and information security. If your restoration program is saved as part of your backup copy, you might not be able to restore your data in a crisis - because to do the restoration, you need the software that has to be restored. It becomes a 'catch-22' situation. Usually, having the installation disks for your backup program will prevent the 'catch-22'.

What Will a Computer Virus do to my Computer?

Note that viruses can't do any damage to hardware: they won't melt down your CPU, burn out your hard drive, cause your monitor to explode, etc. Warnings about viruses that will physically destroy your computer are usually hoaxes, not legitimate virus warnings. You don't risk your computer security by ignoring these warnings.

Computer Viruses

Here are some tips for protecting your computer and privacy by using a common sense approach to online security. Never give out sensitive personal information, such as your credit card number, social security number, or passwords, in an IM conversation. Only communicate with people on your Contact List or Buddy List. Never agree to meet a stranger in person whom you've met on IM. Never accept files or downloads from people you don't know. Never accept files that you weren't expecting from people you do know. Each IM program assigns you a name, not unlike an e-mail address. This name is usually called a screen name. Choose a name that doesn't give away your personal information. For example, use SassySue instead of DetroitSue.

Internet Safety Frequently Asked Questions

What is an internet filter?

Can I filter internet content about drugs and alcohol?

Can I filter content about hate and criminal behavior?

What are some of the filtering criteria offered by internet filtering?

Can internet filtering block good or informational websites?

What can an internet report show me?

What are features I should look for in a spam filter?

Why should I use a porn blocker?

Why is a porn blocker so important?

How did computer hacking start?

What can you tell me about hackers?

What are computer viruses and how do they work?

What is a Trojan Horse program and how does it work?

How can I protect myself from viruses and Trojan horse programs?

How can I protect my computer's data?

What should I do if I think my computer is infected by a virus?

How can a firewall protect my computer?

How do I stop unauthorized access to my computer?

How have computer viruses evolved?

How do I make sure my password is secure?

What are computer viruses and how do they work?

How can I protect myself from viruses and Trojan horse programs?

What organizations exist to help combat computer crime?

How can a firewall protect my computer?

How can I protect myself from viruses and Trojan horse programs?

How can a firewall protect my computer?

How did computer hacking start?

What organizations exist to help combat computer crime?

How can I protect myself from viruses and Trojan horse programs?

How have computer viruses evolved?

What can you tell me about hackers?

How do I get rid of pop-ups?

How can I keep spam out of my mailbox?

What anti-spam laws exist?

What is spyware and how do I stop it?

How do I get rid of pop-ups?

How can a firewall protect my computer?





Not finding the advice and tips you need on this Internet Safety Tip Site? Request a Tip Now!


Guru Spotlight
William Pirraglia