COMPUTER
VIRUS
What is a Computer Virus?
A computer virus is a malicious program that self-replicates by
copying itself to another program. In other words, the computer virus spreads
by itself into other executable code or documents. The purpose of creating a
computer virus is to infect vulnerable systems, gain admin control and steal
user sensitive data. Hackers design computer viruses with malicious intent and
prey on online users by tricking them.
One of the ideal methods by which viruses spread is through
emails – opening the attachment in the email, visiting an infected website,
clicking on an executable file, or viewing an infected advertisement can cause
the virus to spread to your system. Besides that, infections also spread while connecting
with already infected removable storage devices, such as USB drives.
It is quite easy and simple for the viruses to sneak into a
computer by dodging the defense systems. A successful breach can cause serious
issues for the user such as infecting other resources or system software,
modifying or deleting key functions or applications and copy/delete or encrypt
data.
There are two types of ways in viruses operate, as soon as they
land on a new device they begin replicating, while the second type plays dead
until a particular trigger makes the malicious code to be executed. Thereby, it
is highly important to stay protected by installing a robust antivirus program.
20 Common Types of Viruses Affecting Your Computer
When we talk about computer security, the virus is the leading
threat. It can destroy a single program or the whole computer system instead.
The very first virus was created in the 1970s and was called the Creeper virus,
affecting computers on the ARPANET. In 1981, the first hacker-made virus came
into existence and spread through Apple floppy drives.
According to Information-Technology Promotion Agency, the
numbers of viruses ballooned to 52,151 in 2004. However, due to certain
programs that completely eliminate viruses, their numbers decreased to about
14,000 in 2010.
57% of the threats affecting your computer security is viruses.
Other threats include Trojans, adware, worms, and malware, among others. Now,
viruses are still widespread, affecting PC performance. Viruses are also tools
of hackers to gain unauthorised access to your system and steal private
information. It is important that you are aware of the different types of
viruses that are affecting your computers.
Resident Virus
Resident viruses live in your RAM memory. It can interfere with
normal system operation which can lead to the corruption of files and programs.
The most popular examples of resident viruses are CMJ, Meve, MrKlunky, and
Randex.
Multipartite Virus
This type of virus can easily spread in your computer system. It
is very infectious, performing unauthorized actions in your operating system,
in folders, and other programs on the computer. They have the ability to infect
both the executable files and the boots sector.
Direct Action Virus
Direct action viruses attack certain types of files, typically
.exe and .com files. The main purpose of this virus is to replicate and infect
files in folders. On the lighter note, they do not typically delete files or
affect PC performance and speed. It can be easily removed by antivirus
programs.
Browser Hijacker
This type of virus infects your web browser in which it will
bring you to different websites. Typically, if you key in a domain name in the
internet address bar, the browser hijacker will open multiple fake websites
that may harm your computer. On the other hand, most trusted browsers have
built-in features to block them ahead.
Overwrite Virus
From the name itself, this virus overwrites the content of a
file, losing the original content. It infects folders, files, and even
programs. To delete this virus, you also need to get rid of your file. Thus, it
is important to back up your data.
Web Scripting Virus
This virus lives in certain links, ads, image placement, videos,
and layout of a website. These may carry malicious codes in which when you
click, the viruses will be automatically downloaded or will direct you to
malicious websites.
Boot Sector Virus
Boot sector viruses affect floppy disks. They came to existence
when floppy disks are important in booting a computer. Although they are not
very common today, it is still causing other computer units, especially the
outdated ones. Some examples include Polyboot.B and AntiEXE.
Macro Virus
Macro viruses target applications and software that contain
macros. These viruses can carry out series of operations affecting the
performance of the program or software. Some examples of macro viruses are
O97M/Y2K, Bablas, Melissa.A, and Relax.
Directory Virus
Directory viruses change file paths. When you run programs and
software that are infected with directory viruses, the virus program also runs
in the background. Further, it may be difficult for you to locate the original
app or software once infected with directory viruses.
Polymorphic Virus
Polymorphic viruses use a special method of encoding or
encryption every time they infect a system. With this, antivirus software finds
it hard to locate then using signature searches. They are also capable of
replicating easily. Polymorphic viruses include Satan Bug, Elkern, Tuareg, and
Marburg.
File Infector Virus
This virus also infects executable files or programs. When you
run these programs, the file infector virus is activated as well which can slow
down the program and produce other damaging effects. A large block of existing
viruses belongs to this category.
Encrypted Virus
This type of virus uses encrypted malicious codes which make
antivirus software hard to detect them. They can only be detected when they
decrypt themselves during replication. Although they don’t delete files or
folders, they can badly affect PC performance.
Companion Virus
This is a type of virus that doesn’t survive without
accompanying an existing file or folder. In order to carry out damages, the
file or folder being accompanied by companion viruses should be opened or run.
Some examples of companion viruses include Terrax.1069, Stator, and
Asimov.1539.
Network Virus
Basically, this type of virus spreads out through Local Network
Area (LAN) and through the internet. These viruses replicate through shared
resources, including drives and folders. When network viruses enter a computer,
they look for their potential prey. Dangerous network viruses include Nimda and
SQLSlammer.
Nonresident Virus
Nonresident viruses replicate through modules. When the module
is executed, it will select one or more files to infect.
Stealth Virus
Stealth viruses trick antivirus software by appearing like they
are real files or programs and by intercepting its requests to the OS. Some
antivirus software cannot detect them. Sometimes, it temporarily removes itself
from the system without deletion.
Sparse Infector
Sparse infectors use different techniques to minimize its
detection. They are viruses that infect “occasionally”. For example, they may
only want to infect a program every tenth execution. Because they are
occasional infectors, antivirus software has a hard time detecting them.
Spacefiller Virus
Also known as “cavity” viruses, spacefillers attach themselves
to the file and can alter the start of the program or change the encrypted
code. They also implement stealth techniques so that users cannot determine the
increase the file code. The most popular Spacefiller is the Lehigh virus.
FAT Virus
Basically, this type of virus ruins file allocation system where
the information about files, including the location, exist.
Others
Other threats are not technically called as “virus”, but they
also have the same damaging effects as viruses. This includes worms, adware,
malware, Trojan, and ransomware.
To prevent these viruses from affecting your computer, it is
important that you install the best and the most competitive antivirus software
that can detect, block, and eliminate all types of computer viruses.
How Does a Virus Infect Your Computer?
Updated September 30, 2018
When
you see a pop-up on your computer coming from your antivirus software
that says “virus,” you know that there is some type of issue. However, not all
viruses are extremely dangerous, and they are often categorized according to
the threat level they carry. Some viruses are simply annoying, but others
are quite dangerous, and there is no such thing as a ‘good’ virus.
If
you download a file with a virus attached, you still might be able to run the
program, but now you have an extra ‘bonus,’ and this is a bonus that you do not
want.
How
Do You Know If There Is a Virus?
If
you are using a computer that has the most current version of a reputable
antivirus program, it should know when there is a virus on the computer or can
warn you if you are about to download one. It is important that you scan your
computer regularly, and make sure to schedule scans and downloads through your
antivirus software. Though there are always new viruses that appear every day,
most antivirus software is good at keeping up with these threats.
When
a good antivirus program recognizes a virus, it will immediately quarantine any
associated file that it finds. Once the virus has been isolated, it may ask if
you want to delete it immediately or put it aside. It is a good idea to take a
look at the file, as sometimes the program may consider a legitimate file a
virus and attempt to delete it. The quarantine feature allows the computer’s
owner the opportunity to either restore the file or delete it.
What
Is the Best Way to Get Rid of One?
To
delete the file from your computer, your security software will typically give
you step-by-step instructions, or some will do it for you. If you have a
Windows-based computer, Microsoft offers a number of tools to fight and remove
the virus or malware. If you have antivirus software and operating system protection,
you should be able to protect yourself from most viruses.
Here
are some steps that you can take to ensure that your system is virus-free:
- Scan
for viruses on your computer first, and make sure it is scheduled on a
regular basis. If you can run a quick scan every day and a deep scan once
a week, that should be enough.
- Make
sure that you use the antivirus program’s settings to schedule automatic
downloads and updates. If you do not do this, make sure to update your
software each day manually.
- Set
your e-mail program to let you know if you are downloading a file or
picture when opening an email. If possible, try to set your e-mail to only
display plain text and not anything else. It should prompt you before it
loads any links or pictures that may be contained within.
- Do
not ever click on a link or attempt to download a file that is from an
e-mail address that is unfamiliar to you. If you do want to access the
link from someone unknown, access the website from your bookmarks,
manually type the web address into the address bar or browse for the page
on an Internet search engine.
Technology
does not have to be overwhelming or scary, but it does force you to increase
the amount of security you use if you want to keep your information safe.
Remember, there are bad guys out there who are doing all they can to access
your data and obtain your personal information. In response, you should always
be proactive when keeping your security and antivirus software up to date.
COMPUTER
VIRUS
What is a Computer Virus?
A computer virus is a malicious program that self-replicates by
copying itself to another program. In other words, the computer virus spreads
by itself into other executable code or documents. The purpose of creating a
computer virus is to infect vulnerable systems, gain admin control and steal
user sensitive data. Hackers design computer viruses with malicious intent and
prey on online users by tricking them.
One of the ideal methods by which viruses spread is through
emails – opening the attachment in the email, visiting an infected website,
clicking on an executable file, or viewing an infected advertisement can cause
the virus to spread to your system. Besides that, infections also spread while connecting
with already infected removable storage devices, such as USB drives.
It is quite easy and simple for the viruses to sneak into a
computer by dodging the defense systems. A successful breach can cause serious
issues for the user such as infecting other resources or system software,
modifying or deleting key functions or applications and copy/delete or encrypt
data.
There are two types of ways in viruses operate, as soon as they
land on a new device they begin replicating, while the second type plays dead
until a particular trigger makes the malicious code to be executed. Thereby, it
is highly important to stay protected by installing a robust antivirus program.
20 Common Types of Viruses Affecting Your Computer
When we talk about computer security, the virus is the leading
threat. It can destroy a single program or the whole computer system instead.
The very first virus was created in the 1970s and was called the Creeper virus,
affecting computers on the ARPANET. In 1981, the first hacker-made virus came
into existence and spread through Apple floppy drives.
According to Information-Technology Promotion Agency, the
numbers of viruses ballooned to 52,151 in 2004. However, due to certain
programs that completely eliminate viruses, their numbers decreased to about
14,000 in 2010.
57% of the threats affecting your computer security is viruses.
Other threats include Trojans, adware, worms, and malware, among others. Now,
viruses are still widespread, affecting PC performance. Viruses are also tools
of hackers to gain unauthorised access to your system and steal private
information. It is important that you are aware of the different types of
viruses that are affecting your computers.
Resident Virus
Resident viruses live in your RAM memory. It can interfere with
normal system operation which can lead to the corruption of files and programs.
The most popular examples of resident viruses are CMJ, Meve, MrKlunky, and
Randex.
Multipartite Virus
This type of virus can easily spread in your computer system. It
is very infectious, performing unauthorized actions in your operating system,
in folders, and other programs on the computer. They have the ability to infect
both the executable files and the boots sector.
Direct Action Virus
Direct action viruses attack certain types of files, typically
.exe and .com files. The main purpose of this virus is to replicate and infect
files in folders. On the lighter note, they do not typically delete files or
affect PC performance and speed. It can be easily removed by antivirus
programs.
Browser Hijacker
This type of virus infects your web browser in which it will
bring you to different websites. Typically, if you key in a domain name in the
internet address bar, the browser hijacker will open multiple fake websites
that may harm your computer. On the other hand, most trusted browsers have
built-in features to block them ahead.
Overwrite Virus
From the name itself, this virus overwrites the content of a
file, losing the original content. It infects folders, files, and even
programs. To delete this virus, you also need to get rid of your file. Thus, it
is important to back up your data.
Web Scripting Virus
This virus lives in certain links, ads, image placement, videos,
and layout of a website. These may carry malicious codes in which when you
click, the viruses will be automatically downloaded or will direct you to
malicious websites.
Boot Sector Virus
Boot sector viruses affect floppy disks. They came to existence
when floppy disks are important in booting a computer. Although they are not
very common today, it is still causing other computer units, especially the
outdated ones. Some examples include Polyboot.B and AntiEXE.
Macro Virus
Macro viruses target applications and software that contain
macros. These viruses can carry out series of operations affecting the
performance of the program or software. Some examples of macro viruses are
O97M/Y2K, Bablas, Melissa.A, and Relax.
Directory Virus
Directory viruses change file paths. When you run programs and
software that are infected with directory viruses, the virus program also runs
in the background. Further, it may be difficult for you to locate the original
app or software once infected with directory viruses.
Polymorphic Virus
Polymorphic viruses use a special method of encoding or
encryption every time they infect a system. With this, antivirus software finds
it hard to locate then using signature searches. They are also capable of
replicating easily. Polymorphic viruses include Satan Bug, Elkern, Tuareg, and
Marburg.
File Infector Virus
This virus also infects executable files or programs. When you
run these programs, the file infector virus is activated as well which can slow
down the program and produce other damaging effects. A large block of existing
viruses belongs to this category.
Encrypted Virus
This type of virus uses encrypted malicious codes which make
antivirus software hard to detect them. They can only be detected when they
decrypt themselves during replication. Although they don’t delete files or
folders, they can badly affect PC performance.
Companion Virus
This is a type of virus that doesn’t survive without
accompanying an existing file or folder. In order to carry out damages, the
file or folder being accompanied by companion viruses should be opened or run.
Some examples of companion viruses include Terrax.1069, Stator, and
Asimov.1539.
Network Virus
Basically, this type of virus spreads out through Local Network
Area (LAN) and through the internet. These viruses replicate through shared
resources, including drives and folders. When network viruses enter a computer,
they look for their potential prey. Dangerous network viruses include Nimda and
SQLSlammer.
Nonresident Virus
Nonresident viruses replicate through modules. When the module
is executed, it will select one or more files to infect.
Stealth Virus
Stealth viruses trick antivirus software by appearing like they
are real files or programs and by intercepting its requests to the OS. Some
antivirus software cannot detect them. Sometimes, it temporarily removes itself
from the system without deletion.
Sparse Infector
Sparse infectors use different techniques to minimize its
detection. They are viruses that infect “occasionally”. For example, they may
only want to infect a program every tenth execution. Because they are
occasional infectors, antivirus software has a hard time detecting them.
Spacefiller Virus
Also known as “cavity” viruses, spacefillers attach themselves
to the file and can alter the start of the program or change the encrypted
code. They also implement stealth techniques so that users cannot determine the
increase the file code. The most popular Spacefiller is the Lehigh virus.
FAT Virus
Basically, this type of virus ruins file allocation system where
the information about files, including the location, exist.
Others
Other threats are not technically called as “virus”, but they
also have the same damaging effects as viruses. This includes worms, adware,
malware, Trojan, and ransomware.
To prevent these viruses from affecting your computer, it is
important that you install the best and the most competitive antivirus software
that can detect, block, and eliminate all types of computer viruses.
How Does a Virus Infect Your Computer?
Updated September 30, 2018
When
you see a pop-up on your computer coming from your antivirus software
that says “virus,” you know that there is some type of issue. However, not all
viruses are extremely dangerous, and they are often categorized according to
the threat level they carry. Some viruses are simply annoying, but others
are quite dangerous, and there is no such thing as a ‘good’ virus.
If
you download a file with a virus attached, you still might be able to run the
program, but now you have an extra ‘bonus,’ and this is a bonus that you do not
want.
How
Do You Know If There Is a Virus?
If
you are using a computer that has the most current version of a reputable
antivirus program, it should know when there is a virus on the computer or can
warn you if you are about to download one. It is important that you scan your
computer regularly, and make sure to schedule scans and downloads through your
antivirus software. Though there are always new viruses that appear every day,
most antivirus software is good at keeping up with these threats.
When
a good antivirus program recognizes a virus, it will immediately quarantine any
associated file that it finds. Once the virus has been isolated, it may ask if
you want to delete it immediately or put it aside. It is a good idea to take a
look at the file, as sometimes the program may consider a legitimate file a
virus and attempt to delete it. The quarantine feature allows the computer’s
owner the opportunity to either restore the file or delete it.
What
Is the Best Way to Get Rid of One?
To
delete the file from your computer, your security software will typically give
you step-by-step instructions, or some will do it for you. If you have a
Windows-based computer, Microsoft offers a number of tools to fight and remove
the virus or malware. If you have antivirus software and operating system protection,
you should be able to protect yourself from most viruses.
Here
are some steps that you can take to ensure that your system is virus-free:
- Scan
for viruses on your computer first, and make sure it is scheduled on a
regular basis. If you can run a quick scan every day and a deep scan once
a week, that should be enough.
- Make
sure that you use the antivirus program’s settings to schedule automatic
downloads and updates. If you do not do this, make sure to update your
software each day manually.
- Set
your e-mail program to let you know if you are downloading a file or
picture when opening an email. If possible, try to set your e-mail to only
display plain text and not anything else. It should prompt you before it
loads any links or pictures that may be contained within.
- Do
not ever click on a link or attempt to download a file that is from an
e-mail address that is unfamiliar to you. If you do want to access the
link from someone unknown, access the website from your bookmarks,
manually type the web address into the address bar or browse for the page
on an Internet search engine.
Technology
does not have to be overwhelming or scary, but it does force you to increase
the amount of security you use if you want to keep your information safe.
Remember, there are bad guys out there who are doing all they can to access
your data and obtain your personal information. In response, you should always
be proactive when keeping your security and antivirus software up to date.
FOR MORE:
ReplyDelete10. Microsoft Forms: is the shape, visual appearance, or configuration of an object. In a wider sense, the form is the way something is or happens. Form may also refer to: Form (document), a document (printed or electronic) with spaces in which to write or enter data.
Most Download Microsoft Office
1. 2007 Microsoft office Add – in: Microsoft saves as PDF or XPS:
This download allows you to export and save to the PDF and XPS formats in eight 2007 Microsoft Office programs. It also allows you to send as e-mail attachment in the PDF and XPS formats in a subset of these programs.
2. Microsoft Access Database Engine 2010 Redistributable:
This download will install a set of components that can be used to facilitate transfer of data between 2010 Microsoft Office System files and non-Microsoft Office applications.
3. Microsoft Skype for Business Basic:
Microsoft Skype for Business Basic gives you instant messaging (IM), audio and video calls, online meetings, availability (presence) information, and sharing capabilities all from one, easy-to-use program.
4. SharePoint Designer 2013:
SharePoint Designer 2013 is the tool of choice for the rapid development of SharePoint applications. Please make sure your installation of SharePoint Designer is up to date by using Microsoft Update, or installing Service Pack 1 [see Details for more info].
5. The 2007 Microsoft Office Suite Pack 3 (SP3):
Service Pack 3 provides the latest updates to the 2007 Microsoft Office Suite. This update also applies to Microsoft Office Project, Microsoft Office SharePoint Designer, Microsoft Office Visio, and Visual Web Developer.
6. 2007 Office System Driver: Data Connectivity Components:
This download will install a set of components that can be used to facilitate transfer of data between 2007 Microsoft Office System files and non-Microsoft Office applications.
7. Microsoft Access Database Engine 2016 Redistributable:
This download will install a set of components that can be used to facilitate transfer of data between Microsoft Office System files and non-Microsoft Office applications.
8. Service Pack 2 For Microsoft Office 2010 (KB2687455) 32 – Bit Edition:
Service Pack 2 (SP2) for Microsoft Office 2010 32-Bit Edition contains new updates which improve security, performance, and stability. Additionally, the SP is a roll-up of all previously released updates.
How to download Microsoft office
1. Log into your Microsoft Office 365 portal. ...
2. In the top right corner, click Install Office apps.
3. Select Office 2016. ...
4. If prompted, click the Save File button, to allow the download.
5. The install file will download to your computer.
Download and install Microsoft Office applications
With Office 365 Business Premium and Premium Security plans, you can install Microsoft Office applications on up to five computers, per user.
Warning: If you have an older version of Microsoft Office on your computer, please uninstall it before installing the new version. See Uninstall Office on a PC or a Mac, from Microsoft for help.
1. Log into your Microsoft office 365 Portal. (Need help logging in?)
2. In the top right corner, click Install Office apps.
3. Select Office 2016.
Note: The default download is 32-bit, English. If you need to download a different language version, want the 64-bit version or want to download other apps not included in the standard Office suite, click Other install options.
4. If prompted, click the Save File button, to allow the download.
5. The install file will download to your computer. Open the file and follow the instructions to install the applications on your computer.
6. When you launch the new applications, log in with your Office 365 email address and password.