Global Information Lookup Global Information

Computer virus information


Hex dump of the Brain virus, generally regarded as the first computer virus for the IBM Personal Computer (IBM PC) and compatibles

A computer virus[1] is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.[2][3] If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.[4]

Computer viruses generally require a host program.[5] The virus writes its own code into the host program. When the program runs, the written virus program is executed first, causing infection and damage. By contrast, a computer worm does not need a host program, as it is an independent program or code chunk. Therefore, it is not restricted by the host program, but can run independently and actively carry out attacks.[6][7]

Virus writers use social engineering deceptions and exploit detailed knowledge of security vulnerabilities to initially infect systems and to spread the virus. Viruses use complex anti-detection/stealth strategies to evade antivirus software.[8] Motives for creating viruses can include seeking profit (e.g., with ransomware), desire to send a political message, personal amusement, to demonstrate that a vulnerability exists in software, for sabotage and denial of service, or simply because they wish to explore cybersecurity issues, artificial life and evolutionary algorithms.[9]

As of 2013, computer viruses caused billions of dollars' worth of economic damage each year.[10] In response, an industry of antivirus software has cropped up, selling or freely distributing virus protection to users of various operating systems.[11]

  1. ^ "The Internet comes down with a virus". The New York Times. August 6, 2014.
  2. ^
    • Stallings, William (2012). Computer security : principles and practice. Boston: Pearson. p. 182. ISBN 978-0-13-277506-9.
    • "Worm vs. Virus: What's the Difference and Does It Matter?". Avast Academy. Avast Software s.r.o. Retrieved 9 March 2021.
  3. ^ Piqueira, Jose R.C.; de Vasconcelos, Adolfo A.; Gabriel, Carlos E.C.J.; Araujo, Vanessa O. (2008). "Dynamic models for computer viruses". Computers & Security. 27 (7–8): 355–359. doi:10.1016/j.cose.2008.07.006.
  4. ^
    • Alan Solomon (2011-06-14). "All About Viruses". VX Heavens. Archived from the original on 2012-01-17. Retrieved 2014-07-17.
    • Aycock, John (2006). Computer Viruses and Malware. Springer. p. 14. ISBN 978-0-387-30236-2.
  5. ^ "Worm vs. Virus: What's the Difference and Does It Matter?". Avast Academy. Avast Software s.r.o. Retrieved 9 March 2021.
  6. ^ Yeo, Sang-Soo. (2012). Computer science and its applications : CSA 2012, Jeju, Korea, 22-25.11.2012. Springer. p. 515. ISBN 978-94-007-5699-1. OCLC 897634290.
  7. ^ Yu, Wei; Zhang, Nan; Fu, Xinwen; Zhao, Wei (October 2010). "Self-Disciplinary Worms and Countermeasures: Modeling and Analysis". IEEE Transactions on Parallel and Distributed Systems. 21 (10): 1501–1514. doi:10.1109/tpds.2009.161. ISSN 1045-9219. S2CID 2242419.
  8. ^
    • Filiol, Eric (2005). Computer viruses: from theory to applications. Springer. p. 8. ISBN 978-2-287-23939-7.
    • Harley, David; et al. (2001). Viruses Revealed. McGraw-Hill. p. 6. ISBN 0-07-222818-0.
    • Ludwig, Mark A. (1996). The Little Black Book of Computer Viruses: Volume 1, The Basic Technologies. American Eagle Publications. pp. 16–17. ISBN 0-929408-02-0.
    • Aycock, John (2006). Computer Viruses and Malware. Springer. p. 27. ISBN 978-0-387-30236-2.
  9. ^ Bell, David J.; et al., eds. (2004). "Virus". Cyberculture: The Key Concepts. Routledge. p. 154. ISBN 9780203647059.
  10. ^ "Viruses that can cost you". Archived from the original on 2013-09-25.
  11. ^ Granneman, Scott. "Linux vs. Windows Viruses". The Register. Archived from the original on September 7, 2015. Retrieved September 4, 2015.

and 15 Related for: Computer virus information

Request time (Page generated in 0.8296 seconds.)

Computer virus

Last Update:

"infected" with a computer virus, a metaphor derived from biological viruses. Computer viruses generally require a host program. The virus writes its own...

Word Count : 9228

Comparison of computer viruses

Last Update:

compilation of a unified list of computer viruses is made difficult because of naming. To aid the fight against computer viruses and other types of malicious...

Word Count : 413

Timeline of computer viruses and worms

Last Update:

This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware...

Word Count : 7663

ILOVEYOU

Last Update:

The man behind the first major computer virus pandemic". Computer Weekly. The Love Bug - A Retrospect ILOVEYOU Virus Lessons Learned Report, Army Forces...

Word Count : 2453

Computer worm

Last Update:

more computers in a short time. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost...

Word Count : 2604

Antivirus software

Last Update:

a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence...

Word Count : 9194

Virus hoax

Last Update:

A computer virus hoax is a message warning the recipients of a non-existent computer virus threat. The message is usually a chain e-mail that tells the...

Word Count : 1181

Linux malware

Last Update:

includes viruses, Trojans, worms and other types of malware that affect the Linux family of operating systems. Linux, Unix and other Unix-like computer operating...

Word Count : 4794

Pikachu virus

Last Update:

The Pikachu virus, also referred to as Pokey or the Pokémon virus, was a computer worm believed to be the first malware geared at children, due to its...

Word Count : 873

Hamza Bendelladj

Last Update:

European financial institutions via a computer virus, the "SpyEYE Botnet", which infected more than 60 million computers worldwide, mostly from the United...

Word Count : 1022

EICAR test file

Last Update:

The EICAR Anti-Virus Test File or EICAR test file is a computer file that was developed by the European Institute for Computer Antivirus Research (EICAR)...

Word Count : 759

Malware

Last Update:

with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses...

Word Count : 7384

MEMZ

Last Update:

malware computer virus in the form of a trojan horse made for Microsoft Windows. The name of the virus refers to its purpose as a humorous virus intended...

Word Count : 532

Mark Gasson

Last Update:

experiments transmitting a computer virus into a human implant, and is credited with being the first human infected with a computer virus. Gasson has featured...

Word Count : 1947

Elk Cloner

Last Update:

Cloner is one of the first known microcomputer viruses that spread "in the wild", i.e., outside the computer system or laboratory in which it was written...

Word Count : 679

PDF Search Engine © AllGlobal.net