Skip to main content

Explain Different Causes of Spread of Computer Virus

A computer virus can be spread from one computer to another, due to the following reasons:

       1. Portable Storage Media

v>
The storage media that is used to transfer files from one computer to another, is one of the biggest reason to spread virus in different computers. For example, in near past, people used foloppy disks to copy files from one computer to another. If the files being copied are infected with virus then virus will also be copied on the second computer. Similarly, computer virus can also be transfeerred from one computer to another, if we use USB flash drives, Zip Disks, Portable Hard Disks or Optical disks, different types of  Storage Cards etc. for file copy process.

      2. Internet

Nowadays, most viruses are spread through the internet. The internet has made viruses spread in a much quicker way. Computer viruses can attache to different files, making them infected. Therefore,  if your PC is infected with a virus then sharing of  infected files with other people, will transfer the virus, too.  There are two main sources of virus on internet as follows:

      a) E-Mail Attachements


Computer Virus may be spread through Email. Normally, an Email contains some files with it called Email Attachements. These attached files may be infected with computer viruses. So, if some one opens such Email and downloads/ opens the infected files, the computer may be infected with virus. Some Email viruses may send virus automatically to all email addresses saved in the email address book.

     b) Insecure Websites


There are thousands of rogue websites on the web that can infect computer with viruses. When you visit a rogue website, it will offer some material to download like a game, a screen saver or a software. The computer virus is transferred to the computer when the material is downloaded. This virus file when openned will be active and may destroy data, files  or software.

      3. Computer Networks


A Computer Virus can spread if the user connects to a infected computer network. Let a NetCafe is running a Local Area Network to share Interenet Connection and files on Disk Storage. Now if a user inserts an infected  flash USB drive in a computer system, the virus may be transferred to that comp[uter. Since the infected computer is linked with other computers in network, this virus may transfer to all computers while copying infected files.

     4.  Infected Pirated Software


An illegal copy of a software is called Pirated Software. Pirated software is not a licensed software. There are millions of free software available on CDs and Internet that are actually Pirated software.  These infected pirated software may transfer virus in the computer system if installed. There are some companies that intentionally copy virus in pirated software. So that if people buy and install unlicensed software, the virus will be activated and may harm the computer system.

Example of Infected Pirated Software Virus:

On 26th of April, 1999 a virus Called CIH was activated in computer systems using Pirated Version of Windows 95 and Windows 98. The virus was already included in Pirated software CDs. CIH used the time bomb logic to be activated automatically when the computer system's date is 26th April.
The virus was created by Chen Ing-hau, (hence the name CIH Virus)who was a student at Tatung University in Taiwan. 60 million computers were believed to be infected by the virus internationally, resulting in an estimated $1 billion US dollars in commercial damages.
CIH's dual payload was delivered for the first time on April 26, 1999, with most of the damage occurring in Asia. CIH filled the first 1024 KB of the host's boot drive with zeros and then attacked certain types of BIOS. Both of these payloads served to render the host computer inoperable, and for most ordinary users the virus essentially destroyed the PC. Technically, however, it was possible to replace the BIOS chip, and methods for recovering hard disk data emerged later.
                 Suggested Related Readings
Virus and Antivirus: Problem and Solution
  1. Top 7 Best Free Antivirus 2013 Research
  2. AVAST The Best Free Antivirus
  3. Managing Antivirus Software Properly
  4. Pakistanis Invented First PC Virus in 1986
  5. Explain Different Causes of Spread of Computer Virus
  6. Free AVG Antivirus Reliable Protection
  7. Avira Antivir Free Good Antivirus Software
  8. Download PANDA Cloud Antivirus Free
  9. Ad-Aware Free Antivirus Plus Anti Spyware
  10. Microsoft Security Essentials Free Antivirus
  11. Bitdefender Antivirus Free Edition
  12. Comodo Free Antivirus with Firewall

Comments

Popular posts from this blog

Advantages and Disadvantages of Ring Network Topology

Topic: Advantages and Disadvantages of Ring Network Topology alongwith detailed working of Ring topology What Do You Mean by Ring Topology? In Ring topology, each computer is connected to the next computer such that last computer is connected to the first. Every computer is connected to next computer in the ring. Each computer retransmits what it receives from the previous computer. Suppose, computer A needs to send data to computer D. Now the computer A sends data to computer B. As computer B is not the destination computer, so it will retransmit data to computer C. Finally, Computer C will transfer data to computer D, the destination computer. When a node sends a message, the message is processed by each computer in the ring. If a computer is not the destination node, it will pass the message to the next node, until the message arrives at its destination. Advantages of Ring Network Topology 1. It is relatively less expensive than a star topology network. 2. In a Rin

Types Of e-Commerce

Types/Categories/Modes of e-commerce. There are three main types of e-commerce as follows: 1) Business To Consumer (B2C) B2C ecommerce consists of selling goods and services to individual consumers. In this type, consumers or customers can visit the website and purchase goods online. The website will have a StoreFront. This storefront will show product details, pictures and a shopping cart. Shopping cart is used to collect items to purchase. Advantages of B2C e-commerce B2C e-commerce has the following advantages: * Shopping can be faster and more convenient. * Offerings and prices can change instantaneously. * Broadband telecommunications will enhance the buying experience. 2) Business To Business (B2B) B2B e-commerce takes place between two businesses. One business provides services to other business. Examples of B2B include: Online Advertisement, recruiting, sales, marketing, technical support and training. For eample, some companies provide online purchasing

Electricity Bill Calculator Formulas in Excel

Today, we will discuss How to create an Electricity Bill Calculator Worksheet by using Electricity Bill Calculator Formulas in Excel . The following formulas will be used in Electricity Bill Calculator Worksheet: Q: Prepare a worksheet according to the following instructions: Create a worksheet in MS Excel according to the requirements Enter sample data of Electricity units consumed by customers in a city Apply formula to calculate Units Consumed Apply formula to calculate Electricity Charges Apply formula to calculate Surcharge Apply formula to calculate Bill Payable Note: Every formula will start from  =  Units Consumed Formula=D5-C5 Electricity Charges Formula=IF(E5>200, E5*15,IF(E5>100, 1000+(E5-100)*12, E5*10)) SURCHARGE FORMULA = IF(F5>5000, F5*5%,IF(F5>1000, F5*3%, 0)) BILL PAYABLE FORMULA = SUM(F5:G5) Download Excel Electricity Bill Calculation Worksheet Free  Image for Electricity Bill Calculator Formulas in Excel Softw