You are on page 1of 8

adware. The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware. and spyware programs that do not have the reproductive ability.   A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term "virus" is also commonly but erroneously used to refer to other types of malware. .

  A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer. for instance because a user sent it over a network or the Internet. DVD. or carried it on a removable medium such as a floppy disk. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. CD. or USB drive. .

.A worm is a small piece of software that uses computer networks and security holes to replicate itself.A Trojan horse is simply a computer program. Worms .   E-mail viruses . Trojan horses .An e-mail virus travels as an attachment to e-mail messages. and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book.

   Like biological virus transform into human bodies. In order to replicate itself. . If user attempts to launch an infected program. computer virus can also pass from one computer to another. the virus' code may be executed simultaneously and multiply itself. a virus must be permitted to execute code and write to memory.

When PC’s were started using widespread.. virus were created by the programmers. .. and they came about because of several factors. And this trend increased day by day .   Traditional computer viruses were first widely seen in the late 1980s.

WORST COMPUTER VIRUSES •Melissa (1999) •ILOVEYOU (2000) •The Klez Virus (2001) •Nimda (2001) •SQL Slammer/Sapphire (2003) •MyDoom (2004) •Sasser and Netsky (2004) •Leap-A/Oompa-A (2006) •torm Worm (2001) .

take precaution before opening any unknown attachment from unknown sender. Mac etc would help a great deal to prevent virus infection. Avoid programs from unknown sources. . For email viruses.    Using protected operating system such as Linux. Run virus protection software that are easily available in the market and keep them up to date.