Professional Documents
Culture Documents
9. Macro virus
What are the different types of computer
Macro viruses are written in the same
viruses?
macro language used for software
applications. Such viruses spread when
1. Boot sector virus you open an infected document, often
through email attachments.
This type of virus can take control when
you start — or boot — your computer.
One way it can spread is by plugging an How to remove computer viruses
infected USB drive into your computer.
You can take two approaches to removing a
computer virus. One is the manual do-it-yourself
2. Web scripting virus
approach. The other is by enlisting the help of a
This type of virus exploits the code of
reputable antivirus program.
web browsers and web pages. If you
access such a web page, the virus can
Want to do it yourself?
infect your computer.
There can be a lot of variables when it comes to
3. Browser hijacker removing a computer virus. This process usually
This type of virus “hijacks” certain web begins by doing a web search. You may be
browser functions, and you may be asked to perform a long list of steps. You’ll need
automatically directed to an unintended time and probably some expertise to complete
website. the process.
Differences between worms and viruses The first step to remove a computer worm is to
detect the presence of the worm, which can be
difficult.
Some factors that may indicate the presence was propagated through several vectors,
of a worm include: including email attachments that appeared to be
text files, scripts run in IM chat sessions, and
copies of the virus in executables renamed with
Computer performance issues, including the names of common system files.
degraded system performance, system
freezing or crashing unexpectedly.
ILOVEYOU primarily spread when targeted
Unusual system behavior, including victims opened an email attachment, and the
programs that execute or terminate without malware resent itself to all of the victim's
user interaction; unusual sounds, images or contacts in Microsoft Outlook. Though,
messages; the sudden appearance of technically, this aspect of the worm required
unfamiliar files or icons, or the unexpected user interaction, the overall effect was that the
disappearance of files or icons; warning virus spread during normal operation of desktop
messages from the operating system or computers, and without the initial awareness of
antivirus software; and email messages sent the victims. The malware reportedly affected as
to contacts without user action. many as 45 million users on May 4, 2000,
spreading so rapidly that some enterprises,
Removing a computer worm can be difficult. In including Ford Motor Company, were forced to
extreme cases, the system may need to be shut down their email services.
formatted, and all the software reinstalled. If it is
possible to identify the computer worm infecting
the system, there may be specific instructions or
tools available to remove the infection. However,
the system should be disconnected from the
https://searchsecurity.techtarget.com/definition/wo
internet or any network, wired or wireless, before
rm
attempting to remove the computer worm;
removable storage devices should also be
removed and scanned separately for infections.