Fighting the Threat: A Guide to Understanding and Protecting Against Viruses and Malware
A computer virus is a software, or malware, that spreads between computers and causes damage to your data, software, and hardware. Computer viruses aim to cause problems on your computers system, cause operational issues, and result in leakage and data loss. An important thing to know about computer viruses is that they are made to spread across the systems and programs. Computer viruses are mostly attached to executable host files, which results in their viral codes executing when a file is opened. Then code spreads from the software or document it is attached to via drives, networks, infected email attachments, or file-sharing programs. There are different viruses types: Boot Sector Virus, Macro Virus, File Infector Virus, Email Virus, Trojan Horse Virus, Worm, Ransomware, Spyware, etc.
Boot Sector Virus
Boot sector is a section of a disk reserved for the code and the data needed to be saved for the operation system (OS) to start. Boot sector virus is a malware that infects the booting partition or MBR(Master Boot Record) of your hard drive(HDD) or Solid State Drive(SSD), which makes it difficult for your PC to boot up.Macro Viruses
It is a computer virus which is written in macro language which was used to create software like Exel or Word. They work by adding the code to the macros which are associated with spreadsheets, documents and other files.
File Infector Viruses
This type of viruses infect the files of a program, application or game, etc. Once they are executed the stay in the memory of your PC and spread their self in other programs.Email Viruses
It is a malicious code which is spread through email messages through email attachments, email links, etc.Trojan Horse Viruses
Trojan Horse Virus is a malware that is downloaded in the victims computer as a legitimate program. The attacker hides the malicious code within a software and then try to gain access to victim's computer.Worm Viruses
Worm Viruses are a malicious programs which replicate their self and spread through a network. They aim to install backdoors to gain access on the system, steal sensitive information, corrupting files and other types of harm.
.jpg)