A computer virus will function as an element that will constitute damage to the hard disk contents or interfere with the normal operational executions of the computer system. This will cause the computer to be unable to function properly until the virus is eliminated and the overall system is overhauled and rebooted.
A virus program is usually able to replicate itself and this too is an added problem once the virus latches on to a system. Progressively getting out of control, the virus will attempt to cause as much damage as possible before it can be detected and eliminated.
The replication is usually intentional and designed to act just like a Trojan, thus causing the unsuspecting user to be caught off guard. If a file that contains a virus is opened, or copied onto another computer, then the other computer will also become infected and this process is repeated every time the file is opened and downloaded onto other systems.
A virus can easily be introduced into a computer system along with any software program and this is bad news for the users of FTP otherwise referred to as file transfer protocol.
The viruses can also become a problem when there is referencing done and email attachments are being used. When the virus enters the computer system, it can attach itself to, or even replace an existing program.
This of course is not good for the user, who will ultimately open the attachment or file and cause the virus to be activated.
How Are Viruses Spread?
Having a virus unleashes itself within a computer system can be a nightmare for the user, as this is most often done unintentionally but with no less detrimental effects. There is no real way to detect how a virus really attacks and spreads but a lot of effort is put into how to ensure the damage done is as minimal as possible.
How They Get Around
The following are some of the more frequent ways that viruses can spread from one computer system to another effectively until detection is almost too late to save the infected material:
- Email attachments are by far the most popular way that viruses find their way into the user’s computer system. When Microsoft’s Outlook Express automatically opens attachments to emails received, the virus is automatically unleashed on the system. However, most users now tend to avoid opening attachments they are unfamiliar with and instead resort to immediately deleting them to ensure the virus does not gain access into the system.
- Rogue websites are another problem area for unleashing viruses. Sometimes the virus is introduced into the system by simply visiting websites without knowing the possibility of the virus being embedded in the site’s content. Thus when the site is downloaded, so will the virus too.
- Networks are also another popular way the virus is able to gain some momentum, as any user on the same server opening a site where there is a virus will unleash the virus onto other users’ systems too. It usually takes only one party to accidentally open an infected site and all the other users on the network will be exposed to the virus infecting their systems too.
- Infected disks are sometimes the cause of the virus spreading, as the user of the infected disk is the source of the hard drive being infected and thus corrupting all the material on the hard drive itself.
How Bad Can A Virus Attack Be?
A Computer Virus in itself, is a very damaging program and when unleashed on a computer system, the damage can be quite devastating, to say the least. Even in the mildest form, viruses can, and usually do, cause a lot of damage to the user’s system.
Viruses Are Serious
It would seem that the virus is able to show the vulnerability of the user and the tools being used, while at the same time, these viruses are able to display just how innovative the inventor can be if there is a need to inflict online damage, without any actual physical intervention.
Phenomenal numbers have been documented within the very small window of time that it takes to cause devastating damage to a computer system. Some of the damage done will not be able to be rectified, thus causing the user to lose all the data permanently.
Applications can also be lost but usually, it is fairly simple to download again but this is not so possible when it comes to data loss.
Viruses are usually designed to represent a small piece of software that latches onto existing programs until it is activated and then launches into damage mode.
An example of such would be the almost unavoidable use of spreadsheet software, as this particular application is bound to be open often thus making it an ideal place to attach the virus to.
Email viruses are also another area where there are usually devastating results from the invasion of a virus. This is especially so if the user tends to open attachments without proper care or scrutiny.
Trojan horses are also simple computer programs that claim to perform with one objective but usually come with the intention of infecting the user’s system with a virus.