What are computer viruses and how do they work?

A computer virus is nothing but a programme that is built to “infect” other programs by making certain changes in that programme that render it unable to perform its designated function.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

During this procedure of ‘infection’, the virus also self perpetuates, in that it makes many copies of itself, so that it can then further infect other programmes, much like the viral infections that affect human beings.

Surprisingly, there is so much similarity between the tow, in that during the replication process the copies are made exactly like the original, with no posttranslational modifications.
Depending on what the virus was created to do, it can either delete the programmes it infects, or it can make it completely useless, and may itself turn it into an ‘infecting’ programme also.
Major categories of viruses are
1 Parasitic virus:  these are the most common form of virus, it attaches itself to executable files and replicates when the infected program is executed.
2 Memory-resident virus: this virus attacks the main cache memory of the system, and gains access to all the programmes that are executed.
3 Boot sector virus: this virus infects the boot segment, and then infects all the files that are executed from the disc
4 Stealth virus: like the stealth machine, is virtually immune from anti virus softwares
5 Polymorphic virus: after each infection, the virus changes its character, thus making cleaning or treatment very difficult
6 Metamorphic virus: unlike the previous, the virus completely changes itself after every infection. .
In the lifetime of the virus, a number of phases have been identified that allow the identification and possible clean up of the virus.
1 Dormant phase: virus is not attacking in this phase. It waits for a specific trigger for which it has been programmed. It may be a particular date or a specific programme that is required. These are specific viruses, while not all viruses have been programmed to follow this phase
2  Propagation phase: virus makes multiple copies of itself to infect many files at the same time. Thus the virus may enter the files or the system areas itself.
3 Triggering phase: the virus gets its signal to become activated. Having received its signal, it then assumes a position from which it can attack easily.
4 Execution phase: this is the final step, when the virus actually performs the step it was made to do. Thus the virus may delete the file, make the programme corrupt, make multiple copies of itself, or whatever it was programmed to perform.
Viruses are operating system specific and some even only attack specific hardwares. For example the linux operating system has not yet faced a virus attack, while the microsoft system is continuously batting many virus attacks, even the apple OS is not immune from these attacks
Another identity is a worm. This is a program that can replicate itself (like a virus), but it has the additional ability to send copies from one computer to another computer across network connections, via e-mails or VPN systems
Referances
1 Heidari M. Malicious Codes in Depth. Accessed from  www.securitydocs.com. on 13 June, 2008
2 Brain M. How computer viruses worl. Accessed from www.howstuffworks.com/virus.htm on 13 June, 2008

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our Guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Online Class Help Services Available from $100 to $150 Weekly We Handle Everything