Computer virus - is a specially written small program that can "impute" themselves to other programs (ie "infect" them), as well as perform various undesirable actions on the computer. The program, which is located inside the virus, called a "victim". When this program starts, the first administration gets the virus. The virus is and "infect" other programs, as well as any adverse action (for example, the ports files or file allocation table on the disc, "choke" RAM, etc.). To mask the virus action to contaminate other programs and harm may not always met, and, say, if certain conditions. Once the virus is needed to fulfill his actions, it passes control of the program, in which it is located, and she also works as usual. In doing so, apparently the work of an infected program is the same as uncontaminated.
Many types of viruses so arranged that when you run an infected program the virus remains a resident, that is before DOS, in memory of the computer and occasionally infects programs and performs harmful actions on the computer.
Computer virus may spoil, that is to change improperly, any file on a disk in your computer. But some types of files virus can "infect". This means that the virus could "infiltrate" in these files, ie to modify them so that they contain the virus, which in some circumstances can begin its work.
It should be noted that the applications and documents, data files without the data tables Games and other similar files can not be infected with the virus, it can only spoil them.
Статьи по теме:
Best Antivirus Marking + control autopsy with labels B-367 Restoring files myth or reality?LIBCOM-2007: new items of high technology from the company «Alee Software»Learn the truth about your child doing surfing habitsMemory management FreebsdMobile Trade Optimum - Office Business RepresentativesTips software and programs connected branch Erg-exercises to improve postureAdvantages of Mobile CommerceIntroducing the expense of medical software - to allow for medical centers Industrial and engineering processes NETGEAR NetworkThe story of software Escrow Download Free Program is easy, but NevygodnoVisual work for the computer and its consequencesBlack Banner - 25y frame the Internet Corporate Information System (Crm, Erp, mobile commerce)Windows Media PlayerISA bus Basics With VirtualdubIcons in the design. Stages and stage of development of computer COMPUTER CRIME PREVENTIONIncreases user rights Free software for everyone!Three Training from well-known vendors: Especially for «antiviral Decisions»The program 1S Salary and Personnel Management 8Concentrators Ethernet NetGearCrm system, introduction Crm SystemsHow to make the right choice? 1C: Enterprise 7.7. or 8.0Requirements for computer technology Checking Software LicensingWhat file compression better?Linux set in motion devices: Now in the marketPlotters BASED TERMOPEREDACHI Black Banner - History of discovery METHODS OF PROTECTION FROM COMPUTER VIRUSESGraycatsoft - Server SoftwareLegal and technical documents The destruction of computer dataHackers, as the subjects of computer crimeMake backup ropii professionally - Norton Ghost 14Data protection. Luxury or means of survival?Technical approaches to increase the security of the computerThe history of personal computers Availability of Linux: The importance of today's worldSafety Data Maintenance of computers in the Framework for IT outsourcingNosy about the habits of your guy online? Plotters DIRECT IMAGE How Stress Editor In Word 2007The development of databases on Msde 2000, working with Free Database MssqlVISA-2000. Virtual seller of computer equipmentBlack Banner - or the threat of new technologies? Planning in the operating system UNIX