Computer virus - is a specially written small program that can "impute" themselves to other programs (ie "infect" them), as well as perform various undesirable actions on the computer. The program, which is located inside the virus, called a "victim". When this program starts, the first administration gets the virus. The virus is and "infect" other programs, as well as any adverse action (for example, the ports files or file allocation table on the disc, "choke" RAM, etc.). To mask the virus action to contaminate other programs and harm may not always met, and, say, if certain conditions. Once the virus is needed to fulfill his actions, it passes control of the program, in which it is located, and she also works as usual. In doing so, apparently the work of an infected program is the same as uncontaminated.
Many types of viruses so arranged that when you run an infected program the virus remains a resident, that is before DOS, in memory of the computer and occasionally infects programs and performs harmful actions on the computer.
Computer virus may spoil, that is to change improperly, any file on a disk in your computer. But some types of files virus can "infect". This means that the virus could "infiltrate" in these files, ie to modify them so that they contain the virus, which in some circumstances can begin its work.
It should be noted that the applications and documents, data files without the data tables Games and other similar files can not be infected with the virus, it can only spoil them.
Статьи по теме:
Protect photos, images and video HISTORY OF BUILDERS3Ds Max 2008 (Rip)Legal and technical documents The signals under UNIXVersion Mobile Forex 2.15: A new approach to reliability and convenienceWhy work for a computer is harmful to human healthDevelopment of Iron Industry Or Who Wanted Now Multi ProcessorsOpportunities for Windows XPSwitches NetGearPrinting without a printing press? It is possibleThe company Janet Systems Llc Presented Soa-Platform The exhibition «E-Kazakhstan»Productivity billing systemThe possibility of CompactPCI have more than 8 slotsClassification of computers Free Internet Or How to Become a HackerHow to make the right choice? 1C: Enterprise 7.7. or 8.0Plotters BASED TERMOPEREDACHI The attack at Infinity Gb V2 2 Linear Magnetic Recording Dlt (Dlt-V/Sdlt/Dlt-S4) Google on the Internet malicious softwareAptitude CompactPCI-products of rapid obsolescenceNetwork Automation planning printing by Apple (Mac)Loading the alternative modeThe world softwareThe story of software Escrow Three Training from well-known vendors: Especially for «antiviral Decisions»Implementation Crm Systems Quick Sales 2 The Company «Epos»Zao «Light Kommunikeyshn» confirm its status «Microsot Gold Certified Partner» In 2008At the market goes cheap GSM / GPS signaling Learn the truth about your child doing surfing habitsErg-exercises to prevent PVPNAvailability of Linux: The importance of today's worldLaw Bezopasnosti The history of personal computers The program 1S Salary and Personnel Management 8Loss of information - whether it can be avoided?The counterfeiting of computer informationSystemic and local bus Animation on your computer deskReduced-occupied Windows XP disk spaceClassification LAN (LCS)NETGEAR NetworkTheft of computer dataPlaying audio and video filesMicrosoft Great Plains to customers in Russia: how to find a consultant and the most frequent questionsThreats to Security Modern NetworksThe total points in the organization LANIntroducing the expense of medical software - to allow for medical centers The development of databases on Msde 2000, working with Free Database MssqlIntroduction to WindowsMobile Commerce, Mobile Commerce SystemThe structure design and generation of computers Pen plotters (PP, PEN PLOTTER)