Соглашение | Публикация статей
Красивые рольшторы - roll-service.by / Ремонт в Минске tvoi-master.by

Computer virus
Категория: English version

Computer virus - is a specially written small program that can "impute" themselves to other programs (ie "infect" them), as well as perform various undesirable actions on the computer. The program, which is located inside the virus, called a "victim". When this program starts, the first administration gets the virus. The virus is and "infect" other programs, as well as any adverse action (for example, the ports files or file allocation table on the disc, "choke" RAM, etc.). To mask the virus action to contaminate other programs and harm may not always met, and, say, if certain conditions. Once the virus is needed to fulfill his actions, it passes control of the program, in which it is located, and she also works as usual. In doing so, apparently the work of an infected program is the same as uncontaminated.
Many types of viruses so arranged that when you run an infected program the virus remains a resident, that is before DOS, in memory of the computer and occasionally infects programs and performs harmful actions on the computer.
Computer virus may spoil, that is to change improperly, any file on a disk in your computer. But some types of files virus can "infect". This means that the virus could "infiltrate" in these files, ie to modify them so that they contain the virus, which in some circumstances can begin its work.
It should be noted that the applications and documents, data files without the data tables Games and other similar files can not be infected with the virus, it can only spoil them.


Статьи по теме:

Best Antivirus
Marking + control autopsy with labels B-367
Restoring files myth or reality?
LIBCOM-2007: new items of high technology from the company «Alee Software»
Learn the truth about your child doing surfing habits
Memory management Freebsd
Mobile Trade Optimum - Office Business Representatives
Tips software and programs connected branch
Erg-exercises to improve posture
Advantages of Mobile Commerce
Introducing the expense of medical software - to allow for medical centers
Industrial and engineering processes
NETGEAR Network
The story of software Escrow
Download Free Program is easy, but Nevygodno
Visual work for the computer and its consequences
Black Banner - 25y frame the Internet
Corporate Information System (Crm, Erp, mobile commerce)
Windows Media Player
ISA bus
Basics With Virtualdub
Icons in the design. Stages and stage of development of computer
COMPUTER CRIME PREVENTION
Increases user rights
Free software for everyone!
Three Training from well-known vendors: Especially for «antiviral Decisions»
The program 1S Salary and Personnel Management 8
Concentrators Ethernet NetGear
Crm system, introduction Crm Systems
How to make the right choice? 1C: Enterprise 7.7. or 8.0
Requirements for computer technology
Checking Software Licensing
What file compression better?
Linux set in motion devices: Now in the market
Plotters BASED TERMOPEREDACHI
Black Banner - History of discovery
METHODS OF PROTECTION FROM COMPUTER VIRUSES
Graycatsoft - Server Software
Legal and technical documents
The destruction of computer data
Hackers, as the subjects of computer crime
Make backup ropii professionally - Norton Ghost 14
Data protection. Luxury or means of survival?
Technical approaches to increase the security of the computer
The history of personal computers
Availability of Linux: The importance of today's world
Safety Data
Maintenance of computers in the Framework for IT outsourcing
Nosy about the habits of your guy online?
Plotters DIRECT IMAGE
How Stress Editor In Word 2007
The development of databases on Msde 2000, working with Free Database Mssql
VISA-2000. Virtual seller of computer equipment
Black Banner - or the threat of new technologies?
Planning in the operating system UNIX