Computer virus - is a specially written small program that can "impute" themselves to other programs (ie "infect" them), as well as perform various undesirable actions on the computer. The program, which is located inside the virus, called a "victim". When this program starts, the first administration gets the virus. The virus is and "infect" other programs, as well as any adverse action (for example, the ports files or file allocation table on the disc, "choke" RAM, etc.). To mask the virus action to contaminate other programs and harm may not always met, and, say, if certain conditions. Once the virus is needed to fulfill his actions, it passes control of the program, in which it is located, and she also works as usual. In doing so, apparently the work of an infected program is the same as uncontaminated.
Many types of viruses so arranged that when you run an infected program the virus remains a resident, that is before DOS, in memory of the computer and occasionally infects programs and performs harmful actions on the computer.
Computer virus may spoil, that is to change improperly, any file on a disk in your computer. But some types of files virus can "infect". This means that the virus could "infiltrate" in these files, ie to modify them so that they contain the virus, which in some circumstances can begin its work.
It should be noted that the applications and documents, data files without the data tables Games and other similar files can not be infected with the virus, it can only spoil them.
Статьи по теме:
Terms of the need for backup devices The program to automate Beauty Shop - Business tool or waste of money?Mobile Trade Optimum - Office Business RepresentativesThe company Janet Systems Llc Presented Soa-Platform The exhibition «E-Kazakhstan»How Stress Editor In Word 2007How to Choose a Printer?Pen plotters (PP, PEN PLOTTER)The process of software development, the Program for BusinessThe Office of visualizationLIBCOM-2007: new items of high technology from the company «Alee Software»All font - Using Type1 I TruetypeSplit Access databasePlotters DIRECT IMAGE Basics With VirtualdubTracing processes in UNIXGoogle on the Internet malicious softwareMicroprocessors used in CompactPCI-systemsConcentrators Ethernet NetGearReview converters for videoSafety Data Loss of information - whether it can be avoided?Document for LinuxFire systems company Satel now can be controlled by phone or EthernetRepair & servicing Windows registryIntroducing the expense of medical software - to allow for medical centers Planning in the operating system UNIXWindows Vista: When ends DiskspacePotential voltage stabilizers for the protection of the personal computer Switches NetGearLearn the truth about your child doing surfing habitsPrinting without a printing press? It is possibleTheft of computer dataTips software and programs connected branch With your husband talking about your computer?Why work for a computer is harmful to human healthHackers, as the subjects of computer crimeReview of Windows VistaTips and Tricks - Picasa willAutodesk - In Softway!UAB «Business Technology» Conducted Integrated Automation Ltd. Insurance Company «Amkopolis»New CCTV: Monitor Smartec STM-193 with a diagonal 19 " What is the standard CompactPCI?Technology Platform 1C: Enterprise 8 - Areas DevelopmentFraud Cell Phones Office automationThe world softwareThe new search softwareData protection. Luxury or means of survival?Using Protection Agency to maintain the security ProfessionalRobot Helps Salamandra Razgadyvat Riddles EvolutionMemory management FreebsdVISA-2000. Virtual seller of computer equipmentThe funds protect your computer and maximum securitySoftware can be downloaded from Vareznyh Sites or whether Buy for sale onlineRepair permissions for sluggish computer