|

- .
- calon.by

Computer virus

Computer virus - is a specially written small program that can "impute" themselves to other programs (ie "infect" them), as well as perform various undesirable actions on the computer. The program, which is located inside the virus, called a "victim". When this program starts, the first administration gets the virus. The virus is and "infect" other programs, as well as any adverse action (for example, the ports files or file allocation table on the disc, "choke" RAM, etc.). To mask the virus action to contaminate other programs and harm may not always met, and, say, if certain conditions. Once the virus is needed to fulfill his actions, it passes control of the program, in which it is located, and she also works as usual. In doing so, apparently the work of an infected program is the same as uncontaminated.
Many types of viruses so arranged that when you run an infected program the virus remains a resident, that is before DOS, in memory of the computer and occasionally infects programs and performs harmful actions on the computer.
Computer virus may spoil, that is to change improperly, any file on a disk in your computer. But some types of files virus can "infect". This means that the virus could "infiltrate" in these files, ie to modify them so that they contain the virus, which in some circumstances can begin its work.
It should be noted that the applications and documents, data files without the data tables Games and other similar files can not be infected with the virus, it can only spoil them.


:

Technical approaches to increase the security of the computer
Computer technology and Genealogy
Electrostatic Plotters
What brings Sp1 For Windows Vista?
Fresh version of Mobile Forex 2.16: Quick Mobile Trading
The destruction of computer data
Integration modules PADS in the enterprise software environment
Potential problems in Windows
Development and dissemination of computer viruses
More Software to create an electronic catalog Szags
Why is cleaning Windows registry needed
Repair & servicing Windows registry
3Ds Max 2008 (Rip)
How to Choose a Printer?
The company Janet Systems Provedet Roundtable The future of Soa-Projects
Tracing processes in UNIX
The total points in the organization LAN
COMPUTER CRIME PREVENTION
Microsoft Great Plains to customers in Russia: how to find a consultant and the most frequent questions
The reverse side of the coin Spyware
The company Janet Systems Llc Presented Soa-Platform Ijanet Framework Ultra The exhibition Kitel 2008
ABOUT personal characteristics COMPUTER CRIMINALS
Ergonomic organization of the workplace
Architecture Risc Computational kernels
The device Netping Cooler Board Received At Warehouse Company Zao Light Kommunikeyshn
Theft of computer data
Preventive methods that reduce fatigue while working for a computer
Why work for a computer is harmful to human health
Printing without a printing press? It is possible
Mobile Trade Optimum - Office Business Representatives
Rolling to previous versions of Microsoft Windows
Developing databases, Inside View
With your husband talking about your computer?
Development of Iron Industry Or Who Wanted Now Multi Processors
Checking Software Licensing
Editing a sound file
The process of software development, the Program for Business
Monitoring computer facts
Automatic Generation of meaningful text of a possible?
What is the standard CompactPCI?
Terms of the need for backup devices
More Software invites you to Docflow 2008!
Team-quality design of computer
Time to create protection
Free Internet Or How to Become a Hacker
Zao Light Kommunikeyshn confirm its status Microsot Gold Certified Partner In 2008
Crm system, introduction Crm Systems
Playing audio and video files
Availability of Linux: The importance of today's world
Increases user rights
Best Antivirus
Advantages of Mobile Commerce
Spyware battle; Use of firewall protection
Windows Vista: When ends Diskspace
MAINTENANCE AND spread of computer viruses