Соглашение | Публикация статей

Шторы - calon.by

Computer virus
Категория: English version

Computer virus - is a specially written small program that can "impute" themselves to other programs (ie "infect" them), as well as perform various undesirable actions on the computer. The program, which is located inside the virus, called a "victim". When this program starts, the first administration gets the virus. The virus is and "infect" other programs, as well as any adverse action (for example, the ports files or file allocation table on the disc, "choke" RAM, etc.). To mask the virus action to contaminate other programs and harm may not always met, and, say, if certain conditions. Once the virus is needed to fulfill his actions, it passes control of the program, in which it is located, and she also works as usual. In doing so, apparently the work of an infected program is the same as uncontaminated.
Many types of viruses so arranged that when you run an infected program the virus remains a resident, that is before DOS, in memory of the computer and occasionally infects programs and performs harmful actions on the computer.
Computer virus may spoil, that is to change improperly, any file on a disk in your computer. But some types of files virus can "infect". This means that the virus could "infiltrate" in these files, ie to modify them so that they contain the virus, which in some circumstances can begin its work.
It should be noted that the applications and documents, data files without the data tables Games and other similar files can not be infected with the virus, it can only spoil them.


Статьи по теме:

Terms of the need for backup devices
The program to automate Beauty Shop - Business tool or waste of money?
Mobile Trade Optimum - Office Business Representatives
The company Janet Systems Llc Presented Soa-Platform The exhibition «E-Kazakhstan»
How Stress Editor In Word 2007
How to Choose a Printer?
Pen plotters (PP, PEN PLOTTER)
The process of software development, the Program for Business
The Office of visualization
LIBCOM-2007: new items of high technology from the company «Alee Software»
All font - Using Type1 I Truetype
Split Access database
Plotters DIRECT IMAGE
Basics With Virtualdub
Tracing processes in UNIX
Google on the Internet malicious software
Microprocessors used in CompactPCI-systems
Concentrators Ethernet NetGear
Review converters for video
Safety Data
Loss of information - whether it can be avoided?
Document for Linux
Fire systems company Satel now can be controlled by phone or Ethernet
Repair & servicing Windows registry
Introducing the expense of medical software - to allow for medical centers
Planning in the operating system UNIX
Windows Vista: When ends Diskspace
Potential voltage stabilizers for the protection of the personal computer
Switches NetGear
Learn the truth about your child doing surfing habits
Printing without a printing press? It is possible
Theft of computer data
Tips software and programs connected branch
With your husband talking about your computer?
Why work for a computer is harmful to human health
Hackers, as the subjects of computer crime
Review of Windows Vista
Tips and Tricks - Picasa will
Autodesk - In Softway!
UAB «Business Technology» Conducted Integrated Automation Ltd. Insurance Company «Amkopolis»
New CCTV: Monitor Smartec STM-193 with a diagonal 19 "
What is the standard CompactPCI?
Technology Platform 1C: Enterprise 8 - Areas Development
Fraud Cell Phones
Office automation
The world software
The new search software
Data protection. Luxury or means of survival?
Using Protection Agency to maintain the security Professional
Robot Helps Salamandra Razgadyvat Riddles Evolution
Memory management Freebsd
VISA-2000. Virtual seller of computer equipment
The funds protect your computer and maximum security
Software can be downloaded from Vareznyh Sites or whether Buy for sale online
Repair permissions for sluggish computer