Соглашение | Публикация статей

Шторы - calon.by

Computer virus
Категория: English version

Computer virus - is a specially written small program that can "impute" themselves to other programs (ie "infect" them), as well as perform various undesirable actions on the computer. The program, which is located inside the virus, called a "victim". When this program starts, the first administration gets the virus. The virus is and "infect" other programs, as well as any adverse action (for example, the ports files or file allocation table on the disc, "choke" RAM, etc.). To mask the virus action to contaminate other programs and harm may not always met, and, say, if certain conditions. Once the virus is needed to fulfill his actions, it passes control of the program, in which it is located, and she also works as usual. In doing so, apparently the work of an infected program is the same as uncontaminated.
Many types of viruses so arranged that when you run an infected program the virus remains a resident, that is before DOS, in memory of the computer and occasionally infects programs and performs harmful actions on the computer.
Computer virus may spoil, that is to change improperly, any file on a disk in your computer. But some types of files virus can "infect". This means that the virus could "infiltrate" in these files, ie to modify them so that they contain the virus, which in some circumstances can begin its work.
It should be noted that the applications and documents, data files without the data tables Games and other similar files can not be infected with the virus, it can only spoil them.


Статьи по теме:

Protect photos, images and video
HISTORY OF BUILDERS
3Ds Max 2008 (Rip)
Legal and technical documents
The signals under UNIX
Version Mobile Forex 2.15: A new approach to reliability and convenience
Why work for a computer is harmful to human health
Development of Iron Industry Or Who Wanted Now Multi Processors
Opportunities for Windows XP
Switches NetGear
Printing without a printing press? It is possible
The company Janet Systems Llc Presented Soa-Platform The exhibition «E-Kazakhstan»
Productivity billing system
The possibility of CompactPCI have more than 8 slots
Classification of computers
Free Internet Or How to Become a Hacker
How to make the right choice? 1C: Enterprise 7.7. or 8.0
Plotters BASED TERMOPEREDACHI
The attack at Infinity Gb V2 2
Linear Magnetic Recording Dlt (Dlt-V/Sdlt/Dlt-S4)
Google on the Internet malicious software
Aptitude CompactPCI-products of rapid obsolescence
Network
Automation planning printing by Apple (Mac)
Loading the alternative mode
The world software
The story of software Escrow
Three Training from well-known vendors: Especially for «antiviral Decisions»
Implementation Crm Systems Quick Sales 2 The Company «Epos»
Zao «Light Kommunikeyshn» confirm its status «Microsot Gold Certified Partner» In 2008
At the market goes cheap GSM / GPS signaling
Learn the truth about your child doing surfing habits
Erg-exercises to prevent PVPN
Availability of Linux: The importance of today's world
Law Bezopasnosti
The history of personal computers
The program 1S Salary and Personnel Management 8
Loss of information - whether it can be avoided?
The counterfeiting of computer information
Systemic and local bus
Animation on your computer desk
Reduced-occupied Windows XP disk space
Classification LAN (LCS)
NETGEAR Network
Theft of computer data
Playing audio and video files
Microsoft Great Plains to customers in Russia: how to find a consultant and the most frequent questions
Threats to Security Modern Networks
The total points in the organization LAN
Introducing the expense of medical software - to allow for medical centers
The development of databases on Msde 2000, working with Free Database Mssql
Introduction to Windows
Mobile Commerce, Mobile Commerce System
The structure design and generation of computers
Pen plotters (PP, PEN PLOTTER)