Соглашение | Публикация статей

Красивые рольшторы - roll-service.by

Computer virus
Категория: English version

Computer virus - is a specially written small program that can "impute" themselves to other programs (ie "infect" them), as well as perform various undesirable actions on the computer. The program, which is located inside the virus, called a "victim". When this program starts, the first administration gets the virus. The virus is and "infect" other programs, as well as any adverse action (for example, the ports files or file allocation table on the disc, "choke" RAM, etc.). To mask the virus action to contaminate other programs and harm may not always met, and, say, if certain conditions. Once the virus is needed to fulfill his actions, it passes control of the program, in which it is located, and she also works as usual. In doing so, apparently the work of an infected program is the same as uncontaminated.
Many types of viruses so arranged that when you run an infected program the virus remains a resident, that is before DOS, in memory of the computer and occasionally infects programs and performs harmful actions on the computer.
Computer virus may spoil, that is to change improperly, any file on a disk in your computer. But some types of files virus can "infect". This means that the virus could "infiltrate" in these files, ie to modify them so that they contain the virus, which in some circumstances can begin its work.
It should be noted that the applications and documents, data files without the data tables Games and other similar files can not be infected with the virus, it can only spoil them.


Статьи по теме:

Completed work on setting up a new product Alee Archive 3 for work with DBMS
Maintenance of computers in the Framework for IT outsourcing
Best Antivirus
Document for Linux
Your teenager safely use the Internet?
Software for businesses - to add efficiency to business
Monitoring computer facts
Installing Windows Xp on a network without the use of Ris
Split Access database
With your husband talking about your computer?
Why work for a computer is harmful to human health
Mistakes Windows registry repair
Perfect System Digital Surveillance Uniteco Dvs
LIBCOM-2007: new items of high technology from the company «Alee Software»
Editing a sound file
Linux set in motion devices: Now in the market
«Rolling» to previous versions of Microsoft Windows
Memory management Freebsd
Computer data as an object of criminal assault
The history of personal computers
Erg-exercises to improve posture
METHODS OF PROTECTION FROM COMPUTER VIRUSES
The organization and classification of printers
Free Internet Or How to Become a Hacker
HISTORY OF BUILDERS
The physical medium for LANs
What is the codec and where they can be downloaded
Team-quality design of computer
Industrial and engineering processes
Technical approaches to increase the security of the computer
History of Opera browser
Potential voltage stabilizers for the protection of the personal computer
Terms of the need for backup devices
The total points in the organization LAN
What your child is doing online?
Download Mozilla
Ms Word Vs Notepad
The program 1S Accounting Enterprise 8
Classification of computers
Loading the alternative mode
Preventive methods that reduce fatigue while working for a computer
More WinRAR 3.70 RU Final
Software can be downloaded from Vareznyh Sites or whether Buy for sale online
PC Peripherals
Protection of information. Passwords At Rar archives
Integration Ibm Rational Clearquest and Microsoft Project - The key to successful planning
Varieties of computer crime
Black Banner - or the threat of new technologies?
Protect photos, images and video
All font - Using Type1 I Truetype
Mobile Trade Optimum - Office Business Representatives
Erg-exercises to prevent PVPN
Installing Systems Videonablyudeniya In Office
The advent of IBM PC
Switches NetGear