Computer virus - is a specially written small program that can "impute" themselves to other programs (ie "infect" them), as well as perform various undesirable actions on the computer. The program, which is located inside the virus, called a "victim". When this program starts, the first administration gets the virus. The virus is and "infect" other programs, as well as any adverse action (for example, the ports files or file allocation table on the disc, "choke" RAM, etc.). To mask the virus action to contaminate other programs and harm may not always met, and, say, if certain conditions. Once the virus is needed to fulfill his actions, it passes control of the program, in which it is located, and she also works as usual. In doing so, apparently the work of an infected program is the same as uncontaminated.
Many types of viruses so arranged that when you run an infected program the virus remains a resident, that is before DOS, in memory of the computer and occasionally infects programs and performs harmful actions on the computer.
Computer virus may spoil, that is to change improperly, any file on a disk in your computer. But some types of files virus can "infect". This means that the virus could "infiltrate" in these files, ie to modify them so that they contain the virus, which in some circumstances can begin its work.
It should be noted that the applications and documents, data files without the data tables Games and other similar files can not be infected with the virus, it can only spoil them.
Статьи по теме:
Completed work on setting up a new product Alee Archive 3 for work with DBMSMaintenance of computers in the Framework for IT outsourcingBest Antivirus Document for LinuxYour teenager safely use the Internet? Software for businesses - to add efficiency to business Monitoring computer facts Installing Windows Xp on a network without the use of RisSplit Access databaseWith your husband talking about your computer?Why work for a computer is harmful to human healthMistakes Windows registry repairPerfect System Digital Surveillance Uniteco Dvs LIBCOM-2007: new items of high technology from the company «Alee Software»Editing a sound fileLinux set in motion devices: Now in the market«Rolling» to previous versions of Microsoft WindowsMemory management FreebsdComputer data as an object of criminal assaultThe history of personal computers Erg-exercises to improve postureMETHODS OF PROTECTION FROM COMPUTER VIRUSESThe organization and classification of printers Free Internet Or How to Become a HackerHISTORY OF BUILDERSThe physical medium for LANsWhat is the codec and where they can be downloadedTeam-quality design of computer Industrial and engineering processes Technical approaches to increase the security of the computerHistory of Opera browserPotential voltage stabilizers for the protection of the personal computer Terms of the need for backup devices The total points in the organization LAN What your child is doing online?Download MozillaMs Word Vs NotepadThe program 1S Accounting Enterprise 8Classification of computers Loading the alternative modePreventive methods that reduce fatigue while working for a computerMore WinRAR 3.70 RU FinalSoftware can be downloaded from Vareznyh Sites or whether Buy for sale onlinePC Peripherals Protection of information. Passwords At Rar archivesIntegration Ibm Rational Clearquest and Microsoft Project - The key to successful planningVarieties of computer crimeBlack Banner - or the threat of new technologies? Protect photos, images and video All font - Using Type1 I TruetypeMobile Trade Optimum - Office Business RepresentativesErg-exercises to prevent PVPNInstalling Systems Videonablyudeniya In OfficeThe advent of IBM PC Switches NetGear