Главная | Соглашение | Публикация статей

Computer virus
Категория: English version

Computer virus - is a specially written small program that can "impute" themselves to other programs (ie "infect" them), as well as perform various undesirable actions on the computer. The program, which is located inside the virus, called a "victim". When this program starts, the first administration gets the virus. The virus is and "infect" other programs, as well as any adverse action (for example, the ports files or file allocation table on the disc, "choke" RAM, etc.). To mask the virus action to contaminate other programs and harm may not always met, and, say, if certain conditions. Once the virus is needed to fulfill his actions, it passes control of the program, in which it is located, and she also works as usual. In doing so, apparently the work of an infected program is the same as uncontaminated.
Many types of viruses so arranged that when you run an infected program the virus remains a resident, that is before DOS, in memory of the computer and occasionally infects programs and performs harmful actions on the computer.
Computer virus may spoil, that is to change improperly, any file on a disk in your computer. But some types of files virus can "infect". This means that the virus could "infiltrate" in these files, ie to modify them so that they contain the virus, which in some circumstances can begin its work.
It should be noted that the applications and documents, data files without the data tables Games and other similar files can not be infected with the virus, it can only spoil them.

Computer virus

Статьи по теме:

How to make the right choice? 1C: Enterprise 7.7. or 8.0
Proxy Server - This effective way of protecting information as well as a barrier to attack, hackers
The development control information tools for PADS
WAYS OF COMPUTER CRIMES
Preventive methods that reduce fatigue while working for a computer
«Rolling» to previous versions of Microsoft Windows
Developing databases, Inside View
Tips and Tricks - Picasa will
Implementation Crm Systems Sales Expert 2 The Company «Sibaeroinzh»
Google on the Internet malicious software
The organization and classification of printers
Classification LAN (LCS)
The story of software Escrow
Installing Systems Videonablyudeniya In Office
Why work for a computer is harmful to human health
Computer technology and Genealogy
Computer
Tray Microsoft Windows XP
Classification of computers
Care home PC
The attack at Infinity Gb V2 2
Active Desktop Windows XP
Mistakes Windows registry repair
Introduction to Windows
Split Access database
The program 1S Accounting Enterprise 8
Enabling Windows XP
3Ds Max 2008 (Rip)
Development of Iron Industry Or Who Wanted Now Multi Processors
LASER (LED) Plotters
ISA bus
At the market goes cheap GSM / GPS signaling
Perfect System Digital Surveillance Uniteco Dvs
Development of Software Development Projects
Checking Software Licensing
Restoring files myth or reality?
The device Netping Cooler Board Received At Warehouse Company Zao «Light Kommunikeyshn»
Hold printing
More Software to create an electronic catalog Szags
Systemic and local bus
Your teenager safely use the Internet?
Desk Microsoft Windows XP
Areas which use computer systems based on CompactPCI
Optimal cache lifetime for Joomla CMS
The funds protect your computer and maximum security
All font - Using Type1 I Truetype
Pen plotters (PP, PEN PLOTTER)
Type Danyh in C + + I Unlike Java
Development and dissemination of computer viruses
VISA-2000. Virtual seller of computer equipment
Computer data as an object of criminal assault
Windows Media Player
New Decision on the market Soa
Theft of computer data
Crm, software