Главная | Соглашение | Публикация статей

Computer virus
Категория: English version

Computer virus - is a specially written small program that can "impute" themselves to other programs (ie "infect" them), as well as perform various undesirable actions on the computer. The program, which is located inside the virus, called a "victim". When this program starts, the first administration gets the virus. The virus is and "infect" other programs, as well as any adverse action (for example, the ports files or file allocation table on the disc, "choke" RAM, etc.). To mask the virus action to contaminate other programs and harm may not always met, and, say, if certain conditions. Once the virus is needed to fulfill his actions, it passes control of the program, in which it is located, and she also works as usual. In doing so, apparently the work of an infected program is the same as uncontaminated.
Many types of viruses so arranged that when you run an infected program the virus remains a resident, that is before DOS, in memory of the computer and occasionally infects programs and performs harmful actions on the computer.
Computer virus may spoil, that is to change improperly, any file on a disk in your computer. But some types of files virus can "infect". This means that the virus could "infiltrate" in these files, ie to modify them so that they contain the virus, which in some circumstances can begin its work.
It should be noted that the applications and documents, data files without the data tables Games and other similar files can not be infected with the virus, it can only spoil them.

Computer virus

Статьи по теме:

The new search software
PRINCIPLE OF CONSTRUCTION OF COMPUTER NETWORKS
Automation planning printing by Apple (Mac)
Office automation
Integration modules PADS in the enterprise software environment
VISA-2000. Virtual seller of computer equipment
Desk Microsoft Windows XP
Hold printing
Reduced-occupied Windows XP disk space
Computer technology and Genealogy
Linux: Gentoo Vs Ubuntu Functionality
The development control information tools for PADS
What is the codec and where they can be downloaded
Care home PC
Google on the Internet malicious software
Classification LAN (LCS)
What brings Sp1 For Windows Vista?
Potential problems in Windows
Technology Platform 1C: Enterprise 8 - Areas Development
1C Program Office Trade 8
The device Netping Cooler Board Received At Warehouse Company Zao «Light Kommunikeyshn»
Perfect System Digital Surveillance Uniteco Dvs
Completed work on setting up a new product Alee Archive 3 for work with DBMS
Local bus
Ms Word Vs Notepad
Architecture Risc Computational kernels
Working in Windows Vista
Tips software and programs connected branch
The processes in the operating system UNIX
Backing up the blog on Blogspot. Blogger Backup utility
Opportunities for Windows XP
Using Protection Agency to maintain the security Professional
At the market goes cheap GSM / GPS signaling
HISTORY OF BUILDERS
Electrostatic Plotters
Black Banner - Myth or Reality?
The development of databases on Msde 2000, working with Free Database Mssql
Icons in the design. Stages and stage of development of computer
The structure of the PC
Law Bezopasnosti
Graycatsoft - Server Software
Sugarcrm In Russia
Autodesk - In Softway!
The history of personal computers
Tips and Tricks - Picasa will
"Trojan horse"
It is fake?
ISA bus
Linear Magnetic Recording Dlt (Dlt-V/Sdlt/Dlt-S4)
Robot Helps Salamandra Razgadyvat Riddles Evolution
Varieties of computer crime
Pen plotters (PP, PEN PLOTTER)
NETGEAR Network
Availability of Linux: The importance of today's world
The possibility of CompactPCI have more than 8 slots