Computer Virus Expository

Category: Computer
Last Updated: 27 Jul 2020
Pages: 3 Views: 89

Computer Virus “A true virus cannot spread to another computer without human assistance. ” Computer virus has now become widespread. It’s almost everywhere in every computer. It is one of the major problems of the computer users. Viruses are like the disease of the computer. Letting the virus in it can cause harm or even destroy all files stored in the computer. Virus infection costs millions even billions of money if virus penetrates into major servers like government database system, bank and airport systems.

Computer virus can destroy, control or even steal information without the knowledge of the user. There are three kinds of computer virus. First kind is the Trojan horse; it pretends to be a legitimate program. It attaches itself to a program then executes itself. Named after the Greek army’s tactic of hiding their soldiers in a giant wooden horse. This virus does not multiply but rather make the computer’s protection weaker and more susceptible to other threats. Second kind is the worm, is has a self replicating ability that spreads itself through computer network.

It search for loopholes in the network copies itself and reaches another computer in the network. This kind of virus invades the kernel of the computer that makes it halt and become slow. It replicates in drastic number that make duplicates of files that cause confusion in the computer user. The third kind is the malware; it is a malicious program that steals information from the computer and the user. Steal personal information like bank accounts, credit card numbers and other information that can be used against you. This information is being used by hackers to generate money and make fraud.

Order custom essay Computer Virus Expository with free plagiarism report

feat icon 450+ experts on 30 subjects feat icon Starting from 3 hours delivery
Get Essay Help

The program also downloads other files and viruses into the computer. There are also other kind, unusual kind of viruses that is less encountered by common computer users. These viruses may be found in corporations and companies for conspiracy. This is the rabbit/wabbit and the logic bombs. The rabbit also known as wabbit is a kind of virus that copies itself and sends twice through the ASP output stream. It copies itself in drastic number that makes the system clog, become slower and make the files more difficult to remove/delete.

Cleaning of the infected system was became a long and complicated process. The other kind is the logic bomb, virus that acts like a time bomb. It is a piece of code intentionally inserted into a program or software system that will set-off malicious functions when certain conditions are met. The code is hidden in program and software written by hackers. Certain logic bombs sometimes execute at certain payloads or at pre-defined time like Friday of the 13th and April fool’s day (April 1st).

Trojans that activates on certain dates are also called time-bombs. There are tips and trick that can be done to prevent the infection of the computer by viruses. First is to set-up your computer. Consider running a firewall on the computer. Also install an antivirus program. Regularly update the operating system and antivirus software, and delete all unnecessary files and programs. Second is on downloading files and email attachments. Be careful of opening files from untrusted sources. Always scan the file before opening.

Also be aware that email attachments are also a source of computer viruses and last, be knowledgeable about viruses and the behavior of the computer. Computer virus is one of the major problems of the computer users. It can destroy, control or even steal information. Virus infection can be prevented by being aware of the viruses, about its behavior and the things that it can do. Always remember that a virus cannot spread by itself without human assistance. So be aware and be knowledgeable in all things that you don in computer. Think before you click.

Cite this Page

Computer Virus Expository. (2016, Dec 22). Retrieved from https://phdessay.com/computer-virus-expository/

Don't let plagiarism ruin your grade

Run a free check or have your essay done for you

plagiarism ruin image

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Save time and let our verified experts help you.

Hire writer