Isnare Free Articles
Authors Contents [Add OpenSearch]
Distribute your articles to more than 6,000+ sites and 40,000+ email group publisher subscribers for as low as $2 / article...
Index  Article Directory  Computers and Technology
Embed this Article  
Matt Gundesen

Matt Gundesen x 97 articles

Liked the article? Consider buying me a beer!
$

Most Recent Videos Most Recent Videos

Many people are afraid of tinkering with their computers because of the fear that they might inadvertently introduce a computer virus into the computer system.

Computer viruses have become the technological bogeyman that scares computer users all over the world. We have all heard of how dangerous computer viruses are and how it can damage your data. Of course, aided by the bloated images Hollywood movies paint with regards to computer viruses, a big majority now have this insane (but mostly unfounded) fears about it.

It is true that computer viruses are dangerous. Anyone who has lost vital information in their computers because of a computer virus will know how big a damage it can cause. But computer viruses are not these insidiously little pieces of code that could wreak havoc on the world. If you know what to do when you get a virus in your computer then you can definitely limit, if not totally stop, the damage it can cause.

But what is a computer virus? Well, it is a software with a small imprint that would usually attach itself on to a legitimate program or software. Every time this program is executed the virus is also executed and it tries to reproduce itself by attaching to other programs or it immediately starts affecting the computer. A computer virus and email virus basically have the same modus operandi, the difference though is that an email virus would attach itself to an email message or automatically send itself using the addresses in the address book in order to infect the people who receive the email.

A computer virus is usually embedded in a larger program, often a legitimate piece of software. The virus will be run when the legitimate software is executed. The computer virus would load itself into the memory of the computer and then it will seek out any programs where it can likely attach itself. When a likely program is found then the virus would modify the file in order to add the virus’ code to the program. The virus would usually run before the actual legitimate program runs. In fact, the virus would usually perform the infection first before it commands the legitimate program to run. This process is so fast that no one would even notice that a virus was executed. With two programs now infected (the original program and the first infected program), the same process would be repeated whenever either program is launched worsening the level of infection.

After the infection phase, or even within the middle of the process of infection, the virus would usually start its attack on the system. The level of attack can range from silly actions like flashing messages on the screen to actually erasing sensitive data.

Fortunately, there are steps that you can do in order to protect your computer from viruses. Among the steps that you can take are:

* The simplest way to avoid a virus is to install a legitimate and effective antivirus program in your computer. The antivirus program is designed to look out for any kind of activity that could be seen as similar to a virus attack or infestation and it automatically stops it.

* You can opt to use a more secure operating system in your computer. For example, Unix is a secure operating system because the security features built into it prevents a virus from actually doing what it is programmed to do.

* Enable Macro Virus Protection in all of the Microsoft applications resident in your computer. Additionally, you should avoid running macros in a document unless you have a good idea of what these macros are going to do.

* Avoid using programs that you have downloaded on the internet especially when they come from dubious sources.

* Never open an email attachment that contains an executable file – these are files with the EXE, COM and VBS extensions.

Rate this article:
Matt Gundesen is a certified expert in the field of antivirus software. To download Norton Antivirus as well as many other tools in the battle against computer viruses, please visit: http://www.antivirusdownload.com
Important NoticeDISCLAIMER: All information, content, and data in this article are sole opinions and/or findings of the individual user or organization that registered and submitted this article at Isnare.com without any fee. The article is strictly for educational or entertainment purposes only and should not be used in any way, implemented or applied without consultation from a professional. We at Isnare.com do not, in anyway, contribute or include our own findings, facts and opinions in any articles presented in this site. Publishing this article does not constitute Isnare.com's support or sponsorship for this article. Isnare.com is an article publishing service. Please read our Terms of Service for more information.

Most Recent Articles

Why Marketing Your Book is Important

An Article by Author John Fleming in Marketing

4 hours ago

There are between 600,000 and 1,000,000 books published every year in the US alone. On average, they sell less than 250 copies each. With these given data on book publishing, what will you do to make you and your book stand-out. The answer is marketing. With the fast-paced book competition around the world, you need to engage yourself in the hands of the powerful marketing...

Ski and Snowboard Carriers Perfect Solution For Transporting Your Snow Gear

An Article by Tony Bulic in Travel

9 hours ago

With projections and unique shapes, one cannot deny that skis, snow boards and allied snow gear just donít pack up well. Some are undeniably long, some gear is squat and wide or bulky. Trying to fit them all into the meagre storage space of any car is going to be a challenge Ė they simply occupy too much space...

Business Success With Fox Mowing QLD Gardening Franchise

An Article by Mohammed Calcuttawala in Home Management

9 hours ago

Buying a gardening franchise is a good way to put your passion for gardening to good use. If you love working outdoors, have a green thumb and have at least some knowledge about gardening business success is not too far away. But the whole idea of a successful gardening business is about buying into a reputed and established one...

Online Assignment Helpers From New Zealand Are Available All Time

An Article by Bal Kishan in Business

13 hours ago

Students assignment help provides the most leading and trustworthy assignment help services provider company. It is seen with the students of new Zeeland that they are burdened with a lot of assignments provided by their college and university professors. To complete the number of work requires a lot of time and efficiency Therefore students often miss the time limits thus...

Hair.com.au@gmail.com 123agent156

An Article by Hair Australia in Womens Interest

13 hours ago

Have you always wondered about what's new in the hair industry. List down below are unique hair related services that might be new to you. These methods are now performed locally by hairdressers, guaranteed to satisfy your hair needs through advanced hair techniques. 1. Straightening of Hair through Chemical TreatmentsThe concept of Straightening through Chemical Treatments is that the chemical bonds of the hair are first broken down and then the process of hair straightening follows...

Fight Diabetes

An Article by Adrean Grey in Wellness, Fitness and Diet

14 hours ago

According to the World Health Organizationís diabetes country profile 2016, more than 75000 males and more than 51000 females between the age range of 30-69 have died because of diabetes. Help spread awareness about diabetes by sharing with us if you or your closed ones are suffering from diabetes and what steps have been taken to control it using #fight_diabetes...

Jeemak 0.66 OLED Smart Bracelet With Heart Rate Monitor Pedomete

An Article by Kobul Fokir in Wellness, Fitness and Diet

14 hours ago

About Jeemak: Jeemak carries fitness tracker reviews it is a wristband type tracker that will expand your extra out-looking of hand as well as it will track your daily activities. Company: It is manufactured by a well known company Jeemak and it is fulfilled by Amazon. Materila: It has ABS+TPU material that is slick and its back and front part both are polished for this comfortable to wear...

Pass Veritas VCS-276 Exam With Valid VCS-276 Veritas Certified Specialist Study Guide Pdf

An Article by Morris Porreca in Education

15 hours ago

The strength of Examgood is embodied in it. Our VCS-276 Veritas Certified Specialist exam test prep could make you not help recommend to your friends after you buy it. Because it's really a great help to you. If you want to choose passing Veritas certification VCS-276 exam to make yourself have a more stable position in today's competitive IT area and the professional ability become more powerful, you must have a strong expertise...

Clear Veritas Certified Specialist (VCS) VCS-277 Exam Test With VCS-277 Questions Material

An Article by Morris Porreca in Education

15 hours ago

30% OFF during this summer promotion, additional $10 save also can get after you subscribe to examgood Youtube account. Know more from our exam videos now. What are you in trouble. Are you worrying about Veritas VCS-277 certification test. It is really difficult to pass Veritas Certified Specialist (VCS) VCS-277 exam...

Create a Unique and Modern Look With a Drum Coffee Table

An Article by KimA Thompson in Home Management

15 hours ago

The coffee table Ė your living room is not complete without one. A coffee table is an item of furniture that is present in all homes, in fact it is an important part of any seating arrangement both in a commercial or residential setting. Whether you are waiting for that meeting with a client or visiting a friend's home, a coffee table is somewhere in sight...

Microsoft SharePoint Server 2016 70-339 Braindump

An Article by Kruis Barry in Education

17 hours ago

Passcert Microsoft SharePoint Server 2016 70-339 braindump includes almost 100% accurate answers, which are tested by certified Microsoft experts. Passcert experienced professionals try their best to provide the best Microsoft SharePoint Server 2016 70-339 braindump to ensure you can get the valuable one...

Latest C9010-262 Test Questions POWER8 Enterprise C9010-262 Dumps

An Article by Kruis Barry in Education

17 hours ago

Related Latest C9010-262 test questions POWER8 Enterprise C9010-262 dumps proved that to pass the IBM C9010-262 exam certification is very difficult. But do not be afraid, Passcert have many IT experts who have plentiful experience. After years of hard work they have created the most advanced Latest C9010-262 test questions POWER8 Enterprise C9010-262 dumps...

Passtcert Proctored Exams For Validating Knowledge 700-505 Exam Dumps

An Article by Nigel Reyez in Computers and Technology

19 hours ago

This part of the candidates need to be fully prepared to allow them to get the highest score in the 700-505 exam, make their own configuration files compatible with market demand. How far the distance between words and deeds. It depends to every person. If a person is strong-willed, it is close at hand...

Tissot T-Touch Titanium Multifunction Chronograph T33.7.598.59 T33759859 Mens Watch| Tool for the Modern Times

An Article by Watches C in Entertainment

1 day ago

Bottom line:Almost bulletproof, the Tissot T-Touch Titanium Multifunction Chronograph T33. 7. 598. 59 T33759859 Mens Watch is a premium watch that qualifies as the most ingenious of the wrist-wear concept that can put todayís over-hyped smart-watches to shame. Even the ones bearing the pictures of fruits on them...

Omega Seamaster Proffessional Diver Co-Axial Chronograph Automatic 212.30.42.50.01.001 Menís Watch| a Heritage of Adventure Portrayed Through a Pioneering Spirit

An Article by Jasson Cnz in Wellness, Fitness and Diet

1 day ago

Bottom line: Thereís a part of in us all that wants to be the James Bonds from Golden Eye. The self-winding, chronometer grade Omega Seamaster Proffessional Diver Co-Axial Chronograph Automatic 212. 30. 42. 50. 01. 001 Menís Watch, while wonít gift you the license to kill humans, but certainly you can do so to the fashion trend around and emerge as a winner...

MLA Style Citation:
Gundesen, Matt "How Computer Viruses Work And How To Protect Your Computer." How Computer Viruses Work And How To Protect Your Computer. 07 Aug. 2007 Isnare.com. 21 Jul. 2017 <https://www.isnare.com/?aid=103346&ca=Computers+and+Technology>.
APA Style Citation:
Gundesen, Matt (2007, August 07). How Computer Viruses Work And How To Protect Your Computer. Retrieved July 21, 2017, from https://www.isnare.com/?aid=103346&ca=Computers+and+Technology
Chicago Style Citation:
Gundesen, Matt "How Computer Viruses Work And How To Protect Your Computer." How Computer Viruses Work And How To Protect Your Computer Isnare.com. https://www.isnare.com/?aid=103346&ca=Computers+and+Technology
Copy and paste the code below to embed this article:
<a class="embedly-card" href="https://www.isnare.com/?aid=103346&ca=Computers+and+Technology">How Computer Viruses Work And How To Protect Your Computer</a> <script>!function(a){var b="embedly-platform",c="script";if(!a.getElementById(b)){ var d=a.createElement(c);d.id=b,d.src=("https:"===document.location.protocol?"https":"http")+"://cdn.embedly.com/widgets/platform.js"; var e=document.getElementsByTagName(c)[0];e.parentNode.insertBefore(d,e)}}(document);</script>