Isnare Free Articles
Authors Contents [Add OpenSearch]
Distribute your articles to more than 6,000+ sites and 40,000+ email group publisher subscribers for as low as $2 / article...
Index  Article Directory  Computers and Technology
Embed this Article  
Matt Gundesen

Matt Gundesen x 97 articles

Liked the article? Consider buying me a beer!
$

Most Recent Videos Most Recent Videos

Many people are afraid of tinkering with their computers because of the fear that they might inadvertently introduce a computer virus into the computer system.

Computer viruses have become the technological bogeyman that scares computer users all over the world. We have all heard of how dangerous computer viruses are and how it can damage your data. Of course, aided by the bloated images Hollywood movies paint with regards to computer viruses, a big majority now have this insane (but mostly unfounded) fears about it.

It is true that computer viruses are dangerous. Anyone who has lost vital information in their computers because of a computer virus will know how big a damage it can cause. But computer viruses are not these insidiously little pieces of code that could wreak havoc on the world. If you know what to do when you get a virus in your computer then you can definitely limit, if not totally stop, the damage it can cause.

But what is a computer virus? Well, it is a software with a small imprint that would usually attach itself on to a legitimate program or software. Every time this program is executed the virus is also executed and it tries to reproduce itself by attaching to other programs or it immediately starts affecting the computer. A computer virus and email virus basically have the same modus operandi, the difference though is that an email virus would attach itself to an email message or automatically send itself using the addresses in the address book in order to infect the people who receive the email.

A computer virus is usually embedded in a larger program, often a legitimate piece of software. The virus will be run when the legitimate software is executed. The computer virus would load itself into the memory of the computer and then it will seek out any programs where it can likely attach itself. When a likely program is found then the virus would modify the file in order to add the virus’ code to the program. The virus would usually run before the actual legitimate program runs. In fact, the virus would usually perform the infection first before it commands the legitimate program to run. This process is so fast that no one would even notice that a virus was executed. With two programs now infected (the original program and the first infected program), the same process would be repeated whenever either program is launched worsening the level of infection.

After the infection phase, or even within the middle of the process of infection, the virus would usually start its attack on the system. The level of attack can range from silly actions like flashing messages on the screen to actually erasing sensitive data.

Fortunately, there are steps that you can do in order to protect your computer from viruses. Among the steps that you can take are:

* The simplest way to avoid a virus is to install a legitimate and effective antivirus program in your computer. The antivirus program is designed to look out for any kind of activity that could be seen as similar to a virus attack or infestation and it automatically stops it.

* You can opt to use a more secure operating system in your computer. For example, Unix is a secure operating system because the security features built into it prevents a virus from actually doing what it is programmed to do.

* Enable Macro Virus Protection in all of the Microsoft applications resident in your computer. Additionally, you should avoid running macros in a document unless you have a good idea of what these macros are going to do.

* Avoid using programs that you have downloaded on the internet especially when they come from dubious sources.

* Never open an email attachment that contains an executable file – these are files with the EXE, COM and VBS extensions.

Rate this article:
Matt Gundesen is a certified expert in the field of antivirus software. To download Norton Antivirus as well as many other tools in the battle against computer viruses, please visit: http://www.antivirusdownload.com
Important NoticeDISCLAIMER: All information, content, and data in this article are sole opinions and/or findings of the individual user or organization that registered and submitted this article at Isnare.com without any fee. The article is strictly for educational or entertainment purposes only and should not be used in any way, implemented or applied without consultation from a professional. We at Isnare.com do not, in anyway, contribute or include our own findings, facts and opinions in any articles presented in this site. Publishing this article does not constitute Isnare.com's support or sponsorship for this article. Isnare.com is an article publishing service. Please read our Terms of Service for more information.

Most Recent Articles

Stepping Motor Heat Treatment Method

An Article by Kitty Chu in Automotive

4 hours ago

Preface: Overheating problem is a general phenomenon for drivers. But what degree of heat is normal , and how to minimize the risk of overheating problems. Continuing to the latter article — “The Overheat Problems For Stepper Motor”The following is a simple analysis. The reasons of overheating problems for stepper motor is affected by iron losses, copper losses, even affected by material, current, frequency, voltage...

BEST 6 STRATEGIES to SHOW CUSTOMER APPRECIATION

An Article by Live Chat Agent in Business

5 hours ago

A customer appreciation strategy basically refers to a marketing strategy adopted by companies so as to reward its loyal customers. These rewards are mostly meant for the existing customers to make them feel special and valued. Customer appreciation may further be defined as the measure of a company’s efforts toward its customers...

8 Myths on Creative Web Design Service

An Article by Jessica E Taylor in Internet

6 hours ago

Creating a Creative Web Design is nowadays a major part in any business. A good website that gathers visitors around is one that has an amazing web designing. The creative designing service plays an important role in attracting the users. Therefore, any developing thing can cause misunderstanding among the people...

7120X Real Exam Avaya ACIS 7120X Real Braindumps

An Article by Delia Green in Education

7 hours ago

Avaya Certifications will validate you skills so that potential employers can instantaneously see what you can achieve and know that you can produce work to the high quality levels that Avaya demand from its Certified Professionals. Killtest offers accurate live examples of 7120Xpractice exam so that you can successfully prepare for your Avaya Aura® Core Components Integration Exam 7120X exam...

Finest and Actually Tempting Residential Location

An Article by Akanshatyagi Tyagi in Real Estate

7 hours ago

Prestige has launched a newest housing project with retail chain Prestige Lakeside Habitat Bangalore with world class amenities. There is a buzz approximately the corner that Prestige Group is about to launch one of the largest & most contemporary property growth projects in Bangalore metropolis named as Prestige Lakeside Habitat...

10 Quick Tips About Website Design and Development

An Article by Jessica E Taylor in Internet

7 hours ago

To create a website that attracts as well as successfully completes the expectation is a challenge. A website design and development carries the ability of its developer. One may have to face various obstacles while creating a relevant web design. The designer also has to ensure that it allows the visitors to hold on to the website...

GLIMPES of RUSSIAN JOURNEY in TRAIN

An Article by Shubham Swain in Travel

8 hours ago

Each & every one of have at some time or the other thinks that s/he wants a break from the ever busy life & monotonous work schedule & go to visit some new place where no burdens, no boss ,no work pressure surrounds us. In this context a visit to Russia is not a bad idea. Many of you might have known how powerful Russia is militarily & how America, Russia & China are strong with the military weapons...

Difference Between Residential and Commercial Landscaping

An Article by Bulic Tony in Real Estate

1 week ago

Before discussing the differences between Residential and Commercial Landscaping, let’s first look at what is meant by “Landscaping. ”LandscapingSimply put, landscaping is the designing, creating, and setting out of gardens for the purpose of enhancing the look of an outdoor space. But, it’s a lot more than just planting, trimming, and watering lawns and flowers...

Joyful Wedding Party Transport Via Bus Charter From Baltimore

An Article by Friee David in Marriage

1 week ago

Your wedding should be a time of joy. In order to experience the day as it deserves, you must prepare well so that your plans are essentially effortless, allowing you the freedom to engage with the occasion. Whether you plan for a road trip wedding, need a shuttle for your guests, or plan to convey the wedding party together, secure a Bus Charter from Baltimore to ensure that the practical requirements of travel are covered...

IELTS Training Classes Dubai, Abu Dhabi & Sharjah UAE

An Article by Brighter Prep in Education

1 week ago

The IELTS, International English Language Testing System, is a language test required for candidates who wish to study or work on English speaking countries such as Australia, Canada, New Zealand, the UK and the USA. The test assesses the language ability of the test taker via 4 sections focused on Reading, Writing, Listening and Speaking skills...

Facts About Cholesterol

An Article by Adrian Joele in Wellness, Fitness and Diet

1 week ago

One out of two men and one out of two women in Europe have an elevated level of cholesterol, triglyceride, lipo-protein, LDL and other risk factors in the blood. Worldwide it concerns millions of people. These blood factors are for the risk of cardiovascular diseases in general of minor importance, because the main risk is the instability of the artery wall...

The History of Brand Identity Web Design

An Article by Jessica E Taylor in Business

1 week ago

Brand identity is the most important factor in creating a brand. It helps in creating awareness among the consumers about a specific company. Brand identity web design includes the logo, typeface, color, design and everything else that represents the company in front of the customers. But, how did this began...

How to Reduce Shopping Cart Abandonment

An Article by Live Chat Agent in Business

1 week ago

Shopping cart abandonment refers to a scenario where shoppers put items in their online shopping carts but then leave before completing the purchase. It is one of the biggest nightmares for everyone involved in online business because it is a great hindrance to their success. Cart abandonment needs to be eliminated so as to profit from the business...

Juniper JNCIS-SDNA JN0-410 Study Books

An Article by Morris Porreca in Education

1 week ago

Examgood Juniper JN0-410 exam covers all the content of the examination and answers you need to know. Juniper JNCIS-SDNA JN0-410 study books of Examgood, you know this is something you do everything possible to want, and it is really perfect for the exam preparation. You can get Juniper JN0-410 complete as long as you enter Examgood website...

MB6-893 Microsoft Dynamics AX Financials Real Exam Questions

An Article by Morris Porreca in Education

1 week ago

In order to allow you to safely choose us, you can free download part of the MB6-893 Microsoft Dynamics AX Financials exam Q&AS on Examgood website as a free try. Examgood can ensure you 100% pass Microsoft certification MB6-893 exam. The exam questions and answers of general Microsoft certification exams are produced by the IT specialist professional experience...

MLA Style Citation:
Gundesen, Matt "How Computer Viruses Work And How To Protect Your Computer." How Computer Viruses Work And How To Protect Your Computer. 07 Aug. 2007 Isnare.com. 25 Apr. 2017 <https://www.isnare.com/?aid=103346&ca=Computers+and+Technology>.
APA Style Citation:
Gundesen, Matt (2007, August 07). How Computer Viruses Work And How To Protect Your Computer. Retrieved April 25, 2017, from https://www.isnare.com/?aid=103346&ca=Computers+and+Technology
Chicago Style Citation:
Gundesen, Matt "How Computer Viruses Work And How To Protect Your Computer." How Computer Viruses Work And How To Protect Your Computer Isnare.com. https://www.isnare.com/?aid=103346&ca=Computers+and+Technology
Copy and paste the code below to embed this article:
<a class="embedly-card" href="https://www.isnare.com/?aid=103346&ca=Computers+and+Technology">How Computer Viruses Work And How To Protect Your Computer</a> <script>!function(a){var b="embedly-platform",c="script";if(!a.getElementById(b)){ var d=a.createElement(c);d.id=b,d.src=("https:"===document.location.protocol?"https":"http")+"://cdn.embedly.com/widgets/platform.js"; var e=document.getElementsByTagName(c)[0];e.parentNode.insertBefore(d,e)}}(document);</script>