What Is Computer Virus And How To Eliminate It

0

Do you know what is a computer virus? The use of computers comes to all people and people who use computers must have heard the name of the virus. This name is a very familiar name in the Internet world. Along with it is a very scary name because it is very harmful to your computer and other electronic gadgets. That is, if it enters the system once, it can also degrade it and destroy your data.

Just like for our health, Virus is not right and they spread many diseases in our body, in the same way, this Virus also brings many troubles to the Computer System. Therefore, it is the benefit of all computer users to keep information about them. Many people will know something about Computer Virus, what they are and what they do. But there are many people who have heard the name of the virus but they will not know what virus can do on your computer. So today I am going to tell you about the virus and how to eliminate it in this article. Hopefully, you will find a lot to learn by reading these articles.

What is a computer virus:

Computer Virus is a small software program designed to delete or harm your computer's operation and to the computer's data. a computer virus can break the system without our knowledge in such a way that it is not ours to fix it. The computer runs from many software programs without any program computer cannot work. Software programs are designed to work properly and some program computers are also used to distort the work.

The computer was invented by the human being, the computer was designed to run the computer, and as I said, the virus is also a small program, it has also been created by humans. A computer virus is not natural, it is not created by itself, it also creates programmers knowingly, so that they can spoil other computers.

History of Computer Virus:

Robert Thomas, who was the first engineer to work in BBN Technologies, first developed computer virus in 1971. This first virus was named "Creeper" virus, and it was an experimental program that Thomas Ji himself had to do to infect ARPANET's mainframes. After infecting the Virus system, it used to display the following message on the screen, "I'm the creeper: Catch me if you can."

The original wild computer virus was first tracked in the history of the entire computer virus, which was "Elk Cloner." These Elk Cloner first infected Apple II operating systems, through floppy disks. This virus was developed by Richard Skrenta in 1982, which was a teenager at the time. Assuming computer viruses were designed according to prank, but it seems to know that if a malicious program is installed in the memory of a computer, then it can do a lot of work that will allow the user to run the system Can stop further and there will not be any control over their malicious program. .

The first person to name these Malicious Programs as "Computer Virus" was Fred Cohen, who named it in 1983. The name came to light when he titled these programs in his academic paper "Computer Viruses - Theory and Experiments" where he wrote full details about these malicious programs as for how it works, what is this And so on.

What can computer viruses do?

A computer virus can corrupt or delete data on the computer. You can complete the data stored on your hard disk completely. Computer viruses also go into other computers through e-mail attachments and make their computers vulnerable. The virus makes the speed of your computer very slow. This destroys your files and program.

What is Malware:

Malware's full name is malicious software This is also a software program that harms computers. Malicious software means bad software that is not quite right and once it comes to your system, it can completely degrade your system. The malware is also the name of a virus that slowly ends up in your system's data.

Where does Malware come from our computer? 

Malware can come from many places in our system, and what is the most commonly used today, the common source is the internet. We get some information every day on the internet. If we have downloaded any pirated software, games and movies, we have gone to any malicious site to obtain that information and malware comes online from our computer. This was how online malware came to our computer, now we know how offline malware comes in our computer.

We all use Pendrive, CDs, DVDs on our computers. When we connect to Pendrive and CDs from other places to get data, when we connect to our computer, malware comes to our computer from all these things and our computer Destroy the data.

Types of Malware:

There are three types of malware- Virus, Worms and Trojan horse. These three are different. Their work is also different. These three different ways to make your computer defective. Let us know about these three what they do.

What is Virus:

The virus can corrupt files and software on your computer. Suppose your system has a word document in which the virus has arrived, then it will delete your document's data or corrupt that document so that you will not get any information from it. Or it may happen that this virus can completely corrupt your word processing software. In such a way, if you copy or share a corrupted file, this virus also destroys its system by going to another computer.

Types of Computer Viruses:

A computer virus is a type of malware that can multiply on its own if it has entered the memory of a computer and can also change programs, applications. Here computers are infected when these malicious codes are automatically duplicated. Here you will be providing information about the types of these computer viruses to people.

Boot Sector Virus - This type of virus infects the master boot record and it is very difficult to get rid of them and often have to format the system to remove them. These are mainly spread by removable media.

Direct Action Virus - These are also called non-resident viruses, once it is installed, the computer remains hidden in memory. It remains attached to those specific types of files which they infect. These users do not infect the experience and system's performance.

Resident Virus - Direct action viruses, resident viruses are also installed in the computer. Apart from this, identifying them is equally funny.

Multipartite Virus - This type of virus can affect the system in multiple ways. Both of these boot sector and executable files are infected simultaneously.

Polymorphic Virus - Identifying these types of viruses is a very funny thing for a traditional anti-virus program because these viruses change their signature patterns frequently and whenever they replicate themselves.

Overwrite Virus - This type of virus deletes all the files that they infect. To remove these viruses from the system, the user has to delete all infected files, which causes data loss. Identifying these viruses is a very funny thing as they spread through emails.
Spacefiller Virus - These are also called "Cavity Viruses". This name has been given to it because it fills all the spaces in the code, so it does not cause the files to be damaged.

File infectors Virus:

Some file infector comes along with viruses program files, such as .com or .exe files. Some file infector viruses also infect files with .sys, .ovl, .prg, and .mnu. Just like when a particular program is loaded, the virus itself also gets loaded. These viruses come with the user's computers.

Macro viruses:

As the name suggests, these macro viruses mainly target macro language commands, such as in some applications such as Microsoft Word.
These macro viruses have been designed in such a way that they easily add their malicious code to genuine macro sequences.

Overwrite Viruses:

This virus has been designed so that it can overwrite itself and destroy any file or application data. Once this attack starts, it seems to overwrite the code itself.

Polymorphic Viruses:

This type of virus is used by more cybercriminals. This is a type of malware type which can easily change or mutate its underlying code and then and without any basic functions or features. It does not even come against this anti-malware. Whenever an anti-malware detects it, it modifies itself, which makes it very confusing.

Resident Viruses:

This virus implants itself in the memory of a computer. Basically, there is no need for the original virus program to infect any files or programs to infect. Even if you delete the original virus, a version of it is stored in memory. This happens when the computer OS loads some applications or functions. Since this is hidden in the system's RAM, it often does not detect any antivirus or antimalware.

Rootkit Viruses:

This rootkit virus is a type of malware type that secretly installs an illegal rootkit in the infected system. From this, it opens a door for attackers who give them full control over the system. With this, the attacker can easily modify or disable any program or function. These rootkit virus can easily bypass the antivirus software. Rootkit scanner is needed to capture them.

System or Boot-record Infectors Viruses:

These Boot-record Infectors infect the executable code, which is found in the specific system areas of the disk. As the name suggests, they infect more in USB thumb drives and DOS boot sector. These boot viruses do not get much to see anymore because the systems of the current do not depend much on physical storage media.

What is Worms:

Worms are similar to viruses but they multiply themselves and try to spread more and more. Which means that if your system has worms, then they start to create many copies of different files, which makes the system slow. If we copy the same files and share it with another computer then worms will also go there and slow down that computer by making too many copies of files.

What is Trojan Horse:

Trojan Horse is a very dangerous malware. This malware hides your identity on your computer. Let's assume that you are using the internet and if you have visited any site, you will see an addition like "click here to win smartphone" and if you click on it, then trojan horse malware will come in your computer And you will not even report it and your system will completely defective. They are also available on the Internet as a lot of software, you will find that they are genuine software, but in reality, it is a trojan that remains hidden within that software and once it comes to your computer, it is your computer Begin to slow down. Along with that, he will open a door, so that more types of viruses and worms come into your computer.

Signs of Virus Infection in the System:

How to know if your system is infected with Virus or not. That's why I'm going to talk about some of the warning signs below, which is very important for all computer users -

  • Having a slow system performance
  • Repeated pop-ups in screen
  • Programs running in the self
  • Files being automatically multiplying/duplicating
  • Install new files and programs automatically in the computer
  • Automatically delete files and corrupts files, folders or programs
  • Strange sound coming from the hard drive


If your system shows such warnings then you should know that your system may be infected by viruses. So soon download and scan a good bit of antivirus software.

How to Protect Your System from Viruses and Worms:

Here you are going to give some tips to people so that you will be able to avoid these viruses.

What should be done:


  1. Always install a good antivirus in your system and keep it updated from time to time.
  2. The Any email you do not know about its sender should not open it.
  3. Do not download anything from Unauthorized Websites like MP3, Movies, Software etc.
  4. Get a good scan of all downloaded things. Because there is more chance of having a virus.
  5. Removable media such as pen drive, use only after scanning the disks.
  6. If you visit any website, then you are aware of one thing that it is a popular and registered website and do not click on any link which will later cause you problems.

What should not:


  1. Never open an email attachment if you are not aware of that sender.
  2. Do not try to open any unsolicited executable files, documents, spreadsheets, without scanning.
  3. Do not install documents or executable software from untrusted websites.
  4. Click on the ads you are tempted to click here and if you win the lottery then never click on any such add-ons. Similar greeds come in e-mails too, so do not ever open that mail as it also has high chances of malware.


I'm sure you all know about what is Computer Virus. This was the computer virus and some information related to it that would help you to avoid the effect of the virus. I hope that you have got to learn something from this article and you can also get work done. How did you feel like writing a comment, so that we too can get a chance to learn something from your thoughts and improve something? In order to show your happiness and excitement towards my post, please share this post on Social Networks such as Facebook, Google+ and Twitter.

Post a Comment

0Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.
Post a Comment (0)

#buttons=(Accept !) #days=(20)

Our website uses cookies to enhance your experience. Learn More
Accept !