Вы находитесь на странице: 1из 3


A computer virus is a program that spreads malicious code by copying itself

and infecting host computers. Although some viruses are latent, others can
corrupt data or impede system performance. Many viruses attach
themselves to legitimate executable fles (.exe fles) on a host computer that
allow the virus to be loaded when the user opens the fle.
A virus generally will be activated when it is loaded into a computers
memory, and then it may continue to spread its viral code into a number of
other programs and fles stored on the host computer. he computers
programs may still continue to wor! normally, but also spread the virus code
to other machines on the same networ!, or machines that use the same
storage devices.
"omputer viruses are never naturally occurring# they are always man$made.
%nce created and released, however, their spread is not directly under
human control.
Macro viruses: A macro is a piece of code that can be embedded in a data
fle. A macro virus is thus a virus that exists as a macro attached to a data
fle. &n most respects, macro viruses are li!e all other viruses. he main
di'erence is that they are attached to data fles (i.e., documents) rather than
executable programs.
(ocument$based viruses are, and will li!ely continue to be, more prevalent
than any other type of virus.
)hat are the symptoms of a computer virus*
+our computer may be infected if you recogni,e any of
these malware symptoms-
.low computer performance
/rratic computer behavior
0nexplained data loss
1re2uent computer crashes
A computer worm is a standalone malware computer program that
replicates itself in order to spread to other computers. %ften, it uses
a computer networ! to spread itself, relying on security failures on the target
computer to access it. 0nli!e a computer virus, it does not need to attach
itself to an existing program. )orms almost always cause at least some harm
to the networ!, whereas viruses almost always corrupt or modify fles on a
targeted computer.
A ro3an horse, often shortened to ro3an, is a type of malware designed to
provide unauthori,ed, remote access to a users computer. ro3an horses do
not have the ability to replicate themselves li!e viruses# however, they can
lead to viruses being installed on a machine since they allow the computer to
be controlled by the ro3an creator. ro3an horses compromise a users
computer thereby stealing various data such as credit card information, login
passwords for email accounts, installing more malware, installing !ey logger
and various other malicious activities. ro3ans are also capable of
launching Denial of Service (DoS) attac!s.
&n computing, a denial-of-service attack (DoS attack) or distributed
denial-of-service attack (DDoS attack) is an attempt to ma!e a machine
or networ! resource unavailable to its intended users.
4urpose and uses
A ro3an may give a hac!er remote access to a targeted computer system.
%perations that could be performed by a hac!er on a targeted computer
system may include-
0se of the machine as part of a botnet (e.g. to perform
automated spamming or to distribute (enial$of$service attac!s)
"rashing the computer
/lectronic money theft
(ata theft (e.g. retrieving passwords or credit card information)
&nstallation of software, including malware (virus)
(ownloading or uploading of fles on the user5s computer
Modifcation or deletion of fles
6eystro!e logging
)atching the user5s screen
7iewing the user5s webcam
"ontrolling the computer system remotely
8eformatting dis!
/ncrypting fles
(ata corruption
0sing infected computer as proxy for illegal activities and attac!s on
other computers.