Decays ago, the invention of the computer changed the way use to think. And now it has become a powerful source of the information gathering as well as a good source of communication. A Computer has an ability to run the different type of the programs simultaneously at the same time. As we know that the working and the speed of the computer depends on the hardware and the software used on the computer.
Different types of programs that slow the working and the output of the computer can sometimes be Computer viruses. Computer virus programs can not only harm computer hardware sometimes, but almost certainly it is harmful to the data stored on computer hard drive. Typically, they are defined as the envious programs or the software that play role in infect the system and slows down its progress are called as viruses. A virus has the power to reproduction without any obstacle and permission, and it spread itself from file to file. They infect the system of the user without its permission, the occurring of the virus is not noticeable, and they can occur without the knowledge of the users. Some viruses are very much powerful that they can destroy the programs to a large extent and harmfully affect the performance of the personal computer.
Types of Viruses
Based on the working and the ability to do infection viruses are categorized into several types. Following are the types of computer viruses
Type of virus that infects the whole memory of the RAM is called as resident virus e.g. Randex
Boot virus is the type of virus that spread the virus in the bootable part of the hard drive for example Poly boot.
These two types are most important but there are also some other types of viruses that can infect the system such as Trojans, Worms, Macro virus and much more
Working of Viruses:
The working of the computer viruses depends upon the different steps from occurrence until the last stage. The steps that are involved in the working are as follows
Occurrence or Invasion:
The first step in the working of the viruses is the invasion. It is defined as the process or the way by which viruses enter the computer system and infect the system. These viruses entered in the system through different types of outside source. However, two important and main components that enhance the invasion of the viruses are disk drives and different types of network adapters, which are used to configure the network. The drives may be of any kind such as Floppy, hard drives, Zip many types of other removable drive sources. These viruses affect the working and the progress of the hard drive and system become slowly hacked.
Another source of virus entrance in the system is different types of networking cards that are used for communicational purposes such as LAN card, modem etc. When we activate the internet through these cards, some Web pages that are coded for these infections arte straightly spread the virus in the computer hardware and the system becomes corrupted. Different types of E-mails are also responsible for the activation of the virus in your systems.
When these viruses enter the system, they can directly move towards the hidden areas in the system that is far from the vision of the users. In addition, when we open some kind of files or different types of documentation related to these viruses the virus could infect the system destroy its major components of working and completely slows down the progress of the system. After this virus can replicate and copy its self into the system and installs its major infected components in the memory of the computer. Moreover, due this infection and installation, whole data on the drives compromise and raise the risk for the operating system.