A quick guide to computer viruses - what they are, how they work and the potential consequences of a virus infecting your computer
Each time the host file is run, the virus code in it will also run and insert more unwanted code, either into the same file or into other files on the same machine. If this happens enough times, the unwanted code can seriously disrupt the infected program's normal use, or corrupt it entirely.
Some of the most notorious computer viruses in history include:
Viruses can be distributed and installed on a computer in many ways, though the most common methods usually involve either:
Or some combination of the two.
Once the virus arrives on a machine and is run, it begins its attack on the files in the system.
Viruses can infect many different types of files or programs - critical programs used by the operating system; document files such as Word or Excel; even specialized firmware programs tied to the computer's hardware, like the Master Boot Record (MBR).
Each time a host file is run, the virus code in it will replicate - that is, it will create and insert more unwanted code, either into the same file or into another file on the same machine (essentially infecting the other file as well).
As this process repeats, the increasing additions of unwanted code can disrupt the host file's normal operations. If it happens often enough, the virus code can completely corrupt the host file.
In addition to infecting its host files, a virus can often perform other harmful actions on the affected computer. These actions can range from simple nuisances to severely harmful:
Depending on what other actions the virus performs, an infection can be devastating.
Viruses range from fairly simple programs to very sophisticated constructions. Some include features that are similar to the functionality of trojans or worms; others are capable of constantly changing their own code to avoid detection by antivirus programs.
These additional abilities can make it more difficult for users to identify and counter any problems caused by the virus. This wide variety of capabilities are best seen in the following viruses:
Though the total number of actual virus infections have dropped precipitously over the years, they still remain a threat to users using older, unprotected operating systems or programs.