One of the most frustrating things in the use of computer technology is being infected by computer viruses! Imagine yourself conveniently working on a computer on a very important task, and then all of a sudden, the file you have been slaving on for nights on end disappears! Most likely, it has been “eaten up” by an irritating, nerve-wracking computer virus.
What is a computer virus?
A computer virus “is a software program that attaches itself to, overwrites or otherwise replaces another program in order to reproduce itself without the knowledge of the computer user,” as defined by Collette Dilly (2001). It is actually similar to a biological virus wherein both the computer and biological virus share the same characteristic of “infecting” their hosts and have the ability to be passed on from one computer to another.
Just like humans, a computer that is infected with a virus also becomes “sickly” and thus, prone to suffer malfunction in its operation or running of computer programs and software.
Trading programs with other people’s computers may contaminate one’s computer programs. The use of modems necessary to connect to the internet can likewise acquire viruses. Some unsuspecting users may get it from seemingly innocent emails.
When this program enters your computer through your input device, it hides in your computer’s memory and starts to duplicate itself like a disease. When you save your data, you also save the virus. Slowly but surely, the virus crowds out your data and causes major system problems. (Trickum Middle School, 1997)
What does a virus do to a computer?
These computer viruses are actually created and developed by people using bits and codes designed to adapt to a computer’s system or files and data. Depending on the particular type or kind of computer virus, the effects of viral infection on computers may range from a simple display of some sort of messages to a devastating crash of your computer system and programs.
The most common types of computer viruses are Trojan Horses, E-mail viruses, and Worms. A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically. An e-mail or network virus moves around in e-mail messages and usually replicates itself by automatically mailing itself to dozens of people in the victim’s e-mail address book. A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole and then starts replicating from there, as well.
How can we protect ourselves from computer viruses?
Users should also consider the variety of anti-virus products currently available to protect their computers.. There are three classes of anti-virus products: detection tools, identification tools, and removal tools. Scanners are an example of both detection and identification tools. Vulnerability monitors and modification detection programs are both examples of detection tools. Disinfectors are examples of removal tools.
- Such anti-virus programs must be used to scan the computer of probable existing viruses. Never insert floppy disks or CDs from unreliable and unknown sources. Scan them with the antivirus before running them on the computer.
- Avoid opening emails from unknown sources. They may contain malicious information as well as destructive viruses. Download mails with care. Scan attachment with anti-virus software. Big email companies like Yahoo! usually have their own reliable default anti-virus software that automatically scans the attachments.
- Back up files for security reasons. In case the computer gets infected and needs to be reformatted, then it is ensured that important files have been saved in a separate folder or CD.
Now that awareness of the management of a computer virus is widespread; it is a comfort to know that it is not a hopeless case! The important thing is to maintain a clean and virus-free computer to save one’s files… and one’s sanity!
References
- Dilly, C. (2001) “Computer Viruses, Hoaxes and Protection” Web.
- Trickum Middle School (1997) “Will a Computer Virus Strike Your Computer?” Computer Viruses? What Really Is It? Vol.1 Issue 1, 1997
- Brain, M. (n.d.) “How Computer Viruses Work” Web.
- Burgess Forensics (2006) “What are Computer Viruses, Trojans and Zombies?” Web.