Today, almost everyone is familiar with the word virus. We meet him all the time in life, although we don’t really want it ourselves. In the modern era computer technology There are also computer viruses that infect your computer and can cause a lot of trouble. Many people ask: “ What is a computer virus? And how can you fight it?” A huge number of books and many articles have been written on the topic of virology.

Thousands of specialists in hundreds of different companies fight computer viruses. At first glance, it seems that the topic of protection against computer viruses is not so relevant and complex as to be the object of close attention. But this is absolutely not true. Computer viruses are one of the most common modern causes of information loss. There have even been cases when computer viruses blocked the work of enterprises and organizations. Moreover, there was a recorded case where a computer infected with a virus caused the death of a person. This happened in one of the hospitals in the Netherlands. The patient died due to a lethal dose of morphine. A desktop computer infected with viruses was producing incorrect information.

Computer virus

Today there are many different viruses. Each type of which can be programmed for certain actions and transmitted in a certain way. Depending on what is written in the main code of the virus, it will act within certain periods and perform strictly specified functions.

Computer virus Maybe:

  • permanently delete all important information;
  • transfer to a remote server and delete information;
  • just copy it to the specified location;
  • monitor all actions of employees, etc.

A computer virus can cause loss important information Therefore, you should always remember to protect your computer from unauthorized access and virus attacks. The most important thing is that a simple user, without help special programs, will not be able to do this. A virus may be on the computer and not show any signs until the occurrence of some condition (also written in the code), this could be: a signal from the outside, the occurrence of a certain date, etc. To protect your computer from the possibility of losing information due to computer viruses, it is recommended to install anti-virus programs.

It should be emphasized that these programs must be installed immediately after installing the operating system and drivers. That is, this should be the first program that you install on your computer. In addition, today even installed antivirus program may be affected by a virus, so it is recommended to scan your computer at certain intervals with special anti-virus programs that are not installed - portable versions.

In custody

Despite the fact that antivirus companies make enormous efforts, the losses caused by computer viruses do not fall at all and reach unprecedented amounts of hundreds of millions of dollars annually. And this is clearly an underestimate, since only a small part of such incidents is known.

Therefore, it is necessary to make every effort to protect the computer, and, consequently, all information, from the effects of various computer viruses.

Video about computer viruses

From it you will learn:

  1. What is a computer virus
  2. How does it infect your computer?
  3. What are the signs that your computer is infected?

1) to crashes and freezes during computer operation (+); 2) to the loss of programs and data; 3) to format the hard drive;

15. Dangerous computer viruses can lead...

1) to crashes and freezes during computer operation; 2) to the loss of programs and data (+); 3) to format the hard drive;

4) to decrease free memory computer.

  1. What type of computer viruses are introduced and infect executive files with the extension *.exe, *.com and are activated when they are launched?

1) file viruses; (+)

2) boot viruses;

3) macro viruses;

4) network viruses.

  1. What type of computer viruses are introduced and infect files with the extension *.txt, *.doc?
  1. file viruses;
  2. boot viruses;
  3. macro viruses; (+)
  1. network viruses.
  1. Viruses that are introduced into a document under the guise of macros
  1. Viruses that penetrate a computer block the operation of the network
  1. Malicious programs that penetrate a computer using computer network services (+)
  1. Malicious programs that install other programs secretly from the user.
  1. Hardware.
  1. Software.
  1. Hardware and antivirus programs. (+)

22. Antivirus programs are programs for:

  1. Virus detection
  1. Virus removal (+)
  2. Reproduction of viruses
  1. AVP, MS-DOS, MS Word
  2. AVG, DrWeb, Norton AntiVirus (+)
  3. Norton Commander, MS Word, MS Excel.

25. Which programs are not anti-virus programs?

  1. phage programs(+)
  2. scanning programs
  3. audit programs(+)
  4. detector programs
  1. Is it possible to update anti-virus databases on a computer that is not connected to the Internet?
  1. yes, by calling the service technical support antivirus software company. The specialists of this service will dictate the latest databases that need to be saved on your computer using any text editor
  1. yes, this can be done using mobile media by copying anti-virus databases from another computer on which Internet access is configured and the same anti-virus program is installed, or on it you need to manually copy the databases from the website of the anti-virus program manufacturer (+)

Many users consider computer viruses to be either a completely useless, empty application that does nothing, or a program that “explodes monitors,” disables power supplies and removes all the money from the balance in the current bank account.

In this article we will try to figure out what to expect from a computer virus and what not to expect.

Let's start with what viruses now definitely cannot do:

  • Disable any hardware component of your PC directly.

Despite the fact that viruses cannot currently exploit PC components deeper than operating systems, there is a non-zero chance that one day such viruses may still appear. They will know how to communicate directly with devices in order to put them into technological modes or change something directly in the firmware or settings. The most vulnerable link in this regard at the moment is your hard drive.

What viruses can do:

  • Block access to the operating system or program
  • Irreversibly modify, delete and encrypt your data
  • Using social engineering methods to extract financial benefit from the user
  • Monitor user actions: record passwords entered, resources visited, documents opened
  • Turn an infected operating system into a Botnet network participant who, on command, can form DDos attacks, send spam, perform any other actions dictated by a special Botnet server
  • Scan notebooks, documents, extracting postal addresses from them, sending the latter to spammers or producing your own mailing, inserting a virus into the body of the letter
  • Disrupt the work of banking and other financial programs, obtain personal data from them, forward this data to attackers
  • Reproduce through email, local network, internet network, hard disks, flash media, any information media, through infected files, p2p clients, Online Games, instant messaging services (ICQ, MSN, Yahoo!), VoIP programs (Skype), etc.
  • Download new viruses, turning your computer into a breeding ground for viruses
  • Significantly slow down the operating system and programs
  • Disable the operating system and programs

Problems caused by viruses can be very diverse: some can be eliminated, some cannot. Almost all of these difficulties can be avoided, or at least the likelihood of their occurrence can be minimized. To do this, it is enough to have a working antivirus with up-to-date databases on the system.

Alexey Gavrilenko

Reproduction of materials is permitted only with an active link to the original article.

The first computer viruses appeared immediately after the creation of computers. Programmers wrote them just for fun; such viruses did not cause any harm. But modern computer viruses are created for completely different purposes and pose a serious danger. What viruses exist and how to fight them?

All existing malware today can be divided into two categories: viruses and Trojans. The first ones simply perform some negative or humorous actions on the infected computer, for example, they can erase files or completely format the hard drive, turn off the computer, make the mouse inaccessible to the user, display some message on the screen, etc.

As a rule, the creators of viruses do not pursue selfish goals; most often such programs are written simply for entertainment. But there are exceptions - for example, viruses that block the operation of Windows.

The user sees a message in which he is asked to transfer a certain amount of money to a specific account, after which he will be sent an unlock code.

Having encountered such a virus, you should remember the features of the message, in particular, the account or phone number (if you are asked to top up your phone balance), then go from another computer to the websites of anti-virus companies and look for the appropriate unlocker. But even if you fail to remove the virus, the worst consequences from it are formatting hard drive PC.

The biggest danger is Trojans

This type of malware is created with the purpose of stealing a person's confidential data. If the work of a virus on a computer is usually clearly visible, then the Trojan program tries to completely hide its presence. Her task is to collect necessary information for example, logins, passwords, bank card or online banking data, etc., and then quietly transfer everything to the owner of the Trojan.

High-quality Trojan programs are written by highly skilled programmers and can cost thousands of dollars. A well-made Trojan is absolutely invisible; no anti-virus program can detect it until data about the Trojan gets into anti-virus databases.

Modern spyware Firewalls are also easily bypassed. Having done their dirty deed, many Trojans self-destruct, leaving no traces behind. You can only find out that your computer has been infected with a Trojan after your money has been lost. bank card, or they will be hacked mailboxes, admin panels of sites you own, etc.

Backdoors

There is also a class of viruses called backdoors. Having infected your computer, the virus creates a loophole in it through which the hacker gets full access to the car. He can view and copy information from disks, delete or add something. A hacker can use your computer to scan networks and hack other computers to launch attacks on servers. Thousands of hacked computers can be controlled from one center, in which case a botnet is formed - a network of infected computers subordinate to one person.

Viruses and Trojans pose a huge danger, so everyone fights them possible ways. The main problem is that the principles of construction and operation of the most common operating room today Windows systems provide hackers with plenty of opportunities to create and introduce malware.

OS developers are trying to close the gaps, but there are still too many of them. Much safer in this regard is operating system It is no coincidence that many hackers use Linux.

In any case, to protect against viruses and Trojans, your computer must have an up-to-date antivirus and firewall. You should also follow basic security rules - in particular, do not download or open suspicious files.