What You Need to Know About Computer Virus: types, examples, computer virus history, causes and solutions

Computer Virus: types, examples, computer virus history, causes and solutions

Here is an article to educate you on What You Need to Know About Computer Virus: types, examples, computer virus history, causes and solutions. A lot of computer owners are so much familiar with the term “computer virus” but do not know the causes, types and how to get rid of it.

However, we cannot begin without letting you know the meaning of a Computer Virus.

What is Computer Virus?

A computer virus is a self-replicating program that sometimes spreads by itself into other executable code or documents. Most viruses or worms are malicious programs designed to infect and gain control over vulnerable systems. Computer safety is a good business and every webmaster on the internet should integrate safety tips when using computers

Viruses spread via email can knock out systems burdened by the enormous amounts of generated email, as well as cause individual users major knockouts.

Virus epidemics only infect Microsoft Windows systems, usually through Microsoft Outlook (Express). Most other email clients and operating systems are safe. Runbox recommends using the Run box Webmail interface for reading email, as it prevents automatic execution of possible viruses before they reach your computer. It also strips any malicious scripts from messages so they can’t infect your system (unless you open the original message in a separate window).

√ADS

#Get Email Address Database of over 10 Million US,UK,CANADA & Europe users – Click here
#For Skill Acquisition Practical Training Manuals and E-Books Click Here

 

 

READ ALSO: What You Need to Know About Computer Repairs-Detailed Guide

On November 10, 1983, a handful of seminar attendees at Lehigh University, Pennsylvania, USA, heard for the first time the term “virus” applied to computing. The use of the word was strange. The virus that was then on everyone’s mind was the one isolated a few months earlier at the Pasteur Institute in Paris that could be the cause of a new disease called AIDS. In the digital world, talking about viruses was almost nonsense.

The first PC had been launched on the market just two years earlier and only the most technologically informed were running an Apple II computer or one of its early competitors.

However, when on that day the graduate student from the University of Southern California Fred Cohen inserted a diskette into a VAX11/750 mainframe computer, the attendees noted how code hidden in a Unix program installed itself and took control in a few minutes, replicating and spreading to other connected machines, similar to a biological virus.

Cohen tells OpenMind that it was on November 3 when a conversation with his supervisor, Leonard Adleman, led to the idea of ​​giving the name of virus to that code capable of infecting a network of connected computers. The Cohen virus was simple: “The code for reproduction was perhaps a few lines and took a few minutes to write,” says the author. “The instrumentation and controls took almost a day.”

Cohen published his creation in 1984, in an article that began: “This paper defines a major computer security problem called a virus.” But though the extensive research of Cohen and Adleman in the specialized literature would draw attention to their existence, the truth is that before that first virus defined as such appeared, there had already been earlier cases.

READ  How to Activate Union Bank Mobile App

In 1971, Robert Thomas, from the company BBN, created Creeper, a program that moved between computers connected to ARPANET and that displayed the message “I’m the creeper: catch me if you can.” According to David Harley, IT security consultant and researcher for the ESET company, “in the research community, we usually consider the experimental program Creeper to be the first virus and/or worm.”

Moreover, a year before Cohen’s seminar, 15-year-old Rich Skrenta developed Elk Cloner, the first computer virus—not named that yet—that spread outside a laboratory. Skrenta created it as a joke for his friends, whose Apple II computers became infected by inserting a diskette with a game that hid the virus.

So, Cohen was not really the first one. But according what computer security expert Robert Slade explains to OpenMind, the special thing in Cohen’s case was not so much his programming as his method. “He was doing the original academic research on the concept; his structure of antiviral software is still comprehensive despite all the developments since.” Cohen also introduced an informal definition of virus: “a program that can infect other programs by modifying them to include a, possibly evolved, version of itself.”

Those first viruses were technological demonstrations. The motivation of their creators was research and their codes were not malicious. Cohen points out that the objective of his program was “to measure spread time, not to attack.” In the case of Creeper, it was about designing a mobile application that could move to the machine where the data resided, instead of going the other way.

As the professor of Computer Science at the University of Calgary (Canada) John Aycock points out to OpenMind, computer viruses were born as “a natural product of human curiosity.” And as such, “their invention was inevitable.”

It was also inevitable that the first malicious codes would soon emerge. In 1986, Brain appeared, a virus created by two Pakistani brothers whose purpose was to punish the users of IBM computers who installed a pirated copy of software developed by them. However, the effects of Brain were slight and the virus included the contact information of its authors so that those affected could contact them and request a cure. Spread by means of diskettes, Brain reached international diffusion, giving rise to the birth of the first antivirus companies.

At the end of the 1980s, codes began to proliferate that erased data or disabled systems. In 1988, the worm created by Robert Morris infected many of the computers connected to the then nascent Internet, especially in research institutions, causing a drop in email services. Its effects were more damaging than anticipated by Morris himself, who became the first person to be prosecuted in the US under the Computer Fraud and Abuse Act of 1986.

In this way, so-called malware began to diversify into different families: worms are programs that move from one computer to another without hiding in another application, while Trojans are harmful programs with an innocent appearance. In 1995, WM/Concept appeared, which infected Word documents. “It opened the door for a plague of document-borne malware that dominated the threat landscape for several years after,” says Harley. The expert lists other typologies that have emerged over time, such as bots that manipulate other people’s systems to launch spam campaigns, send malware or denial of service attacks; or ransomware, codes that hijack a system and force the payment of a ransom, such as the recent case of WannaCry, which in May 2017 infected hundreds of thousands of computers in more than 150 countries.

To this threat landscape we must add the current media, such as social networks, which facilitate the expansion of malware. As explained to OpenMind by Jussi Parikka, expert in technological culture at the Winchester School of Art of the University of Southampton (United Kingdom) and author of Digital Contagions: A Media Archeology of Computer Viruses (2nd ed., Peter Lang Publishing, 2016), “the online platforms for communication and interaction are themselves part of the problem due to their various security issues.”

READ  Web Navigation Tools

But despite the many headaches caused by the malware, experts point out that these developments can benefit other technologies. Cohen argues that “benevolent” viruses can, for example, be useful in maintaining and updating systems. “I think artificial life (reproducing programs) still have enormous potential, largely unrealized as of today,” he reflects. “History will tell, but I still hold hope that viral computation will be a benefit to humanity in the future.”

Types and Examples of Computer Virus

Below are the most common types of viruses and other malicious programs;

  • Resident Viruses
  • Multipartite Viruses
  • Direct Action Viruses
  • Overwrite Viruses
  • Boot Virus
  • Macro Virus
  • Directory Virus
  • Polymorphic Virus
  • File Infectors
  • Encrypted Viruses
  • Companion Viruses
  • Network Virus
  • Nonresident Viruses
  • Stealth Viruses
  • Sparse Infectors
  • Spacefiller (Cavity) Viruses
  • FAT Virus
  • Worms
  • Trojans or Trojan Horses
  • Logic Bombs

Examples of Computer Virus

Below are examples of computer virus.

Note: Examples of virus is totally different from types.

  • Ransomware
  • Spyware
  • Adware,
  • Trojan horses
  • Keyloggers
  • Rootkits,
  • Bootkits
  • Malicious Browser Helper Object (BHOs)

Causes of Computer Virus and Solutions

Here are some of the primary causes of computer virus infections

  • Suspicious Email Attachments

It’s pretty self-explanatory. Many people make the mistake of opening an email that looks shady just to see what it’s all about. That’s especially true if the Subject Line is very attention-grabbing.  As a business owner, and as a computer user, you should never do that.

If you ever get an email from an unknown source, don’t click on it. Doing so may put your company data at risk. More often than not, computer virus infections are placed in the attachment files. Alternatively, they come in the form of a website/link contained in the email.

  • Removable storage devices afflicted by computer virus infections

computer-virus-inf2In the case of a company, this situation is more common than you’d think. After all, using removable storage devices (like Memory Cards or USB Flash Drives) is very convenient.

However, it’s enough for one of them to have a virus that could possibly infect the entire network.  That’s why you should always check a removable storage device for any signs of a virus infection first. (proper anti-virus software is critical for this).  It’s also important to teach your employees about this safety precaution as well.

Not all people know that computer virus infections can be transmitted through these devices. Taking such a risk just isn’t worth it.

  • Unsecured Internet sources

In this day and age, this is the most common source of computer viruses. It’s very easy to get one if you’re not careful.  All it takes is a simple file download or website click, and you’ve got yourself a virus. That’s why you must make it a priority to teach your employees not to access unsecured websites at work. The best course of action is to filter out the web addresses that would be considered unsafe(a proper firewall with built-in web filtering is important)

The same policies are mandatory for files as well. Only company-approved files should be downloaded. It’s always better to take pre-emptive measures than to be sorry.

How to Get Rid of a Computer Virus

– Computer
– Anti-virus software
– Internet connection
Step 1
If you suspect that you have a virus, launch your anti-virus software and perform a scan of your entire system. If you do not have an anti-virus software application installed on your computer, download one from the Internet. Search for an anti-virus software application with a good reputation. Some anti-virus software applications are bogus and can add viruses to your computer.
Step 2
Wait for the full scan to be completed. Once it has been completed, check to see if it has detected any viruses. If there are viruses, click on the ‘delete’ button on the interface. Sometimes, the virus detected on your computer cannot be deleted by the anti-virus software. When this happens, you have to manually remove the virus from your computer.
Step 3
Take note of the name of the virus detected on your computer. Open a Web browser window and type the name of the virus on the search engine.
Step 4
Read several sources and get information on how to remove the virus. Make sure that you read instructions carefully as manual removal can be tricky. If you do not follow the instructions, you might delete or change some crucial files on your computer.
Step 5
Once you have manually removed the virus from the computer, launch your anti-virus program again and do another scan of the entire system.
Step 6
Wait for the full system scan to finish. Check if you have successfully removed the virus from your computer.
Step 7
If you have not successfully removed the virus from the computer, check the processes running on your computer. You can do this by typing Ctrl+Alt+Del on your keyboard. A window will appear. Click on the ‘Processes’ tab. Scan the list for processes that seem malicious.
Step 8
Search the Internet for the processes and the virus associated with it. Manually remove the virus and perform another system scan.
Connect with us on Social media
Please follow and like us:
RSS
Follow by Email
Facebook
Google+
https://jaysciencetech.com/2018/05/what-you-need-to-know-about-computer-virus-types-examples-computer-virus-history-causes-and-solutions.html
Twitter
LinkedIn
Instagram

Leave a Reply

error: Content is protected !!