Monday, June 6, 2011

Some of the Common Properties of Computer Virus

With a plethora of computer viruses flooding the cyberspace today, it has become extremely necessary for computer savvy to be fully armed and ready against their attacks before they wreak havoc. Now a day’s Computer viruses have taken up corporate computers by large and with a corporate computer as we are aware of the situation are totally different in regard to that of a desktop pc. Once a virus have made it space on a local system of a corporate network with no time it will be a major threat to the Server of that organization hampering and risking out the productivity and security concern of the organization. To protect your PC and server from viruses you need to install anti-virus software program and keep yourself updated with its latest virus definitions available round the corner.

Outlined below are different properties a virus shows. However, not all the computer viruses have common properties.

Polymorphic: Some viruses have an ability to change their code. This means a virus can carry several amounts of similar variants. Email viruses that keep on changing the subject or body of the message to prevent recognition are believed to have same properties.

Memory or non memory resident: A virus is either memory resident where the virus is first loaded into memory and infects a computer subsequently or non memory resident where the virus code runs each time a file is opened.

Stealth: The stealth virus first attaches itself to files on the computer and then attacks the computer.

Transmissible: Computer viruses are small software programs which can carry other similar viruses, thereby making the virus dangerous. The primary virus takes a shelter behind the other or gain assistance to infect a particular section of the computer.

Permanence: Some viruses are able to ruin the functionality of different parts of the computer such as CMOS battery or master boot record. If a computer is formatted and the infected application or program is still on a back up disk, the virus can easily re-infect the computer.


Viruses can affect files or applications in numerous ways. They usually attack .com, .exe, .sys, .bin, .pif or any other data files. Viruses have an ability to infect any file and often seek for executable files or data files including word or excel document to replicate.


Running an antivirus protection program is the most convenient and a reliable way to remove computer viruses of all kinds. A few users also use other aspects of the computer to detect the presence of virus or other malware matter.


About the Author: Emma Elle

Emma is online Virus Removal specialist for iYogi, a leading IT support company Headquartered in India, iYogi provides computer support via phone and remote access for home and small business users globally. Live 24/7 Anti-virus support service from India. Read More...


Computer Repair Frederick Md Computer Repair Services in Frederick Md Tech Direct: 240-415-4357 (HELP) | Office: 240-215-3623 | Email: gethelp@techknowbutler.com | Main Office: 1845 Brookfield Ct., Frederick, MD 21701 View Larger Map Diagnostics & Testing FREE Diagnostics Include:
  • Techknowbutler Online Remote Support service installation Virus Removal & Prevention
  • Multiple virus scans using multiple anti-virus clients
  • Browser reset and toolbar removal
  • FREE Norton Installation (For Comcast Internet Customers)
  • Optional Anti-virus Setup & Installation (For Non Comcast Customers) Paid & FREE AV available Data Recovery / Data Transfer
  • Diagnose drive or device failure (Hard Drives, Flash Drives, DVD+CD)
  • Recover data using a combination of hardware and software recovery tools • Transfer recovered data to user supplied external hard drive or other device
  • Transfer data from one device to another Networking - Wired & WiFi • Network Setup (Switch, cables, router, etc...)
  • Router setup & configuration
  • Secure wireless network access
  • Connect wireless devices to router • Share printers and devices on network AntiVirus Remote Support

No comments:

Post a Comment