Anyone with even a small amount of computer experience has heard of computer viruses. Even with no knowledge of how a virus functions, the word strikes fear into the heart of computer owners. What exactly is a virus and how does it function?
What is a Virus?
A virus is a computer program designed to enter your computer and tamper with your files without your knowledge. Once the program containing the virus is open, the activated virus can not only infect other programs and documents on your computer, it can duplicate and transmit itself to other computers that are connected to yours, just like a physical virus can move from one human host to another.
Viruses began in the late 1980s as personal computers and electronic bulletin boards became more common. Back then, operating systems, word processing programs and other programs were stored on floppy disks. Hidden viruses were programmed onto these disks; as the disks were transferred from person to person, the virus spread.
Who Creates Viruses?
Where do viruses come from? Every virus is created by an author with a different motive but all virus builders feel their actions are justified. For some, a killer virus is the ultimate technical challenge, like climbing a mountain. For others, creating viruses is a form of self-expression. Some disgruntled employees, consumers or citizens turn to virus building as revenge for perceived injustices. And though it s a frightening thought, some viruses are built and aimed by legitimate (but disreputable) businesses to weaken competitors. Other virus authors want to make their mark in Internet history; these writers get a thrill out of seeing their virus cause damage enough to attract news headlines both online and on the evening news.
What Do Viruses Do?
Today s viruses are far more potent than the beginner versions we saw several decades ago. Viruses may be sent by opening email attachments, clicking on spam, visiting corrupt websites and links online, opening spreadsheets or even the original method infected disks. But the Internet is now the superhighway for virus transmission.
Some aggressive viruses such as the Melissa virus automatically duplicate copies of itself to the first 50 people in your computer email address book. A frightening prospect opening an email from someone you trust to be greeted by a virus, and that s exactly what the author is counting on, your trust.
The damage caused by these viruses varies from minor delays in computer function to complete destruction of your hard drive. For companies, the price is far higher. A downed website can cost a company millions of dollars a day.
How does the virus infect your computer? Because floppy use is nearly extinct and the majority of CDs that change hands cannot be altered, you will most likely bump into a virus through online activity.
Some viruses attack your boot sector, the start up section of your hard drive. Other viruses infect executable program files, activating each time the program is started. The virus travels into the memory and further copies itself.
Macro-viruses are the most common type of computer virus. This type of virus attacks data files containing macros. Macros are lists of commands or actions found under key headings. The virus resembles a macro but when the file is opened, the virus is activated.
Multi-partite viruses are a combination of the boot sector and file virus. These begin in the boot sector and affect both your boot records and program files.
Is My Computer Infected?
How can you tell if your computer has a virus? There are warning signs that your computer may be infected with a virus. For minor viruses, you may encounter strange messages, images, noises or music on your computer. An infected computer may have less memory available, or you may notice name changes. A computer infected with a virus may be missing programs, or files may malfunction. If you encounter any of these characteristics on your computer, you are most likely experiencing an attack from a virus.
Is there any hope? How can you protect your computer from viruses? If you do not have any virus software on your computer now, consider installing some soon. Be sure to update your anti-virus software regularly; this way you ll be protected from new viruses that crop up. If you don't have protection, do some research to help you find the best antivirus software.
Use your software to scan for viruses weekly. Don t open emails from unknown sources, and be cautious when opening attachments even attachments from people you trust. Hyper vigilance requires you to contact the sender and confirm the attachment before you open it, but this is too much. Just be aware. It Aunt Gertrude typically includes a newly, well-written letter with the jokes she sends, and this attachment email from her comes with: Open this now, baby! alarm bells should go off. Don t open it.
Constantly back up your data in case a virus attacks your hard drive and you need to reformat. Better yet, set up your computer to automatically back up your data weekly so that you don t have to worry about this chore.
What Should I do if I have a Virus?
What do I do if I find out that I have a virus on my computer? Know that it s not the end of the world. As a courtesy, contact everyone (by phone, preferably) you have been connected by email to warn them possible exposure to the virus right away.
Clean your computer with anti-virus software. If your computer is still not functioning and you have data you are concerned about recovering, consider hiring a trusted expert. Often data can be successfully extracted from an injured hard drive, but the process is complex and will involve another computer, special software, and a technician with a lot of experience in data recovery.
As a last resort, reformat your hard drive, even if it means destroying all of the information located there. Reinstall the software and data using your backup files.
Brain, Marshall. HowStuffWorks.com: How Computer Viruses Work.(2001).
Hetherington, Sally. Bizland.co.za: Understanding Viruses. (2005).
VHSoftware: Computer Viruses, Protecting Your System. NARTS. (2002).