The computer virus is assembled by malicious logic. If the antibody on biology attacks a cell, similarly, a computer virus will invade into the program which operates correctly, and will start an attack. There are also a virus which collides with the operation of a host program, and a virus which changes a motion of a host computer and is destroyed.
Computer virus (following virus) is a kind of the inaccurate program which was designed by man and created for computers. It will advance into a computer system and data will be destroyed.
Since it is infected with either of the file directory systems which is recording the system for starting a computer or boot area, and the position of a file when it sticks to the program in which a disk and execution are possible and the program which can be performed, and a power supply are usually turned on when mainly opening an appending file, and the program and data of an electronic mail which download or are carried in from the exterior as an infected course, it needs to be careful.
It is infected via other media, networks, etc. The used computer may be invaded by the virus, if a program file is copied to FTP site or other computers or data is exchanged by computers using the floppy disk. It will not be infected with a computer virus if only the text and the data file are downloaded through the Internet.It is from the light thing of displaying a mischievous message on a certain fixed time to a thing powerful like it destroys the system of the whole network.
It can investigate whether it is infected with the virus by the "virus checker", a "program checker", a "vaccine program", etc. When a computer is infected with a virus, the following condition appears to a computer. Moreover, if infected, let's remove a virus using a vaccine. However, the virus which is not effective is also. Moreover, a computer is also safely guardable using a "monitor program."@
* Abnormalities occur on a screen.
* A system does not rise.
* Starting of a system takes time unusually.
* A system hangs-up.
* The disk access which a user does not mean happens.
* A file is deleted and destroyed.
* A disk is destroyed.