What is the Full Form of Virus In Computer?

What is the Full Form of Virus In Computer?

V-Vital
I-Information
R-Resource
U-Under 
S-Seize
full form of virus
full form of virus In Computer

Full Form of Virus in computer:-

The Full Form of Virus stands Vital Information Resource Under Seize (virus) is a form of malicious software that piggybacks on legitimate application code to spread and reproduce itself.

As with other types of malware, a virus is run by an attacker to harm or control the computer. Its name comes from the way it affects its goals. Biological viruses such as HIV or flu cannot reproduce themselves; In the process, a cell has to be hijacked to do that work, which can wreak havoc on the infected organism. Similarly, a computer virus is not an independent program. This is a code snippet that can be inserted into another application. When the app is running, it runs the virus code, which is annoying and destructive.

In daily conversations and popular magazines, people often use viruses and malware. But viruses that speak for sure are a certain type of malware that fit the above definition. Two other major types are Trojans, which offer users harmless applications as tricks to run them, and worms, which reproduce and spread independently of other applications. A unique feature of the virus is that it can infect other programs to work.

What Do Computer Viruses Do?

G (Google) Suppose your computer is infected. (We will discuss the different methods that occur in a moment, but for now, let's take the infection as a given.) How does the virus do its dirty work? The Sleeping Computer provides a good high-level overview of how this process works. The typical course is something like this: the infected application executes (usually at the request of the user), and the virus code is loaded into the CPU memory before any valid code is executed.

In the meantime, the virus propagates to other applications on the host computer by inserting its malicious code wherever possible. (A resident virus does this immediately after the program is opened, but non-resident viruses can infect non-executable files.) Boot sector viruses use a particularly dangerous technology at this stage. : They put their code in the boot. The area of ​​the computer system disk ensures that the operating system is run before it is fully loaded, making it impossible for the computer to operate in a "clean" manner.

Once a virus enters your computer, it can start executing its payload, which is a word of virus code that works dirty for its creators. These may include all sorts of nasty things: viruses can scan your computer hard drive for banking credentials, log your keystrokes to steal passwords, turn your computer into a zombie that hacks DDoS attacks on enemies, or encrypt your data and demands. Bitcoin ransom to restore access. (Other types of malware may have similar payloads, however: ransomware bugs and DDoS Trojans and beyond).Full Form of Virus In Computer
full form of virus
full form of virus In Computer


How do computer viruses spread?

In the early days of the Internet, viruses often spread from computer to computer through infected floppy disks. The SCA virus, for example, spreads to Amiga users on disks with pirated software. This is mostly harmless, but 40% of Amiga users are infected at one time.

Today, the virus is spreading over the Internet. In most cases, applications infected with virus code can be transferred from computer to computer like other applications. Many viruses have a logic bomb - code that ensures that a virus's payload only works at a certain time or under certain circumstances - users or administrators may not know that their applications are infected. And moves or installs them with impurity. Infected apps can be emailed (accidentally or intentionally - some viruses hijack the computer's mail software to their email copies); They can also be downloaded from the infected code repository or the compromised App Store.
One thing you'll notice is that these infection vectors are all too common, requiring the victim to run an infected application or code. Remember, the virus can only run and reproduce if its host application is running! However, this is the most common malware spread method with email, a question that many are concerned about: Can I get the virus from opening the email? The answer is that you cannot be sure by simply opening a message; You need to download and run the attachment that is infected with the virus code. This is why many security professionals ask you to be very careful about implementing email attachments, and most email clients and webmail services have virus scanning features by default.

A particularly bad way to infect a virus computer is if the infected code runs in Javascript in a web browser and exploits security holes to infect locally installed programs. Some email clients employ HTML and JavaScript code embedded in email messages, so to be sure, opening such messages can infect your computer with viruses. But most email clients and webmail services have built-in security features that prevent them from happening, so it's not a transformation vector that can be one of your primary fears.

Types of computer viruses related full form of virus in computer:-

Symantec has a good breakdown of the different types of viruses that can be classified in different ways. We have already encountered resident and non-resident viruses, boot sector viruses, web scripting viruses and the like. There are a few other types you should know:

1.Marco Virus 

Macro virus can infect macro applications embedded in Microsoft Office or pdf files. Many people who are cautious about never opening strange apps forget that these types of documents themselves can contain executable code. Don't disappoint your guard!

2. Polymorphic Virus

A polymorphic virus changes its own source code slightly each time to avoid detection from antivirus software.
Keep in mind that these series of schemes are based on different aspects of the behavior of the virus, so the virus can fall into more than one category. For example, the resident virus may also be polymorphic.

How to protect our Computer from virus?

Antivirus software is a widely known product in the category of malware protection products. CSO has compiled a list of top antivirus software for Windows, Android, Linux, and MacOS, but keep in mind that antivirus is not the end and end solution. When it comes to more sophisticated corporate networks, endpoint security offers deep protection against malware. They not only detect the signature-based malware that you expect from antivirus, but also offer other styles of anti-spyware, personal firewalls, application control and host intrusion. Gartner offers a list of its top choices in this space, including products such as Silence, CrowdStrike and Carbon Black.

One thing to remember about viruses is that they usually exploit the vulnerabilities in your operating system or application code to infect your system and work independently; If there are no holes to exploit, you can prevent infection even when virus code is executed. For that, you want to keep and update all of your systems hardware inventory, so you know that you need to constantly assess and protect your infrastructure.

Symptoms of a computer virus

How can you tell if the virus fails to protect you? Like ransomware, with a few exceptions, viruses are not eager to warn you that your computer has been compromised. Just as the biological virus wants to keep its host alive, it can continue to be used as a vehicle for reproduction and propagation, so the computer virus will try to do its damage in the background while your computer is still together. But there are ways to say you are infected.
Norton has a good list; Features:
  • Abnormally slow performance
  • Crash again
  • Unknown or unknown programs that start when you start your computer
  • Sending mass emails from your email account
  • Change your homepage or password
If you suspect that your computer is infected, a computer virus scan is in order. There are plenty of free services to get you started on your quest: Security Detective is the Best Way.

Computer virus removal

Once the virus is installed on your computer, the removal process is the same as removing other types of malware - but it is not easy. The CSO has information on how to remove or recover rootkits, ransomware and cryptojacking. We also have a guide for you to audit your Windows registry to learn how to proceed.

If you're looking for a tool to clean up your system, Tech Radar has a good deal of free offers, including some familiar names from new ones, such as malware bytes from the antivirus world. And it's always a good idea to keep a backup of your files so that you can recover from the known security situation when needed instead of extracting virus code from your boot record or freeing Eastern European gangsters.

History of computer viruses

The first real computer virus was the Elk Cloner, developed in 1982 by fifteen-year-old Richard Scarenta. Elk Cloner is an Apple II boot sector virus that can jump from floppy to floppy (as most have done) on computers with two floppy drives. When the infected game begins every 50th time, it displays a poem announcing the infection.

Other major viruses in history:

  • Jerusalem: A DOS virus, hidden in computers, launched on Friday the 13th and deleted applications.
  • Melissa: A mass-matching macro virus that brought the underground virus scene to the mainstream in 1999. This put his producer in jail for 20 months.
  • But there is definitely talk about big name malware that you hear about in the 21st century, not worms or Trojans, viruses. This does not mean that there are no viruses - so be careful what code you run.


Post a comment

0 Comments