It is a harmful program. It destroys useful programs, source code/data, collects vital information from your computer and transmits to the sender when executed on a computer. It also has a capacity to even destroy your hard disk. Laptops are more prone to computer viruses when compared with desktop PCs.
People would use their laptops anywhere in the coffee shops, work places and offices that offer free Internet to browse. So, the laptops are likely to get infected with viruses when browsing the Internet over the unsecured network. Mal ware and spyware would also pass on the sensitive information to hackers or the senders of viruses.
The virus gets installed on your PC and hides. We feel that virus is a genuine program. It comes in the form of exe files etc and installs automatically on your computer and transmits the sensitive data such as credit card numbers, passwords, user ids and bank account details.
How a Virus gets transmitted to the computer
A virus can enter your computer through the following possible ways:
When you insert an infected Pen Drive
When you download an infected email
When you copy or execute files from a CD on your computer
When executing a virus program unknowingly on your computer
When an intruder hacks your computer through Internet
Various Types of Viruses
Various types of viruses that attack our PCs include stealth viruses, sparse infectors, polymorphic viruses, armored viruses, slow/fast infectors, multipartite viruses, virus droppers, tunneling viruses, cavity viruses and camouflage viruses. Camoflage viruses pretend to appear as genuine programs. Tunneling viruses infect the PCs while hiding under antivirus software. Stealth viruses try hide from system software and antivirus software. It is difficult to eliminate armored viruses. Sparse infectors rarely infect the PCs.
How can we prevent a virus attack
Install an antivirus program such as AVG, MacAfee and Norton antivirus softwares. Scan your computer regularly to detect and eliminate viruses. Update your antivirus definitions regularly to protect from new viruses, as new viruses are released frequently targeting PCs.
Install good firewall on your PC. Don’t open an email received from an unknown person. Scan the floppies/pendrives prior to coping/executing the files. Choose highest security option under the tools option in your Internet Explorer. This measure would help to prevent the entry of Trojan horses and other harmful viruses. Install the latest version of Internet explorer having more security features.
Care should be taken while installing freeware as that often comes with spyware to steal vital data unnoticeably. Viruses also come through Messengers such as Yahoo and MSN. So, don’t chat with unknown persons.
How to remove viruses from your Infected Computer
Copy all the vital data to another pen drive or floppy or CD ROM. If you are connected to the network, disconnect the network. Run antivirus software to detect and remove viruses. We can’t be able to remove some of the viruses. The antivirus software would move such unhealed viruses to virus vault so as to protect your PC from the dangerous viruses.