Non-hazardous computer viruses can lead. Than dangerous computer viruses than dangerous virus in computer

In search of your data sewn, we begin to think about how to invest our computer from third-party attacks in order to take our information. It is about the types of malicious programs and viruses that our PC attack, we will talk below.

Let's start with the most advanced habitat of viruses and malicious programs - Internet. Only at first glance it may seem that the Internet is a big kind "world", very friendly and varied with many paths and roads in his depths. But just in this "Internet world" and millions of various hazards live, including Internet viruses.

The Internet today is not only millions of pages to a variety of subjects, it is also insidious places with viruses, malicious programs, spyware modules. And even if you restrict ourselves to using the Internet, then viruses still have no chance to get and infect your data on the computer.

According to the history of the PC development, viruses have not been "lagging behind" in their development, from electronics. "Virtual Diseases" began to be developed in the 80s of the last century. Then the viruses were mechanical structures that could be self-established, activated and capture new types of information. But for the last floor of the century, viruses in their development and species stepped very far, there were many malicious programs and individual viruses. In order to understand what viruses exist today and what threats they carry by hitting your computer, list them below by groups:

Computer viruses classic - type of viruses that start their activities only when they are directly activated, i.e. when, for example, the user runs on a computer viewing a movie or any photo, or songs, then at that moment hidden virus Activates and adds its code and begins to act. This type of viruses can fall or postpone from one computer to another only when we infected with them a media file or a program copy from one PC to another, or we transmit an infected file on a carrier (disk, flash drive, etc.).

The following type of viruses is Trojan programs. . This is a very cunning type of viruses, which carries a number of functions: the failure of the operating system of the PC and the whole technique as a whole; PC resource coverage in order to oppose your; infection and destruction of data stored on the computer; Capture and transmission of information stored on a computer to other persons.

Another type of viruses - network worms . Their task is to spread their malicious copies to other PCs, as well as infect the virus performed programs. In addition, network worms can sometimes be characterized by the properties of Trojan programs

After we decided on in idi hazardous viruses, It is worth thinking about how you can protect against malicious attacks on your computer. The question is again not simple, but there are always options. For example, when purchasing anti-virus programs, it is possible to rely on the Seller's Seller Tips, get to know more deeply with existing ratings of protective programs and reviews about them, communicate with professionals to protect PCs from viral attacks. And only after that it is worth stopping your choice on a specific antivirus program. And even if you later, something in it will not arrange you can always replace it with another.

Today, almost everyone is familiar with the word virus. We are constantly meeting with him in life, although we don't want it very much. In modern era computer technology There are also the same computer viruseswho affect the computer and can cause a lot of trouble. Many are asked: " What is a computer virus? And how can you fight with him? " A huge number of books and many articles are written on the theme of virology.

Thousands of specialists in hundreds of different companies are struggling with computer viruses. At first glance, it seems that the topic of protection against computer viruses is not so relevant and difficult to be an object of close attention. But it is completely wrong. Computer viruses are one of the most common modern causes of information loss. There were even such cases when computer viruses blocked the work of enterprises and organizations. Moreover, the case was recorded when the computer infected with the virus caused the death of a person. It happened in one of the hospitals of the Netherlands. The patient died due to the death dose of morphine. Stationary computer infected with viruses, issued incorrect information.

Computer virus

Today there are many diverse viruses. Each type of which can be programmed to certain actions and transmitted as a certain way. Depending on what is written in the main code of the virus, it will act within certain time and perform strictly laid functions.

Computer virus can:

  • permanently remove all important information;
  • shift to a remote server and delete information;
  • just copy it to the specified place;
  • follow all the actions of workers, etc.

Computer virus can cause loss important informationFor this, you always need to remember the protection of the computer from unauthorized access and viral attacks. The most important thing is that simple user, without help special programsMake it will not be able. The virus can be on a computer and not to submit any signs before the onset of some condition (as prescribed in the code), it may be: signal from the outside, the onset of some date, etc. To protect your computer from the possibility of losing information due to the actions of computer viruses, it is recommended to install antivirus programs.

It should be emphasized that the program must be installed immediately after installing the operating system and drivers. That is, it should be the first program you set to a computer. In addition, today even the installed antivirus program can be amazed by a virus, so it is recommended to scan the computer with special antivirus programs that are not installed - portable versions.

In custody

Despite the fact that antivirus firms make tremendous efforts, losses that bring computer viruses are absolutely not falling and reach unprecedented hundreds of millions of dollars annually. And this is clearly understated itself, since only a small part of such incidents is known.

Therefore, it is necessary to make the most effort to protect the computer, and, therefore, all the information, from the impact of various computer viruses.

Video about computer viruses

From it you will learn:

  1. What is a computer virus
  2. How he infects the computer
  3. What are the signs that your computer is infected

Many users consider computer viruses or a completely useless, empty application that does not make anything either by the program that "explodes monitors" displays the power supplies and removes all the money from the balance at the current account in the bank.

In this article we will try to figure out what should be expected from a computer virus, and which is not.

Let's start with the fact that viruses are now definitely not to do:

  • Instruct any iron component of your PC directly.

Despite the fact that viruses cannot currently use PC components deeper than operating systems, there is a different chance that one day such viruses may still appear. They will know how to directly communicate with devices to translate them into technological modes or change something directly in the firmware or settings. The most vulnerable in this place the link is currently your hard drive.

What viruses can do:

  • Block access to the operating system or program
  • Irreversible modify, delete and encrypt your data
  • With the help of social engineering methods to extract financial benefits
  • Follow the user's actions: to fix the input passwords visited resources opened documents
  • Turn the infected operating system to the Botnet-network participant, which commands can form DDOS AtaakiSending spam to produce any other actions dictated by a special Botnet server
  • Scan notebooks, documents, removing postal addresses from them, sending the latest spam or producing their own newsletter, putting a virus into the body
  • Violate the work of banking and other financial programs, to get personal data from them, cross these data to intruders
  • Multiply through email, local network, Internet network, hard drives, flash media, any information carriers, through infected files, P2P customers, online Games, instant messaging services (ICQ, MSN, Yahoo!), VoIP program (Skype), etc.
  • Download new viruses, turning a computer into a seatingman for viruses
  • Significantly slow down the operation of the operating system and programs
  • Disabling the operating system, programs

Problems from viruses can be the most diverse: some can be eliminated, some - no. Almost all of these difficulties can be avoided, or at least minimize the likelihood of their appearance. To do this, it is enough to have a working antivirus in the system with relevant bases.

Alexey Gavrilenko

Reprint materials are allowed only with an active reference to the original article.

The first computer viruses appeared immediately after creating computers. Programmers wrote them just for the sake of fun, such viruses did not apply any harm. But modern computer viruses are created with completely different purposes and are of serious danger. What are viruses exist and how to deal with them?

All existing malware can be divided into two categories: viruses and Trojans. The first simply perform on an infected computer some negative for the user or comic action for example, can erase files or fully format the hard drive, turn off the computer, to make an inaccessible mouse to the user, display some message, etc.

As a rule, the creators of viruses do not pursue mercenary purposes, most often such programs are written simply for entertainment. But there are exceptions - for example, viruses that block the work of Windows.

The user sees a message in which he is invited to list some amount of money to a specific account, after which it will be sent to the unlock code.

Having met such a virus, you should remember the features of the message in particular, the account number or phone (if it is proposed to replenish the balance of the phone), then go from another computer to the sites of antivirus companies and search the corresponding unlock driver. But even if it is not possible to remove the virus, the worst consequences of it - formatting hard disk PC.

Trojan programs are the greatest danger

This variety of malware is created to the agency of human confidential data. If the work of the virus on the computer is usually well noticeable, the Trojan program tries to completely hide its presence. Her task is to collect necessary information For example, logins, passwords, bank card data or online banking, etc., after which it is imperceptible to pass all the Trojan owner.

Quality Trojan programs are written with highly qualified programmers and can cost thousands of dollars. A well-made Troyan is absolutely invisible, it cannot be detected by any antivirus program until the data on the Trojan fall into anti-virus bases.

Modern spyware Easy bypass and firewalls. Having done its black case, many Troyans self-suite, without leaving any traces after themselves. That your computer was infected with the Trojan, you can only find out after you have money with bank card, or will be hacked mailboxes, Administs belonging to you sites, etc.

Backdors

There is also such a class of viruses as backdors. Infecting your computer, the virus creates a loophole in it, through which the hacker gets full access To the car. It can view and copy information from the disks, to delete or add something. Hacker can use your computer to scan networks and hacking other computers to implement attacks to servers. The management of thousands of hacked computers can be carried out from one center, in this case it is formed a botnet - a network of infected computers subject to one person.

Viruses and Trojan programs are of great danger, so they are struggling with them all possible methods. The main problem is that the principles of construction and work of the most common operating room windows systems provide hackers a lot of opportunities for creating and implementing malware.

OS developers are trying to close the bars, but they still remain too much. Much more secure in this regard is operating system Linux is not by chance Many hackers use it.

In any case, to protect against viruses and trojans on a computer, an actual antivirus and firewall must be standing. It should also be followed by elementary safety rules - in particular, do not download and not open suspicious files.