Translate

Showing posts with label Anti-virus Protection. Show all posts
Showing posts with label Anti-virus Protection. Show all posts

Everything about Computer Viruses and Data Theft

Everything about Computer Viruses and Data Theft

-Dr. Lalit Kumar Setia*
The computers are usually affected from Viruses and the motive behind spreading viruses in the network is to steal information. When a human being suffered from a disease, that disease affects the organism and produces disorders in human’s functions. The study of disease is called pathology which studies the cause of disease. Each disease has its symptoms including disorders in the life-style of affected person. A computer virus is a software program designed to perform malicious actions, self-replicate itself on other files available in the storage of computer. Like bio-logical virus which cannot reproduce without a host cell, the computer viruses also cannot reproduce and spread without programming such as a file or document.
A computer virus infiltrates the security mechanisms of computer system i.e. firewall, functioning of anti-virus and anti-malware; infects the host computer and performs the tasks programmed in its coding. The computer virus sits inside the computer in form of a code and attacks various processes of computer. The computer virus is mostly coded in the form of a program or script or macro and designed to cause damage either by stealing information or modifying data or sending e-mails. The file containing virus is whenever executed, it starts spreading itself by copying into and over data files. Even the boot-sectors are infected with the viruses. Some viruses start displaying messages to the users and some reduces the speed of computer, while some start erasing files in the background and even prompt to reformat the hard-drive.

How a computer virus is created?

The interesting point is how a computer virus is created? The computer virus is written in notepad with the help of various commands capable to disrupt the normal functions of a computer. Elk Cloner was the first computer virus written by Rich Skrenta in 1982. In the file, the commands can be written to delete the primary files of windows through which the computer’s operating system run. In case, there is anti-virus installed on the computer, that will restrict the file to be run but in case, there is no anti-virus, the program can easily make the computer affected badly. Such files can also be viral through email attachments.

However, once a virus such as ransomware entered into a computer or laptop or smartphone, it starts to hijeck the primary root directory from where the device works. It makes the commands non-functional and also restrict anti virus to work properly. It locks the computer by stopping aceess from keyboard and mouse. Then it encrypts the content of the storage devices with putting restrictions to open and view the contents. 
Recently, the wanna cry virus infected the computers around the world with demanding significant amount to pay within 72-hours in form of Bitcoins. In case, the amount was not paid, the demand was further increased. 

Stay Updated - Stay Protected - Keep Privacy 
*Copyright © 2017 Dr. Lalit Kumar.

Auto_1

Horizontal Responsive1

Popular Posts

LoP_1

Special Offer!

Funny Baba

Free Seminars

Featured post

Dr. Lalit Setia CV

Free Notes

Tips to Grow

Earn Money

Popular Posts

Free Download

Tax Saving

Fun in Life

Labels

Professional Guidance Government Income Tax Tax Deduction at Source General Knowledge Important Questions Income Tax TDS Accounting Deduction Governance Haryana Income Tax Return Latest Questions Competitive Examination Current Affairs Drawing and Disbursing Officer Audit Auditing Covid Financial Financial Management Financial Terminology Goods and Services Tax India Knowledge Lalit Kumar Lalit Kumar Setia Money Skills Tax Planning Virus Accounts Attitude Banking Compliance Currency Economic Problem Employee Facts Free Notes Functions GST Government Accounting Government eMarketplace Incomes Information Interest Omicron Virus Organization Payment Science Scientific Causes Section 80C TDS on GST Tips Tricks Very Important Questions answers Administration Advance Tax Anti-Virus Automatic Back Up Balance Sheet Bitcoin Certificate of TDS Computer Control Corruption Creativity Cryptocurrency DDOs Deductions Deductor Deductors Development Dr. Lalit Kumar Duties EPS Economy Employer English Evaluation Example Expenditure FAQs Finance Financial Accounting Financial Administration Financial Control Frustration GeM General Studies Geography Google HRA Information Technology Investment Life Management Meditation Omicron Performance Planning Positivity Process Procurement Public Public Administration Public Services Purchase Matters Questions on General Studies Resources Resume Saving Services Stress Success System Tax Collection Taxable income Technique Technology Tender Training Trust 26AS 80GG 80GGC AIS Statement ATM Abatement Abbreviations About Dr. Lalit Setia Accountant's Duties Accounting Heads Accounting Standards Accounts Branch Accrual Accumulated Fund Act Action Administrative Admissibility of DA Advance Allowance Almighty Amalgamation Amazon Amount Amrapali Group Android Annual General Meeting Annual Information Statement Anomaly Anti-Corruption Anti-virus Protection Antonyms Appraisal Appreciation Arbitrator Arrears Articles of Association Asset Auctio Audit concerns in procurement Automated Teller Machine Automatic Teller Machine Autorised Capital Average Award Bad Debts Balance of Payments Bankrupt Barter Benchmark Bhagat Prahlad Bid Bikaner Bio-Data Bitcoins Bitcoins Network Block Chain Blood Breathing Bribe Buddha Budget C M Window CV Canada Cards Caring Nature Cash Book Cash Flows Central Bank Chapter Character China Clerks Commitment Common Man Communication Communization Competitive Examinations Computation Computer Virus Computerization Conflict Contacts Contribution of Employees Corona Crime Crude Oil Culture Curriculum Vitae Custody Cyber Cybercrime Data Dearness Allowance Debit and Credit Decision Making Deduction under section 80GG Delay in Service Delhi Department Dera Sacha Sauda Desktop Devices Digital Transformation Double Click Double Entry System Dr. Lalit Setia EPF Earnest Money Deposit Earning Money Economic Growth Electronic Payment System Employment Energy Solutions Environment Evasion Examination Exempt Exemption Exemptions Expenditures Experience Exploitation Facebook Failure Festivals Final Accounts Financial Rules Financial Statements Formula Frauds Games General Generation Gap Goals Google search bar Government Deductor Government Officers Grades of Employees Gurmeet Ram Rahim Singh HRMS HUF Harish Chandra Higher Education Hindu Undivided Family History Home Loan House Building Advance House Property House Rent Allowance How to stay protected Human Resource Management System Humanity IAS Officers IT Skills ITR Importance Income Statement Income Tax Changes Income Tax Refund Income and Expenditure Account Income from Gifts Indirect Cost Innovation Internet Interpersonal Interpretation Inventory Inventory Management Investigation Investments Irregularities Jiomeet App Jokes Kids Labour Laptop Laundering Leadership Leadership Tussle Learn Learn English Learn Excel Shortcuts Learning Ledger Ledgers Liquidity Logical Lokpal Lost Crypto currencies Love MS-Office MS-Word Maldives Mankind Mask Material Mathematics Matters Meaning Measurement Equipment Meerabai Messages Methods Minimum Income Scheme Misuse Mitigation Mobile Monitor Monitoring Morality Motivation Mumbai Lockdown NPS National Highways National Pension National Pension System Nationwide Payment News Non Performing Assets Non-performance Official Life One Liner Questions Outstanding PAN number Pakistan Parents tips Pebbles Penalty Pension Per Day DA Petroleum Phonebook Practices Prevention Prices Prime Minister Private Gain Probability Problem Procedure Protection Publica Publishing Purchase Question Quotation Quotes Rational Decisions Rebate Reforms Register Registration Relationship Rent Paid Reporting Research Retirement Robert Vadra SAP SWOT Analysis Saint Ravi Dass Salaries Saudi Arabia Scam Scientific Searching emails Section 234 (a) Section 234 (b) Section 234 (c) Section 87A Security Security of Bitcoins Self Growth Shortcut Smashwords Social Activists Software Space Speculation Spyware Standard Deduction Standard Deduction on Salaries Standards Statistics Story on Husband and Wife Study Material Sugamya Pustakalaya Superintendent Symbols Symptoms of Omicron Synonyms TA Rules TAN TDS Payment Talent Search Tax Credit Taxation Taxpayers Techniques for fast and efficient work Thought Tips for Students Toddlers Tools of Rulers Tourism Trial Balance Type UCP Uncertainty Unemployment Uniformity Unique Code of Payee United States of America Users Using Asterisk Using Quotes Using Site Using minus Utilization Utilization Certificate Vigilance Bureau Whatsapp Working Capital e-Payments e-filing eMarketplace eProcurement financial procedures gmail immunity innovative solutions pandemic records management red-handed speed vaccine बैंकिग मापने वाले यंत्र राष्ट्रीय राजमार्ग

Happy Moments

Learn and Update

Popular Posts

Auto_1

Horizontal Responsive1