Are you interested to know what is computer virus? Everyone knows how to use computer and those who use computer must have heard the name of virus.
Virus (Virus in Hindi), this name is a very familiar name in the world of Internet. Along with this, it is also a very scary name because it is very harmful for your computer and other electronic gadgets. That is, if once it enters inside the system, then it can spoil it as well as destroy your data.
Just like Virus is not good for our health and they spread many diseases in our body, in the same way these Viruses also cause many damages in the computer system. That’s why it is good for all computer users to have information about them.
Many people will know something or the other about Computer Virus in Hindi, what it is and what it does. But there are many people who must have heard the name of the virus, but they would not know what viruses can do in your computer.
So today in this article I am going to tell you about what is a virus and how to eliminate the virus. Hope you will get to know a lot by reading this article.
What is computer virus – What is Computer Virus
Computer Virus is a small software program designed to damage or destroy your computer’s operation and computer data.
Computer virus without our knowledge can spoil the system in such a way that it is not in our control to fix it. The computer runs only with many software programs, without any program the computer cannot work.
Software programs are made to make the computer work properly and some programs are also made to spoil the work of the computer.
Computer was invented by man, its program was made by man to run the computer and as I said virus is also a small program, it was also made by man. Computer virus is not natural, it is not made by itself, programmers also make it deliberately so that they can spoil other computers.
Or we can also say that Viruses are actually computer programs which are destructive instead of productive. Its basic purpose is to cause damage instead of helping.
history of computer virus
Robert Thomas, he was the first engineer who developed the first computer virus in 1971 while working at BBN Technologies.
This first virus was named “Creeper” virus, and it was an experimental program that Thomas himself had done to infect the mainframes of ARPANET. After infecting this Virus system, it used to display the following message on the screen, “I’m the creeper: Catch me if you can.”
The original wild computer virus that was first tracked in the history of computer viruses was “Elk Cloner.” This Elk Cloner had earlier infected Apple II operating systems, that too through floppy disks. This virus was developed by Richard Skrenta in 1982, who was a teenager at that time.
It is believed that computer viruses were designed as a prank, but it shows that if a malicious program is installed in the computer’s memory, then it can do many things that prevent the user from running the system. Can stop further and they will not have any control over these malicious programs. ,
The first person to name these Malicious Programs as “Computer Virus” was Fred Cohen, who named it in 1983. This name came to the fore when he named these programs in one of his academic paper titled “Computer Viruses – Theory and Experiments” where he wrote complete information about these malicious programs like how it works, what it is Can do etc.
What can computer viruses do?
Computer virus can corrupt or delete the data present in the computer. You can completely eliminate the data stored in your hard disk. Computer virus spoils their computers by going to other computers also through e-mail attachments.
Virus slows down the speed of your computer. It destroys your files and programs.
What is Malware – What is Malware
The full name of Malware is malicious software. This is also a software program that harms computers. Malicious software means bad software which is not good at all and once it enters your system, it can completely spoil your system.
Malware is also the name of a virus which slowly starts destroying the data of your system.
From where does Malware come in our computer? Malware can come from many places in our system and the most commonly used common source in today’s day is internet.
Everyday we get some information on the Internet. If we went to any malicious site to get the same information or downloaded pirated software, games and movies from somewhere, then malware online comes to our computer from there itself.
This was about how online malware gets into our computer, now we will know how offline malware gets into our computer.
We all use Pendrive, CDs, DVDs in our computers. When we bring Pendrive and CDs from other places and connect them to our computer, then malware comes to our computer from all these things and our computer destroy the data.
There are three types of Malware – Virus, Worms and Trojan horse. All three are different, their work is also different. All three spoil your computer in different ways. Let us know about these three what they do.
What is a virus – What is Virus in Hindi
Virus can corrupt the files and software present in your computer. Suppose there is a word document in your system in which virus has come, then it will delete the data of your document or it will corrupt that document so that you will not be able to get any information from it.
Or it may also happen that this virus can completely corrupt your word processing software. In such a situation, if you copy or share a corrupted file, then this virus goes to another computer and spoils its system as well.
type of virus
Computer virus is a type of malware that if it enters the computer’s memory, then it can multiply itself and can also change programs and applications.
Here computers get infected when these malicious codes keep on replicating themselves. Here I am going to provide you information about the types of these Computer Viruses.
boot sector virus
This type of virus infects the master boot record and it is very difficult to remove them and often the system has to be formatted to remove them. They spread mainly through removable media.
Direct Action Virus
These are also called non-resident viruses, once they are installed, they remain hidden in the computer memory. It remains attached to those specific types of files that it infects. They do not infect the user experience and system’s performance.
Like Direct action viruses, resident viruses also get installed in the computer. Apart from this, identifying them is also an equally difficult task.
This type of virus can affect the system in multiple ways. Both of these infect boot sector and executable files together.
Identifying these types of viruses is very difficult for a traditional anti-virus program, because these viruses change their signature pattern repeatedly whenever they replicate themselves.
This type of virus deletes all the files which it infects. To remove these viruses from the system, the user has to delete all the infected files which leads to data loss.
It is very difficult to identify these viruses because they are spread through emails.
Spacefiller Virus – They are also called “Cavity Viruses”. This name has been given to them because it fills all the spaces in the code, so it does not harm the files.
File infector Virus
Some file infector viruses come attached to program files, such as .com or .exe files. Some file infector viruses also infect files with .sys, .ovl, .prg, and .mnu.
In the same way, when a particular program is also loaded, the virus also gets loaded automatically. These viruses come to the users’ computer along with the email.
As the name suggests, these macro viruses mainly target macro language commands, such as in some applications such as Microsoft Word.
These macro viruses have been designed in such a way that they easily add their malicious code to genuine macro sequences.
This virus has been designed in such a way that it can destroy any file or application data by overwriting itself. Once it starts the attack, it starts overwriting its own code.
This type of virus is used more by cybercriminals. This is such a type of malware type that can easily change or mutate its underlying code and without changing any basic functions or features.
Due to this, it does not come under the grip of any anti-malware. Whenever an anti malware detects it, it modifies itself which makes it very difficult to catch it.
This virus implants itself in the memory of the computer. Basically, no need of original virus program for infection
It does not exist to infect any files or programs. Even if the original virus is deleted, a version of it is stored in the memory, which automatically gets activated.
This happens when computer OS load some applications or functions. Since it is hidden in the RAM of the system, it is often not detected by any antivirus or antimalware.
This rootkit virus is a type of malware that secretly installs an illegal rootkit in the infected system. With this it opens a door for attackers which gives them full control over the system.
With this, attackers can fundamentally modify or disable any program or function very easily. These rootkit viruses can easily bypass antivirus software. Rootkit scanner is required to catch them.
System or Boot-record Infectors Viruses
These Boot-record Infectors infect executable code which is found in specific system areas of the disk. As the name suggests, they infect more in USB thumb drives and DOS boot sector.
These boot viruses are not seen much nowadays because the current systems do not depend on much physical storage media.
What is Worms
Worms are also like virus but they multiply themselves and try to spread themselves more and more. Which means that if worms come in your system, then they start making many copies of different files, due to which the system becomes slow.
If we copy the same files and share them with another computer, then the worms will go there and make many copies of the files and slow down that computer as well.
What is Trojan Horse?
Trojan Horse is a very dangerous malware. These malware come in your computer by hiding their identity.
For example, suppose you are using the internet and you have visited a site, where you see an add like “click here to win smartphone” and you click on it, then trojan horse malware enters your computer through it. Will go and you will not even be aware of it and will spoil your system completely.
These are also present on the internet in the form of many software, you will feel that it is genuine software, but in reality it remains a trojan which remains hidden inside that software and once it comes to your computer, then it will destroy your computer. Let’s start slowing down. Along with that, they would open a door through which other types of viruses and worms enter your computer.
Signs of Virus Infection in the System
How to know whether your system is infected with Virus or not. That is why here I am going to tell about some warning signs which are very important for all computer users to know –
Slower system performance
Pop-ups coming again and again in the screen
Automatic running of programs
Files automatically multiplying/duplicating
New files and programs are automatically installed in the computer
Files, folders or programs getting automatically deleted and corrupted
strange sound coming from hard drive
If such warnings are shown in your system, then you should know that your system can be infected by virus. That’s why download a good antivirus software and scan it soon.
How to protect your system from Viruses and Worms
Here I am going to give you some such tips that will make it easier for you to avoid these viruses.
what should be done
- Always install a good Antivirus in your system and keep updating it from time to time.
- If you do not know about the sender of any email then it should not be opened.
- Do not download anything from Unauthorized Websites like MP3, Movies, Software etc.
- Get all the downloaded things scanned properly. Because there are more chances of getting virus in them.
- Use removable media like pendrive only after scanning the disks.
- If you visit any website, then you should keep one thing in mind that it should be a popular and registered website and do not click on any such link due to which you will have to face trouble later.
should should not
- Never open any email attachment if you do not have information about that sender.
- Do not try to open any unsolicited executable files, documents, spreadsheets without scanning them.
- Do not download documents or executable software from Untrusted Websites.
- The ads that lure you to click here and win the lottery, never click on such ads. Similar kind of greed comes to us in e-mails as well, so never open that mail also because there are more chances of malware in it.