How does virus affect the computer

A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that flu viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document.

In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code. In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data.

How does a computer virus attack?

Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.

This means that a virus can remain dormant on your computer, without showing major signs or symptoms. However, once the virus infects your computer, the virus can infect other computers on the same network. Stealing passwords or data, logging keystrokes, corrupting files, spamming your email contacts, and even taking over your machine are just some of the devastating and irritating things a virus can do.

While some viruses can be playful in intent and effect, others can have profound and damaging effects. This includes erasing data or causing permanent damage to your hard disk. Worse yet, some viruses are designed with financial gains in mind.

How do computer viruses spread?

In a constantly connected world, you can contract a computer virus in many ways, some more obvious than others. Viruses can be spread through email and text message attachments, Internet file downloads, and social media scam links. Your mobile devices and smartphones can become infected with mobile viruses through shady app downloads. Viruses can hide disguised as attachments of socially shareable content such as funny images, greeting cards, or audio and video files.

To avoid contact with a virus, it’s important to exercise caution when surfing the web, downloading files, and opening links or attachments. To help stay safe, never download text or email attachments that you’re not expecting, or files from websites you don’t trust.

What are the signs of a computer virus?

A computer virus attack can produce a variety of symptoms. Here are some of them:

  • Frequent pop-up windows. Pop-ups might encourage you to visit unusual sites. Or they might prod you to download antivirus or other software programs.
  • Changes to your homepage. Your usual homepage may change to another website, for instance. Plus, you may be unable to reset it.
  • Mass emails being sent from your email account. A criminal may take control of your account or send emails in your name from another infected computer.
  • Frequent crashes. A virus can inflict major damage on your hard drive. This may cause your device to freeze or crash. It may also prevent your device from coming back on.
  • Unusually slow computer performance. A sudden change of processing speed could signal that your computer has a virus.
  • Unknown programs that start up when you turn on your computer. You may become aware of the unfamiliar program when you start your computer. Or you might notice it by checking your computer’s list of active applications.
  • Unusual activities like password changes. This could prevent you from logging into your computer.

How to help protect against computer viruses?

How can you help protect your devices against computer viruses? Here are some of the things you can do to help keep your computer safe.

  • Use a trusted antivirus product, such as Norton AntiVirus Basic, and keep it updated with the latest virus definitions. Norton Security Premium offers additional protection for even more devices, plus backup.
  • Avoid clicking on any pop-up advertisements.
  • Always scan your email attachments before opening them.
  • Always scan the files that you download using file sharing programs.

This type of virus can take control when you start — or boot — your computer. One way it can spread is by plugging an infected USB drive into your computer.

2. Web scripting virus

This type of virus exploits the code of web browsers and web pages. If you access such a web page, the virus can infect your computer.

3. Browser hijacker

This type of virus “hijacks” certain web browser functions, and you may be automatically directed to an unintended website.

4. Resident virus

This is a general term for any virus that inserts itself in a computer system’s memory. A resident virus can execute anytime when an operating system loads.

5. Direct action virus

This type of virus comes into action when you execute a file containing a virus. Otherwise, it remains dormant.

6. Polymorphic virus

A polymorphic virus changes its code each time an infected file is executed. It does this to evade antivirus programs.

7. File infector virus

This common virus inserts malicious code into executable files — files used to perform certain functions or operations on a system.

8. Multipartite virus

This kind of virus infects and spreads in multiple ways. It can infect both program files and system sectors.

9. Macro virus

Macro viruses are written in the same macro language used for software applications. Such viruses spread when you open an infected document, often through email attachments.

How to remove computer viruses

You can take two approaches to removing a computer virus. One is the manual do-it-yourself approach. The other is by enlisting the help of a reputable antivirus program.

Want to do it yourself? There can be a lot of variables when it comes to removing a computer virus. This process usually begins by doing a web search. You may be asked to perform a long list of steps. You’ll need time and probably some expertise to complete the process.

If you prefer a simpler approach, you can usually remove a computer virus by using an antivirus software program. For instance, Norton AntiVirus Basic can remove many infections that are on your computer. The product can also help protect you from future threats.

Separately, Norton also offers a free, three-step virus clean-up plan. Here’s how it works.

  1. Run a free Norton Security Scan to check for viruses and malware on your devices. Note: It does not run on Mac OS.
  2. Use Norton Power Eraser’s free virus and malware removal tool to destroy existing viruses. Need help? A Norton tech can assist by remotely accessing your computer to track down and eliminate most viruses.
  3. Install up-to-date security software to help prevent future malware and virus threats.

The possibility of one person encountering some kind of computer virus is high, especially with billions of people using technology every single day, be it for personal or work purposes.

Computer viruses are comparable to biological viruses because they can spread relatively quickly. Knowing how they spread is the first step to preventing your device from getting infected.


There are different types of computer viruses; some are common while others are not. Computer viruses are created to alter one’s computer and spread from one to another.

Phishing Emails

No matter what emailing service you are using, you are bound to receive countless promotional emails in your inbox, especially if you unconsciously subscribe to various advertisements, you see online.

Such emails tend to carry a string of malicious attachments and links, and when you unsuspectingly open these things, they can infect your computer system, causing it to malfunction and possibly lose data and/or money.

Remember that hackers can mask malicious things into images or good call-to-action texts or buttons, prompting you to click on them without second thoughts.

Online Downloads

Anything you download over the internet can contain a virus. May it be a document, free software trials, applications, or even free virus protection software. Once you install these files, a computer virus can spread like wildfire, wreaking havoc on your system.

Another easy target for hackers is illegal downloads, such as movies, games, or music that even a good anti-virus won’t be able to prevent from spreading.

Social Media

Social media is the latest tactic in spreading computer viruses. There are numerous instances of hacks from social networking websites such as Facebook. Links are shared everywhere on these platforms, so be cautious when clicking on videos, images, or links.

Know when to spot illegitimate news sites, suspicious videos, or images on social media to avoid being a victim.

How does virus affect the computer

Most Harmful Types of Computer Viruses

Cybercriminals use scheming tools and techniques to evade security firewalls and manipulate users into giving up sensitive information. These criminals are always looking for new ways to breach a system to steal data or money.

Getting infected by a computer virus can happen to all of us. Often, they are easy to treat, but in some cases, it can be a complete disaster turning devices into a mess.

To give you a brief background, here are four of the most dangerous computer viruses of all time and how they affect businesses.

ILOVEYOU

This virus caused a total of $10 billion of damage, infecting almost 10% of computers around the world. This virus was transmitted via email containing a subject line of “ILOVEYOU” that makes it hard for a user to ignore.

The email also contained an attachment with a filename: Love-Letter-For-You.TXT.vbs. Once the file is opened, this virus automatically emails itself to the first 50 contacts available in the address book, causing it to spread rapidly.

Melissa

This is another virus that spreads in the form of an email attachment: “List.doc.” Similar to the ILOVEYOU virus, once the file is opened, it will email itself to the first 50 contacts with a message: “Here is that document you asked for…do not show anyone else.”

My Doom

My Doom infected around two million PCs, hitting the malware world back in 2004. My Doom spread exponentially through email with random email addresses of senders and subject lines.

The email receiver would be tricked into considering the message as bounced because it reads: Mail Transaction Failed. But as soon as the user clicks on the message, this email worm will send itself to email addresses and copy itself to any P2P program’s folder to circulate through the network.

Code Red

Code Red took advantage of the Microsoft IIS web server as it spread on these servers in 2001. This virus doesn’t need a user to open an email attachment or execute a file since it only requires an active internet connection.

Once the device is infected, it made hundreds of copies of itself, eating up system resources. One memorable symptom of this virus was that it leaves behind a message, “Hacked by Chinese!” on infected web pages.

This virus was estimated to cause $2 billion in lost productivity by infecting one million PCs.

Conclusion

Computer viruses exist, and as individuals whose work relies on a computer, being on guard is essential.

If you’re alerted to the presence of a computer virus, removing it immediately is the best course of action. The longer it stays on your system, the more damage it can do.

For the best solutions to these types of threats, contact our team at Uniserve today!