Self-copying computer pest - what is itis and what is the mechanism of its operation? How are they even created and who creates them? What kinds exist and what makes a particular appearance? Now you will find out what a self-copying computer pest is. The answer is divided into 6 parts. Not only the classification, but also the methods of disposal and safety techniques are considered, so that they will never find out about them in practice.
Initially, it is necessary to determine theterminology. A self-copying computer pest is the full name of a computer virus. These are programs that increase their number independently, reducing the amount of available memory for the user and simultaneously performing sabotaging activities. Sabotage can be both relatively harmless (take a portion of RAM for copying), and have significant consequences (until the computer goes down).
One of their features is that theycan not only spontaneously copy themselves, but also introduce their code into other programs. However, in view of the fact that for a full-fledged functioning of the viruses a fairly large segment of the code is necessary, the target programs should also be rather big. They got their name "viruses" because of their similarity with biological viruses. In addition, models over the past few years have been able to carry out self-adaptation, which further increases the similarity. A self-copying computer pest is the answer to many of the problems that arise with the computer and will occur until the virus is removed.
The first Brain virus,a massive attack, was developed in 1986. And already for 1987-1988 there were peaks of his popularity. There were viruses before him, including in the Soviet Union, but their actions did not acquire such a scale. Since then, the number of viruses has increased steadily, and today they number more than 7 million.
Various people have developed many viruses that are classified based on their actions. There are 3 types:
Very often between the words "virus" and "maliciousprogram "put a sign of equality. Is it really so? No. The point is that Trojans and spyware are included in the concept of malware, in addition to viruses. And the very concept of "malware" is more widespread - so, they are all software that is used to gain unauthorized access to a computer with criminal intent. In addition, a self-copying computer pest is software that can be embedded in other programs, while Trojans and spies do not have this capability.
The simplest and most popular method isto resort to the help of an antivirus (and to guarantee the destruction of a spy, even an antispyware). But there are separate programs that register themselves in the registers of the operating system, and only professionals can cope with them. If you decide that you should carry a computer for repair, then it is premature: on large computer forums there are help departments for problems with the computer, contact there for help and you will be consulted how to find the virus and how to remove it.
The best problem is the one that does not arise. And for this you must be careful:
Now that you know that there is such aprogram as a self-copying computer pest that it promises with a frivolous attitude, you can be more attentive and careful. This reduces your chances of meeting with them and learning from your own experience what they are.