fakemenubar

Pages With Links To Websites
Amusement Parks
Automotive
Aviation
Banking
Boating
Canadian Government Programs
And Services
Careers
Comic Strips
Computer Manufacturers
Cooking & Recipes
Couriers
Deaf & Sign Language Resources
Online Dictionarys
Online Encyclopedias
And Other Useless Information
Education
Entertainment
Free Downloads
Hydroponics Gardening
Health
World History
Hobbies
Home Improvement
Jokes
Knitting & Crocheting Patterns
Linux
Manufacturers
Newspapers & Magazines & TV Stations
Programming
Science
Shopping
Solar Power
Sports
Survival Gear List
Technology Information &
Online Tech Support
Travel
Truck Drivers Online Resources
TV & Book Series Homepages

Home
redline

What exactly is a computer virus?

The easiest way to understand computer viruses is to compare them to a biological virus which
gets into your system and makes you ill. These micro-organisms establish themselves in host cells of the human body and falsify the cell information so that they begin to produce the virus too.
The same basic principle applies to computer viruses:
There are the boot record viruses which generally infect the boot or master boot record of hard
disks or the boot record of floppy disks. The boot or master boot record contains all the essential information for the boot routine, and can be modified by a virus. Unless, of course, the virus is detected ...
Then there are the file viruses, which can attach themselves to a host file and modify the program size of executable files. Unless, of course, the virus is detected ...
Another type is that of macro viruses, which combine a series of commands into a single complex. Macro viruses tend to anchor themselves in document templates that way they can spread rapidly to all documents derived from the template. Unless, of course, the virus is detected ...
Many viruses also have a program component in addition to their reproductive component, which triggers reactions according to certain criteria, e.g. a certain date, a certain day of the week, special keyboard inputs, etc. As a rule, the virus remains unnoticed until the trigger criterion is fulfilled and the intruder begins executing its actions, which may or may not be amusing. For example, you may see an ambulance driving across your screen or find your letters falling like autumn leaves or be confronted with the message "Donald Duck is a lie!". In other cases, your file may be deleted or the data of your hard disk encrypted. This is less amusing.

Here are links to some good free Anti-virus software

AntiVir® Personal Edition for Windows
AVG Anti-Virus Software

Here are links to good pay for Anti-virus software

Norton's Anti-virus software
McAfee's Anti-virus software
AVG Anti-Virus Software

Here are links to good online Anti-virus scanners

Trend Micro HouseCall
Kaspersky Online Scanner