94
What is a computer virus?
Computer viruses are man-made and share some of the behaviours of biological viruses. A
computer virus passes from computer to computer like a biological virus passes from person to
person. Similarities also exist at a deeper level: a biological virus is not a living thing and has
to reproduce itself by infecting cells. A computer virus must be transmitted on top of some
other program or document in order to get executed. Once running, it is then able to infect
other programs or documents.
Is my notebook virus-free?
Most viruses have strange effects on your notebook. On the other hand, many viruses are
carefully programmed to avoid betraying their presence. The solution to this dilemma is not to
assume anything, but to rely upon antivirus software as a diagnostic tool.
What are the different types of viruses?
•
Boot sector viruses
- a boot sector virus infects your notebook by replacing the boot
sector program with its own infected version. The boot sector program is the first piece of
software that is loaded when you start your notebook. It is installed on every hard disk,
floppy disk or CD. Without a boot sector, a notebook cannot run any software at all. A boot
sector virus will only be effective if you start your notebook using an infected floppy disk or
an infected bootable CD. An example of a boot sector virus is “Parity Boot”. This virus
displays the message “PARITY CHECK” and freezes the operating system.
•
Macro viruses
- a macro is an instruction that carries out program commands
automatically. Many common applications like Microsoft
®
Word and Microsoft
®
Excel make
use of these macros. Macro viruses are macros that self-replicate. If a user accesses a
document containing a viral macro, the macro virus will be executed. Any document on
that machine using the same application can then become infected. The infection process
only ends when the virus is noticed and all viral macros are eradicated.
•
Worms
- these are the most popular types of viruses. They infect your notebook through
e-mail. If you double-click on the attachment in such a mail, the virus starts sending mail
to all the entries in your e-mail program's Address Book. This creates a lot of traffic on the
Internet and slows down connection speed. A famous example is the Code Red worm,
which replicated itself over 250,000 times in approximately nine hours on July 19, 2001.
•
Trojan Horse
- this type of computer virus disguises itself as a funny program, which you
can download from the Internet. It can also present itself as an e-mail attachment. Once
the program is running the virus will for instance format your hard drive. The famous "I
Love You" virus is an example of such a virus. Trojan horses only hit a small number of
people because they are discovered quickly.
•
Hoax
- a hoax is not a typical computer virus, but it can act as one. You may have already
received an email from a friend warning you of a new virus. In most cases you are
requested to forward this e-mail to all entries in your Address Book. Most of these warnings
are a hoax and won’t do any damage to your notebook. Computers users who are unaware
of these hoaxes tend to forward such e-mail to others, thus creating a lot of traffic on the
Internet and slowing down connection speed.
What can I do to keep my notebook virus-free?
An
antivirus program
is installed on your notebook. Keep this antivirus scanner up-to-date
and running. It is capable of recognising and eliminating most kinds of viruses before they can
do any harm. These programs have a tendency to get outdated, because new viruses appear
each time. Most antivirus software enables you to download the latest virus definitions from
their websites that will recognise the newest viruses. You will also find the latest news about
viruses and hoaxes.