Computer Germs-viruses-spoils the Digital Data

By: Sam

Computer viruses are just like germs whose only purpose is to spoil computer's normal functionality. They come to computer territory by different ways like by any removable media, or if the computer is connected through any network, by internet and by e-mail.

These viruses are block of some instructions that enters in to the system without the permission of the computer user.

Different types of computer viruses exists are

Macro viruses

Companion viruses

Link viruses

Parasitic viruses

Multi-partite viruses

The first ever virus that was developed by two brothers, Basit and Amjad Farooq Alvi in 1986 and it was named Boot sector virus. When network concept was not widely spread viruses are usually spread by the removable mediums like through floppy diskette and flash drives etc. But nowadays most of the organizations are interconnected through some network that provides an easy path for the viruses to make number of victims just in one go.

So it always suggested after installing any Operating system to the computer anti virus program should be installed just after it. Because it will be working as defensive wall against any virus and will not let it to get inside and to harm any of your data file or operating system. Anti virus detects all the incoming viruses coming to your system from any device and will provide you the facility to scan it before copying any thing from it to your hard disk.

Precautionary Measures:

In order to get rid of these computer germs some precautionary measures has to be taken to have safe data; not affected by any computer viruses. Like

Always scan removable medium for viruses

Don't open E-mail by unknown sender

Don't download attachment which are not familiar

Use firewall programs

Install updated Anti-Virus programs

Regular backups of data

Secure network connection

Scanning of hard drive on daily basis

Careful while downloading any software from the internet

Security
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 

» More on Security