{"id":1030,"date":"2022-04-22T10:34:00","date_gmt":"2022-04-22T08:34:00","guid":{"rendered":"https:\/\/support.centreforelites.com\/computer-virus\/"},"modified":"2023-07-17T13:35:18","modified_gmt":"2023-07-17T11:35:18","slug":"computer-virus","status":"publish","type":"post","link":"https:\/\/support.centreforelites.com\/en\/computer-virus\/","title":{"rendered":"Computer Virus. All you Need to Know"},"content":{"rendered":"\n<p class=\"has-text-align-left\">&nbsp;The world of computers and Information Technology is going through an era of electronic terrorism, in the form of virus. It is a problem that is potentially so dangerous that it threatens the proper functioning of the computer system in today&#8217;s information age.<\/p>\n\n\n\n<div>\n<p style=\"line-height: 94%; margin-bottom: 3pt;\"><span style=\"text-indent: 19pt;\">In this article, we would discuss the evolution of the virus, the menace caused by them, the process of infection, the classification of viruses, the types of viruses, the prevention and the cure against them.<\/span><\/p>\n<p style=\"margin-bottom: 12pt; text-indent: 19pt;\">&nbsp;<\/p>\n<p style=\"margin-bottom: 12pt; text-indent: 19pt;\">&nbsp;<\/p>\n<figure><a style=\"margin-left: 1em; margin-right: 1em;\" href=\"https:\/\/i0.wp.com\/wallpaperaccess.com\/full\/2196462.jpg?ssl=1\"><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" title=\"Computer Virus\" src=\"https:\/\/i0.wp.com\/wallpaperaccess.com\/full\/2196462.jpg?resize=640%2C478&#038;ssl=1\" alt=\"Computer Virus\" width=\"640\" height=\"478\" border=\"0\" data-original-height=\"598\" data-original-width=\"800\"><\/a><\/figure><div style=\"clear: both; text-align: center;\"><\/div>\n<p>&nbsp;<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_81 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69d64bdba1a98\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69d64bdba1a98\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/support.centreforelites.com\/en\/computer-virus\/#The_Evolution_of_Virus\" >The Evolution of Virus<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/support.centreforelites.com\/en\/computer-virus\/#The_Menace\" >The Menace<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/support.centreforelites.com\/en\/computer-virus\/#Worms_have_been_known_to_damage_and_infect_entire_LANs\" >Worms have been known to damage and infect entire LANs.<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/support.centreforelites.com\/en\/computer-virus\/#The_Process_of_Infection\" >The Process of Infection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/support.centreforelites.com\/en\/computer-virus\/#Classification_of_Viruses\" >Classification of Viruses<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/support.centreforelites.com\/en\/computer-virus\/#BOOT_Infectors\" >BOOT Infectors<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/support.centreforelites.com\/en\/computer-virus\/#_SYSTEM_Infectors\" >&nbsp;SYSTEM Infectors<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/support.centreforelites.com\/en\/computer-virus\/#_GENERALCOM_or_EXE_Infectors\" >&nbsp;&nbsp;GENERAL.COM or EXE Infectors<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 style=\"break-after: avoid; margin: 0cm 0cm 7pt; text-align: left; text-indent: 0cm;\"><span class=\"ez-toc-section\" id=\"The_Evolution_of_Virus\"><\/span><span style=\"mso-bookmark: bookmark1267;\"><span style=\"mso-bookmark: bookmark1265;\"><span style=\"mso-bookmark: bookmark1264;\"><span style=\"color: black;\">The Evolution of Virus<\/span><\/span><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"break-after: avoid; margin: 0cm 0cm 7.0pt 0cm; mso-list: l5 level1 lfo2; mso-pagination: lines-together; page-break-after: avoid; tab-stops: 29.95pt; text-indent: 0cm;\">&nbsp;<\/p>\n<p style=\"margin-bottom: 3pt; text-align: justify;\"><span style=\"color: black;\">The concept of virus dates back to 1949, when John Von Neumann submitted a paper putting forward the concept of a &#8220;Self Replicating&#8221; program; the idea seemed impossible and was dropped. Subsequently, the first virus like program appeared in the form of a recreational game called &#8220;CODE-WARS&#8221; at the Bell Labs of American Telephone and Telegraph Company.&nbsp;<\/span><\/p>\n<p style=\"margin-bottom: 3pt; text-align: justify;\"><span style=\"color: black;\">In &#8220;Code-wars&#8221; two players were to code a set of programs that would destroy the other players programs. Realizing the potential danger of such programs, the authors did not reveal the presence of such programs. Concurrently, at Massachusetts Institute of Technology, students were carrying out experiments with computer, which no body had ever tried. Their relatively harmless hobby of messing up with programs gave rise to the idea and concept of computer viruses.<\/span><\/p>\n<p style=\"margin-bottom: 5pt; text-align: justify; text-indent: 16pt;\"><span style=\"color: black;\">The first commercial application of viruses was in 1985, when two Pakistani brothers, in order to keep track of software piracy used Brain Virus (also known as Pakistani virus) on their low cost software sold from their outlet in Lahore. Hidden in nearly every disk they sold, was an extra program not supplied by the original manufacturer, a snippet of computer code, self-replicating in nature that would infect an unauthorized user&#8217;s computer by disrupting his operations. These self-replicating programs multiplied so fast that, today, they are a threat to the smooth operation of a computer.<\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\n\n\n<p>Ensuring data security on PCs and LANs is a major problem. Unless organizations create security awareness in its work force, any measures for data security are not likely to prove successful. In this article, the major approaches to cryptography have been illustrated. These range from Caesar Cipher to RSA-129.<\/p>\n\n\n\n<div>\n<h2 style=\"line-height: 87%; margin: 0cm; text-align: left; text-indent: 0cm;\"><span class=\"ez-toc-section\" id=\"The_Menace\"><\/span><span style=\"color: black; font-size: 13pt; line-height: 87%;\">The Menace<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"line-height: 87%; margin-bottom: .0001pt; margin: 0cm; mso-list: l1 level1 lfo5; tab-stops: 35.0pt; text-indent: 0cm;\"><a name=\"bookmark1273\"><\/a><\/p>\n<p style=\"line-height: 107%; margin-bottom: 0cm;\"><span style=\"color: black;\">The virus, whether biological or electronic is an information disorder. Biological viruses are tiny genetic codes DNA or RNA that take over the machinery of a living cell and are capable of making thousands of replicas of the original virus. Like its biological counterpart, virus carries in it an instructional code that makes copies of itself.<\/span><\/p>\n<p style=\"line-height: 107%; margin-bottom: 0cm;\"><span style=\"text-indent: 12pt;\">Lodged in a host computer, the typical virus takes temporary control of the computer disk operating system. When the infected system comes in contact with an uninfected computer, the virus passes onto the uninfected machine and, thus spreads like a forest fire, infecting machines after machine with which it comes in contact.<\/span><\/p>\n<p style=\"line-height: 107%; margin-bottom: 0cm;\"><span style=\"text-indent: 12pt;\"><span style=\"color: black;\"><b>Computer viruses<\/b><\/span><\/span><span style=\"color: black; text-indent: 12pt;\"><b> <\/b>are computer programs<u>,<\/u> which are a collection of coded instructions. The basic difference between a normal program and a virus is that viruses are self-replicating, they have the capability of executing themselves without being asked for. Computer virus is a very broad term in itself and includes not only viruses, but also Worms and Trojans.<\/span><\/p>\n<p style=\"line-height: 107%; margin-bottom: 0cm;\"><a style=\"text-indent: 12pt;\" href=\"https:\/\/www.webroot.com\/us\/en\/resources\/tips-articles\/what-is-trojan-virus\" target=\"_blank\" rel=\"noopener\">Trojans<\/a><span style=\"text-indent: 12pt;\"> are similar to viruses. They move around as valid programs, sometimes getting executed with flashy opening screens describing them as&nbsp; &#8220;Word Process&#8221; or a &#8220;Database Package&#8221;. Trojans are programs that claim to do something but do something completely different and in the process damage information stored on a computer system. Trojans do not infect other software.<\/span><\/p>\n<p style=\"line-height: 107%; margin-bottom: 0cm;\"><span style=\"text-indent: 7pt;\">Worms travel longer distances by storing themselves in <a href=\"https:\/\/www.definitions.net\/definition\/critta\" target=\"_blank\" rel=\"noopener\">crittas<\/a> of the disc from where they get loaded and have with them sufficient code to transfer themselves outward from the system they infect.<\/span><\/p>\n<p style=\"margin: 0cm 0cm 0cm 8.0pt; text-indent: 7pt;\">&nbsp;<\/p>\n<h2 style=\"margin-bottom: 0cm; text-align: left;\"><span class=\"ez-toc-section\" id=\"Worms_have_been_known_to_damage_and_infect_entire_LANs\"><\/span><span style=\"color: black;\">Worms have been known to damage and infect entire LANs.<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"margin-bottom: 0cm;\">&nbsp;<\/p>\n<p style=\"margin-bottom: 0cm; text-indent: 15pt;\"><span style=\"color: black;\">Apart from self-replication, another devastation caused by viruses is data loss. A virus can also take steps to avoid its detection. That makes viruses even more dangerous, because you may come to know about the infection when it has struck. Even though all viruses are developed with a specific characteristic, most of them result in data-loss. Most viruses are designed to perform simple feats but in order to do so, they:<\/span><\/p>\n<p style=\"line-height: 94%; margin-bottom: .0001pt; margin: 0cm; mso-list: l3 level1 lfo1; tab-stops: 36.85pt; text-align: justify; text-indent: 26pt;\"><a name=\"bookmark1274\"><\/a><!-- [if !supportLists]--><span style=\"color: black; font-size: 12pt; line-height: 94%;\"><span style=\"mso-list: Ignore;\">\u2022<span style=\"font: 7pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp; <\/span><\/span><\/span><!--[endif]--><span style=\"color: black;\">Corrupt the most sensitive area of the disk; the File Allocation Table (FAT) or the directory area.<\/span><\/p>\n<p style=\"line-height: 94%; margin-bottom: .0001pt; margin: 0cm; mso-list: l3 level1 lfo1; tab-stops: 36.85pt; text-align: justify; text-indent: 26pt;\"><a name=\"bookmark1275\"><\/a><!-- [if !supportLists]--><span style=\"color: black; font-size: 12pt; line-height: 94%;\"><span style=\"mso-list: Ignore;\">\u2022<span style=\"font: 7pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp; <\/span><\/span><\/span><!--[endif]--><span style=\"color: black;\">Modify the interrupt organization of the system, meaning when a read or write to screen operation takes&nbsp;<\/span><span style=\"text-indent: 3pt;\">place, it is routed through the virus code in the memory resulting in unresolvable interrupt clashes where a program opens up a file simultaneously for read -write access and the virus interrupts every operation.<\/span><\/p>\n<p style=\"margin: 0cm 0cm 0cm 52.0pt; text-indent: 3pt;\">&nbsp;<\/p>\n<p style=\"line-height: 94%; margin-bottom: 0cm; tab-stops: 69.1pt; text-indent: 30pt;\"><span style=\"color: black; font-size: 12pt; line-height: 94%;\">\u2022<span style=\"mso-tab-count: 1;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><span style=\"color: black;\">Even though the virus may have no instructions built into it to destroy data, it can&nbsp;<\/span><span style=\"color: black; text-indent: 30pt;\">nevertheless&nbsp;<\/span><span style=\"text-indent: 30pt;\">render a disk full of files absolutely useless.<\/span><\/p>\n<p style=\"margin: 0cm 0cm 16.0pt 52.0pt;\">&nbsp;<\/p>\n<h2 style=\"line-height: 87%; margin: 0cm; text-align: left; text-indent: 0cm;\"><span class=\"ez-toc-section\" id=\"The_Process_of_Infection\"><\/span><span style=\"color: black; font-size: 13pt; line-height: 87%;\">The Process of Infection<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div>\n<figure><a style=\"margin-left: 1em; margin-right: 1em;\" href=\"https:\/\/i0.wp.com\/enterprise.comodo.com\/images\/malware-infection.webp?ssl=1\"><img data-recalc-dims=\"1\" decoding=\"async\" title=\"The Process of Infection\" src=\"https:\/\/i0.wp.com\/enterprise.comodo.com\/images\/malware-infection.webp?ssl=1\" alt=\"Computer Virus\" border=\"0\" data-original-height=\"401\" data-original-width=\"550\"><\/a><\/figure><div style=\"clear: both; text-align: center;\"><\/div>\n<p><span style=\"color: black; font-size: 13pt; line-height: 87%;\">&nbsp;<\/span><\/p>\n<\/div>\n<p style=\"line-height: 87%; margin-bottom: .0001pt; margin: 0cm; mso-list: l1 level1 lfo5; tab-stops: 35.0pt; text-indent: 0cm;\"><a name=\"bookmark1276\"><\/a><\/p>\n<p style=\"margin-bottom: 3pt; text-align: justify; text-indent: 7pt;\"><span style=\"color: black;\">To understand how a virus infects a system, we go back to the elementary working of a computer. On booting, the system carries out the ROM instructions, the first being the Power On Self Test (POST), which is followed by the bootstrap process of reading the boot record and loading of the disk operating system. In MS-DOS, it involves the loading of<\/span><a href=\"http:\/\/ibmdos.com\/\"> <span style=\"color: blue;\">IBMDOS.COM<\/span><span style=\"color: black;\">,<\/span><\/a><span style=\"color: black;\"> IBMBIO&gt;COM and<\/span><a href=\"http:\/\/command.com\/\"> <span style=\"color: blue;\">COMMAND.COM<\/span> <\/a><span style=\"color: black;\">along with some optional files like CONFIG.SYS and AUTOEXEC.BAT. The booting process culminates in the&nbsp;<\/span><span style=\"text-indent: 8pt;\">system prompt displayed on the VDU.<\/span><\/p>\n<p style=\"margin-bottom: 3pt; text-align: justify; text-indent: 7pt;\"><span style=\"text-indent: 11pt;\">The infection may begin as soon as a computer system boots from a contaminated disk or executes an infected program. Whatever viruses are present get activated, which immediately begin to spread throughout the system.<\/span><\/p>\n<p style=\"margin-bottom: 3pt; text-align: justify; text-indent: 7pt;\"><span style=\"color: black; text-indent: 11pt;\">Another important aspect that needs mention here is the interrupt mechanism. All input\/output activities on a PC are carried out by interrupts. The interrupt mechanism in itself is very complex. We will try to understand it with an example. Let us say, a user wishes to save his program and presses the required keys on the keyboard. This is treated as an interrupt. The main <a href=\"https:\/\/motivemeaning.blogspot.com\/2022\/04\/learning-and-training.html\">memory<\/a> has specific routines to handle these user requests. One such set of routines exists in the ROM-BIOS and the another is in the DOS program in the memory, loaded from<\/span><a style=\"text-indent: 11pt;\" href=\"http:\/\/ibmbio.com\/\"> <span style=\"color: blue;\">IBMBIO.COM<\/span><span style=\"color: black; text-decoration-line: none; text-underline: none;\">.<\/span><\/a><span style=\"color: black; text-indent: 11pt;\"> The routine that services the interrupt requests are termed as Interrupt Service<\/span><\/p>\n<p style=\"margin: 0cm 0cm 0cm 8.0pt; text-align: justify; text-indent: 11pt;\">&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\n\n\n<p><span style=\"font-family: 'Times New Roman',serif; font-size: 11pt; mso-ansi-language: EN-GB; mso-bidi-language: EN-GB; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-GB;\">&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"color: black;\">Routines (ISR&#8217;s) and are located in the memory with their addresses. Then interrupt request activated a number and not the routine address, thus, there exists a table with the interrupt numbers and the corresponding routine address in DOS. When an interrupt request is made, the CPU looks up the table, performs the required routines and transfers the control back to the program.<\/span><\/p>\n\n\n\n<p><span style=\"color: black;\">The contents of ISR address table being in the RAM is vulnerable to modification by user programs and that is what a virus does-modify the ISR&#8217;s address<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Classification_of_Viruses\"><\/span><span style=\"color: black; font-size: 13pt; line-height: 87%;\">Classification of Viruses<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Computer <span style=\"color: black;\">Viruses are classified on the basis of their mode of existence and there are three categories of viruses:<\/span><\/p>\n\n\n\n<p><a name=\"bookmark1277\"><\/a><!-- [if !supportLists]--><span style=\"color: black;\"><span style=\"mso-list: Ignore;\">1.<span style=\"font: 7pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><\/span><!--[endif]--><span style=\"color: black;\">BOOT Infectors<\/span><\/p>\n\n\n\n<p><a name=\"bookmark1278\"><\/a><!-- [if !supportLists]--><span style=\"color: black;\"><span style=\"mso-list: Ignore;\">2.<span style=\"font: 7pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><\/span><!--[endif]--><span style=\"color: black;\">SYSTEM Infectors<\/span><\/p>\n\n\n\n<p><span style=\"color: black;\">3 .<span style=\"mso-tab-count: 1;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span>GENERAL EXECUTABLE<span style=\"mso-tab-count: 1;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span>PROGRAM Infectors.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"BOOT_Infectors\"><\/span><span style=\"color: black;\">BOOT Infectors<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><a name=\"bookmark1279\"><\/a><\/p>\n\n\n\n<p><span style=\"color: black;\">As the name suggests, they are characterized by the fact that they physically reside in the boot sector (0 zero) sector of the disk. A system infected by such a virus will have the virus residing in a particular area of the disk rather than in a program file. These viruses get loaded soon after the Power On Self Test and control the system and remains in control at all times. They sometimes have the capability to trap soft booting (i.e. CTRL ALT DEL) and remain in control even if the system is booted from a non-infected floppy, thereby contaminating the clean floppy.<\/span><\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/i0.wp.com\/compscistation.com\/wp-content\/uploads\/2019\/03\/elk-cloner-virus..png?ssl=1\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/compscistation.com\/wp-content\/uploads\/2019\/03\/elk-cloner-virus..png?ssl=1\" alt=\"Computer Virus - BOOT Infectors\" title=\"BOOT Infectors\"\/><\/a><\/figure>\n\n\n\n<div style=\"clear: both; text-align: center;\"><\/div>\n\n\n\n<p><span style=\"color: black; text-indent: 19pt;\">&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"color: black; text-indent: 19pt;\">Boot infectors displaces information originally residing on the location, which they occupy. While writing onto the boot sector, the virus ensures that the boot record is not deleted. Once the virus is loaded, it automatically transfers control to the area where the boot record is available. The reason behind doing this is that the boot record contains instructions to read<\/span><a style=\"text-indent: 19pt;\" href=\"http:\/\/ibmbio.com\/\"> <span style=\"color: blue;\">IBMBIO.COM<\/span> <\/a><span style=\"color: black; text-indent: 19pt;\">and<\/span><a style=\"text-indent: 19pt;\" href=\"http:\/\/ibmdos.com\/\"> <span style=\"color: blue;\">IBMDOS.COM<\/span> <\/a><span style=\"color: black; text-indent: 19pt;\">and if these files are not readable, access to the disk is not possible, and so the virus becomes ineffective.<\/span><\/p>\n\n\n\n<p><span style=\"text-indent: 16pt;\">&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"text-indent: 16pt;\">Boot infectors typically create &#8220;Bad sectors&#8221;. Boot infectors are the types, which once loaded would stay in the memory until the system is shut off, and until the disk reformats.<\/span><\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"_SYSTEM_Infectors\"><\/span><span style=\"color: black;\"><span style=\"mso-list: Ignore;\"><span style=\"font: 7pt 'Times New Roman';\">&nbsp;<\/span><\/span><\/span><!--[endif]--><span style=\"color: black;\">SYSTEM Infectors<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><a name=\"bookmark1280\"><\/a><\/p>\n\n\n\n<p><span style=\"color: black;\">This second category of viruses deals with the components of the system itself. All machines without exception require an operating system in order to create an environment in which the operator works. In MS-DOS,<\/span><a href=\"http:\/\/command.com\/\"> <span style=\"color: blue;\">COMMAND.COM<\/span> <\/a><span style=\"color: black;\">contains all the internal commands. If no such command file exists, commands such as COPY, DIR etc. are not loaded onto the memory when the machine is booted. The System Infectors attach themselves to a file such as<\/span><a href=\"http:\/\/command.com\/\"> <span style=\"color: blue;\">COMMAND.COM<\/span> <\/a><span style=\"color: black;\">or other memory resident files and manipulate these files.<\/span><\/p>\n\n\n\n<p><span style=\"color: black;\">System infectors differ from Boot infectors in the sense that system infectors gain control after the computer is booted: and infect the hard disk or bootable floppies, which contain the appropriate system files only. They have another peculiarity that they may activate after a given period of time or may instantly begin subtle modifications of systems error messages or information messages.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"_GENERALCOM_or_EXE_Infectors\"><\/span><span style=\"color: black;\"><span style=\"mso-list: Ignore;\"><span style=\"font: 7pt 'Times New Roman';\">&nbsp;&nbsp;<\/span><\/span><\/span><!--[endif]--><a href=\"http:\/\/general.com\/\"><span style=\"color: blue;\">GENERAL.COM<\/span> <\/a><!-- [if !supportNestedAnchors]--><a name=\"bookmark1281\"><\/a><!--[endif]--><span style=\"color: black;\">or EXE Infectors<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><!-- [if !supportLists]--><\/p>\n\n\n\n<p><span style=\"color: black;\">From the infection point of view, these viruses are most dangerous and devastating of the three classes of viruses. They attach themselves to program files and can spread to almost any executable program in any system. These viruses change the original program instructions into a &#8220;jump&#8221; to its own code and follows that code with a return to the original program. As a result, whenever the program is executed, the virus gets loaded and executed first and then allows the original program to proceed. It remains memory resident and infects each and every program that is loaded for execution.<\/span><\/p>\n\n\n\n<p><span style=\"text-indent: 12pt;\">By attaching themselves to EXE or COM files, they alter the file size and sometimes multiple infections&nbsp;<\/span><span style=\"text-indent: 8pt;\">renders program files too large to be accommodated in the memory.<\/span><\/p>\n\n\n\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer Virus categories are classified on the basis of their mode of existence and there are three categories of viruses<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"wds_primary_category":133,"footnotes":""},"categories":[133],"tags":[],"class_list":["post-1030","post","type-post","status-publish","format-standard","hentry","category-computer-fundamentals"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":1127,"url":"https:\/\/support.centreforelites.com\/en\/4-developments-in-information-and-communication-technology\/","url_meta":{"origin":1030,"position":0},"title":"4 Developments in Information and Communication Technology","author":"centreforelites","date":"March 26, 2022","format":false,"excerpt":"\u00a0Information and Communication Technology (ICT) is referred to as a range of tools and techniques relating to computer-based hardware, to communications including both directed and broadcast, to information sources such as CD-ROM and the internet, and to associated technologies such as robots, videoconferencing and digital TV.ICTDevelopmental Stages of Information and\u2026","rel":"","context":"In &quot;ICT&quot;","block_context":{"text":"ICT","link":"https:\/\/support.centreforelites.com\/en\/category\/ict\/"},"img":{"alt_text":"Developmental Stages of Information and Communication Technology","src":"https:\/\/encrypted-tbn0.gstatic.com\/images?q=tbn:ANd9GcQpj-02uIEOULwJozv3mUhAVwk3YqOdy32y8Q&usqp=CAU","width":350,"height":200},"classes":[]},{"id":980,"url":"https:\/\/support.centreforelites.com\/en\/biological-problems-associated-with-adolescence\/","url_meta":{"origin":1030,"position":1},"title":"BIOLOGICAL PROBLEMS ASSOCIATED WITH ADOLESCENCE","author":"centreforelites","date":"November 1, 2022","format":false,"excerpt":"BIOLOGICAL PROBLEMS ASSOCIATED WITH ADOLESCENCE","rel":"","context":"In &quot;Developmental Psychology&quot;","block_context":{"text":"Developmental Psychology","link":"https:\/\/support.centreforelites.com\/en\/category\/developmental-psychology\/"},"img":{"alt_text":"BIOLOGICAL PROBLEMS ASSOCIATED WITH ADOLESCENCE","src":"https:\/\/i0.wp.com\/support.centreforelites.com\/wp-content\/uploads\/2022\/11\/BIOLOGICAL-PROBLEMS-ASSOCIATED-WITH-ADOLESCENCE.jpg?fit=800%2C600&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/support.centreforelites.com\/wp-content\/uploads\/2022\/11\/BIOLOGICAL-PROBLEMS-ASSOCIATED-WITH-ADOLESCENCE.jpg?fit=800%2C600&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/support.centreforelites.com\/wp-content\/uploads\/2022\/11\/BIOLOGICAL-PROBLEMS-ASSOCIATED-WITH-ADOLESCENCE.jpg?fit=800%2C600&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/support.centreforelites.com\/wp-content\/uploads\/2022\/11\/BIOLOGICAL-PROBLEMS-ASSOCIATED-WITH-ADOLESCENCE.jpg?fit=800%2C600&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":358,"url":"https:\/\/support.centreforelites.com\/en\/external-parts-of-human-body\/","url_meta":{"origin":1030,"position":2},"title":"External Parts of Human Body","author":"centreforelites","date":"April 13, 2022","format":false,"excerpt":"The external parts of human body are connected to the five major sense organs which tell us about our surroundings.","rel":"","context":"In &quot;Biology&quot;","block_context":{"text":"Biology","link":"https:\/\/support.centreforelites.com\/en\/category\/blog\/biology\/"},"img":{"alt_text":"External Parts of Human Body","src":"https:\/\/i0.wp.com\/support.centreforelites.com\/wp-content\/uploads\/2022\/04\/External-Parts-of-Human-Body.webp?fit=600%2C400&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/support.centreforelites.com\/wp-content\/uploads\/2022\/04\/External-Parts-of-Human-Body.webp?fit=600%2C400&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/support.centreforelites.com\/wp-content\/uploads\/2022\/04\/External-Parts-of-Human-Body.webp?fit=600%2C400&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":620,"url":"https:\/\/support.centreforelites.com\/en\/5-pros-and-cons-of-online-learning-you-gotta-know\/","url_meta":{"origin":1030,"position":3},"title":"5 Pros and Cons of Online Learning you gotta know","author":"centreforelites","date":"April 15, 2022","format":false,"excerpt":"Online Learning (OL) can be helpful, exciting but, at the same time intimidating. The pros and cons of online learning are numerous in other words. It is helpful because it gives you opportunities to take a leading role into your own studies. However, it is also exciting because you've got\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/support.centreforelites.com\/en\/category\/blog\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1049,"url":"https:\/\/support.centreforelites.com\/en\/product-classification\/","url_meta":{"origin":1030,"position":4},"title":"PRODUCT CLASSIFICATION","author":"centreforelites","date":"April 21, 2022","format":false,"excerpt":"Several product classification systems have been devised for the efficient marketing of products and services. In the first place, all products and services can be broadly grouped into two major classes on the bases of the types of consumers that use them.","rel":"","context":"In &quot;Fundamentals of Marketing&quot;","block_context":{"text":"Fundamentals of Marketing","link":"https:\/\/support.centreforelites.com\/en\/category\/fundamentals-of-marketing\/"},"img":{"alt_text":"PRODUCT CLASSIFICATION","src":"https:\/\/i0.wp.com\/support.centreforelites.com\/wp-content\/uploads\/2022\/11\/PRODUCT-CLASSIFICATION.jpg?fit=640%2C640&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/support.centreforelites.com\/wp-content\/uploads\/2022\/11\/PRODUCT-CLASSIFICATION.jpg?fit=640%2C640&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/support.centreforelites.com\/wp-content\/uploads\/2022\/11\/PRODUCT-CLASSIFICATION.jpg?fit=640%2C640&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":925,"url":"https:\/\/support.centreforelites.com\/en\/hazards-associated-with-prenatal-period\/","url_meta":{"origin":1030,"position":5},"title":"HAZARDS ASSOCIATED WITH PRENATAL PERIOD","author":"centreforelites","date":"November 5, 2022","format":false,"excerpt":"There are serious hazards to development during the relatively short period before birth or during the prenatal Period. These are either physical or psychological.","rel":"","context":"In &quot;Developmental Psychology&quot;","block_context":{"text":"Developmental Psychology","link":"https:\/\/support.centreforelites.com\/en\/category\/developmental-psychology\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/support.centreforelites.com\/wp-content\/uploads\/2022\/11\/3-s2.0-B9780124202269000012-f01-01-9780124202269.jpg?fit=506%2C376&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]}],"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/support.centreforelites.com\/en\/wp-json\/wp\/v2\/posts\/1030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/support.centreforelites.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/support.centreforelites.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/support.centreforelites.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/support.centreforelites.com\/en\/wp-json\/wp\/v2\/comments?post=1030"}],"version-history":[{"count":1,"href":"https:\/\/support.centreforelites.com\/en\/wp-json\/wp\/v2\/posts\/1030\/revisions"}],"predecessor-version":[{"id":1962,"href":"https:\/\/support.centreforelites.com\/en\/wp-json\/wp\/v2\/posts\/1030\/revisions\/1962"}],"wp:attachment":[{"href":"https:\/\/support.centreforelites.com\/en\/wp-json\/wp\/v2\/media?parent=1030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/support.centreforelites.com\/en\/wp-json\/wp\/v2\/categories?post=1030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/support.centreforelites.com\/en\/wp-json\/wp\/v2\/tags?post=1030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}