Related topics: virus

'Sleep talking' PCs save energy and money

Personal computers may soon save large amounts of energy by "sleep talking." Computer scientists at UC San Diego and Microsoft Research have created a plug-and-play hardware prototype for personal computers that induces a ...

Chemical compounds in foods can inhibit a key SARS-CoV-2 enzyme

Chemical compounds in foods or beverages like green tea, muscadine grapes and dark chocolate can bind to and block the function of a particular enzyme, or protease, in the SARS-CoV-2 virus, according to a new study by plant ...

COVID-19 virus survives on surfaces within thin film

How does the COVID-19 virus manage to survive on surfaces? To find out, researchers in India are exploring the drying times of thin liquid films that persist on surfaces after most respiratory droplets evaporate.

Computational study reveals how Ebola nucleocapsid stabilizes

The Ebola virus causes a serious infection with a mortality rate between 50% and 90%. Nucleoproteins in the virus assemble into a helical arrangement and encapsulate a single stranded RNA genome, ssRNA, to form a rodlike ...

page 1 from 15

Computer virus

A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software), including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious.

Most personal computers are now connected to the Internet and to local area networks, facilitating the spread of malicious code. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, Instant Messaging, and file sharing systems to spread.

This text uses material from Wikipedia, licensed under CC BY-SA