{"id":314,"date":"2015-08-02T14:44:46","date_gmt":"2015-08-02T14:44:46","guid":{"rendered":"https:\/\/www.armourinfosec.com\/?p=314"},"modified":"2017-01-18T10:06:19","modified_gmt":"2017-01-18T04:36:19","slug":"computer-viruses","status":"publish","type":"post","link":"https:\/\/www.armourinfosec.com\/computer-viruses\/","title":{"rendered":"Computer Viruses"},"content":{"rendered":"

\"virus<\/a>A computer virus is a program which can replicate and attach itself to a program or files infecting the system without its knowledge. A Computer virus can be spread from one host to another by sharing infected file or by downloading infected files from un-trusted sources. All computer viruses are man-made, they spread only with human assistance and support.<\/p>\n

Possible ways to get virus into Computers<\/strong><\/p>\n

Virus can be installed in a computer by downloading applications from un-trusted sites, by a removable medium like USB, CD, DVD\u2019s and sharing files from one infected computer to another also virus comes through attachments with e-mails.<\/p>\n

    \n
  1. Opening a e-mail attachments<\/strong>: Whenever you download files with extension .exe, vbs, shs, pif, bat, cmd etc received via email attachment. There is a chance of virus getting into your system. Sometimes the attachments contain an executable code with double extension like hi.doc.exe. If you open such types of files, virus will enter into your system.<\/li>\n<\/ol>\n
      \n
    1. Downloading files from un-trusted sites:<\/strong> Generally, virus is hidden in the files or program and enters your system whenever you download softwares or applications from untrusted websites.<\/li>\n<\/ol>\n
        \n
      1. Removable Medium: <\/strong>Whenever you copy files or download files from an infected removable medium like USB, CD, DVD drives then the virus may enter into your system.<\/li>\n<\/ol>\n
          \n
        1. Downloading games: <\/strong>Virus and worms may enter into a system when you try to download or install a game on your computer. The malicious program may be hidden in the files you download.<\/li>\n<\/ol>\n
            \n
          1. Sharing files: <\/strong>Virus will install into your system whenever you share files from one infected computer to another computer.<\/li>\n<\/ol>\n

            Signs of Computer Virus<\/strong><\/p>\n

              \n
            • Computer runs more slowly than normal<\/li>\n
            • Computer stops responding or locks up often<\/li>\n
            • Computer crashes and restarts every few minutes<\/li>\n
            • Computer restarts on its own and then fails to run normally<\/li>\n
            • Applications on your computer don’t work correctly<\/li>\n
            • Disks or disk drives are inaccessible<\/li>\n
            • Can’t print correctly<\/li>\n
            • Unusual error messages<\/li>\n
            • Distorted menus and dialog boxes<\/li>\n<\/ul>\n

              How to prevent virus?<\/strong><\/p>\n

              Check for attachments<\/strong>: Always check the attachments by scanning before you open them and make sure that the attachments are received from the known user.<\/p>\n

              Check for Extensions: <\/strong>Always check the file extension before you download and avoid downloading the files with double extension.<\/p>\n

              Browser settings:<\/strong> Always set the browser settings to allow the sites only from trusted websites.<\/p>\n

              Ignore e-mails from unknown users: <\/strong>Avoid downloading the files from unknown user, and it is always better to ignore or delete the files from unknown users.<\/p>\n

              Anti-Virus Software<\/strong>: Always use anti-virus software and update with latest patches and scan the files before you download.<\/p>\n","protected":false},"excerpt":{"rendered":"

              A computer virus is a program which can replicate and attach itself to a program or files infecting the system…<\/p>\n","protected":false},"author":1,"featured_media":856,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[12],"yoast_head":"\nViruses | Computer Viruses<\/title>\n<meta name=\"description\" content=\"A computer virus is a program which can replicate and attach itself to a program or files infecting the system without its knowledge.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.armourinfosec.com\/computer-viruses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Viruses | Computer Viruses\" \/>\n<meta property=\"og:description\" content=\"A computer virus is a program which can replicate and attach itself to a program or files infecting the system without its knowledge.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.armourinfosec.com\/computer-viruses\/\" \/>\n<meta property=\"og:site_name\" content=\"Armour Infosec\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ArmourInfosec\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-02T14:44:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-18T04:36:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.armourinfosec.com\/wp-content\/uploads\/2015\/08\/virus-detected.png\" \/>\n\t<meta property=\"og:image:width\" content=\"450\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Armour Infosec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ArmourInfosec\" \/>\n<meta name=\"twitter:site\" content=\"@ArmourInfosec\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Armour Infosec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.armourinfosec.com\/computer-viruses\/\",\"url\":\"https:\/\/www.armourinfosec.com\/computer-viruses\/\",\"name\":\"Viruses | Computer Viruses\",\"isPartOf\":{\"@id\":\"https:\/\/www.armourinfosec.com\/#website\"},\"datePublished\":\"2015-08-02T14:44:46+00:00\",\"dateModified\":\"2017-01-18T04:36:19+00:00\",\"author\":{\"@id\":\"https:\/\/www.armourinfosec.com\/#\/schema\/person\/1d8ec30560e735c34fa5d464a1357308\"},\"description\":\"A computer virus is a program which can replicate and attach itself to a program or files infecting the system without its knowledge.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.armourinfosec.com\/computer-viruses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.armourinfosec.com\/computer-viruses\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.armourinfosec.com\/computer-viruses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.armourinfosec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Viruses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.armourinfosec.com\/#website\",\"url\":\"https:\/\/www.armourinfosec.com\/\",\"name\":\"Armour Infosec\",\"description\":\"Do Your Part - Be Security Smart\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.armourinfosec.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.armourinfosec.com\/#\/schema\/person\/1d8ec30560e735c34fa5d464a1357308\",\"name\":\"Armour Infosec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.armourinfosec.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/17f812901d8294702576e81ddce5aa92?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/17f812901d8294702576e81ddce5aa92?s=96&d=mm&r=g\",\"caption\":\"Armour Infosec\"},\"sameAs\":[\"https:\/\/www.armourinfosec.com\/\"],\"url\":\"https:\/\/www.armourinfosec.com\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Viruses | Computer Viruses","description":"A computer virus is a program which can replicate and attach itself to a program or files infecting the system without its knowledge.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.armourinfosec.com\/computer-viruses\/","og_locale":"en_US","og_type":"article","og_title":"Viruses | Computer Viruses","og_description":"A computer virus is a program which can replicate and attach itself to a program or files infecting the system without its knowledge.","og_url":"https:\/\/www.armourinfosec.com\/computer-viruses\/","og_site_name":"Armour Infosec","article_publisher":"https:\/\/www.facebook.com\/ArmourInfosec","article_published_time":"2015-08-02T14:44:46+00:00","article_modified_time":"2017-01-18T04:36:19+00:00","og_image":[{"width":450,"height":300,"url":"https:\/\/www.armourinfosec.com\/wp-content\/uploads\/2015\/08\/virus-detected.png","type":"image\/png"}],"author":"Armour Infosec","twitter_card":"summary_large_image","twitter_creator":"@ArmourInfosec","twitter_site":"@ArmourInfosec","twitter_misc":{"Written by":"Armour Infosec","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.armourinfosec.com\/computer-viruses\/","url":"https:\/\/www.armourinfosec.com\/computer-viruses\/","name":"Viruses | Computer Viruses","isPartOf":{"@id":"https:\/\/www.armourinfosec.com\/#website"},"datePublished":"2015-08-02T14:44:46+00:00","dateModified":"2017-01-18T04:36:19+00:00","author":{"@id":"https:\/\/www.armourinfosec.com\/#\/schema\/person\/1d8ec30560e735c34fa5d464a1357308"},"description":"A computer virus is a program which can replicate and attach itself to a program or files infecting the system without its knowledge.","breadcrumb":{"@id":"https:\/\/www.armourinfosec.com\/computer-viruses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.armourinfosec.com\/computer-viruses\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.armourinfosec.com\/computer-viruses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.armourinfosec.com\/"},{"@type":"ListItem","position":2,"name":"Computer Viruses"}]},{"@type":"WebSite","@id":"https:\/\/www.armourinfosec.com\/#website","url":"https:\/\/www.armourinfosec.com\/","name":"Armour Infosec","description":"Do Your Part - Be Security Smart","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.armourinfosec.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.armourinfosec.com\/#\/schema\/person\/1d8ec30560e735c34fa5d464a1357308","name":"Armour Infosec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.armourinfosec.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/17f812901d8294702576e81ddce5aa92?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/17f812901d8294702576e81ddce5aa92?s=96&d=mm&r=g","caption":"Armour Infosec"},"sameAs":["https:\/\/www.armourinfosec.com\/"],"url":"https:\/\/www.armourinfosec.com\/author\/admin\/"}]}},"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/posts\/314"}],"collection":[{"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/comments?post=314"}],"version-history":[{"count":0,"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/posts\/314\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/media\/856"}],"wp:attachment":[{"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/media?parent=314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/categories?post=314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.armourinfosec.com\/wp-json\/wp\/v2\/tags?post=314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}