Computer Viruses

Computer Viruses

In today's world we are constantly giving out our own information. To use Google as an example, they know your browsing behavior, what devices you use, video preferences, your search history, records of every online purchase you have made, and even your location history. This is only the information that we give out willingly. As you probably know there are a lot of people who try to take even more information such as credit card numbers or social security numbers. Sadly, people have been highly creative with how they can get this information from people. Some use frauds to try and trick people into willingly giving it. Although many make use of viruses. I'm going to explain some of the more common digital viruses and how to avoid them. 

 


How do they get viruses on your computer? 

 

Trojan Horse 

Trojan horse viruses are snuck into your computer by being hidden within a larger download. Typically, they are inserted into emails or free-to-download files. With how large downloads can be nowadays, it is easy to hide programs without anyone noticing. The kicker is that you probably won't know that you have downloaded malware until it is too late. 

 

Adware 

Adware is typically inserted into your computer through shady websites. When you enter a website, it will display an ad on your screen after a certain amount of time. You might not even be on the same website once it pops up. The ads that pop up are designed to have you reactively click on them. They might make a false alert you that your credit card number has been leaked, or ironically, that there is a virus on your computer. Once you click the ad it will download a virus onto your computer. 






What will the virus do? 


Spyware 

Spyware viruses tend to play the long game. Once installed it will simply work in the background. It will keep track of everything that happens on your computer. It will track every key stroke you make and every website you go to. By doing this they can learn your logins for all the websites you visit while online. They can also see every email that you write. This may go on for months until the hacker deems that they have enough info. They will typically either use personal information to fake being the person or to threaten to leak the data that they have acquired. 


Worm Virus 

Worm viruses are designed to work in the background while the computer is being used. They will copy any files that it has access to. They may also corrupt files making them unusable. Throughout the process they will also be installing back doors. Back doors are access points for other people to affect your computer and potentially download even more viruses. One such virus may be a boot sector virus. 

 

Boot Sector 

Boot Sector Virus is one of the most brutal viruses for a computer. Boot sector viruses corrupt the programs that boot up your computer. Once it is completed the programs will be completely unusable. What it means is that the program will render your computer unable to turn on. From that point the only way to salvage your computer is to do a factory reset, wiping your computer. Ransomers might demand payment in exchange for the files that they would have copied beforehand using a worm or similar program. 

 


How to avoid it 

Unlike real-life viruses you cannot always have a vaccine for a program. While they are anti-viruses none of them are perfect, so prevention is key. There are plenty of ways to not have to deal with any of these problems. An easy one is to not stay on any website that does not seem quite right. Another thing is to never download anything from an email you don't know. Thirdly you should always download a known software directly from their site. Finally, you should avoid any pop ups that come up that you don't think you installed. If you think you have downloaded something onto your computer you should immediately restart your computer otherwise the restart may not be enough.

 

 

Sources 

Comments

Popular posts from this blog

Chat GPT

New Unity Tax

The History of Phones