A small computer program that is designed to secretly invade systems and modify either the way in which they operate or alter the information they store. Viruses are destructive software programs that may effectively vandalize computers of all sizes.
A virus is a piece of programming code usually disguised as something else that causes some unexpected and usually undesirable event. A virus is often designed so that it is automatically spread to other computer users. Viruses can be transmitted as attachments to an e-mail note, as downloads, or be present on a diskette or CD.
a set of computer instructions that propagates copies or versions of itself into computer programs or data when it is executed.
A program designed to alter or destroy the software or data stored on a computer system. Computer viruses can be passed from one computer to another on floppy disks, over networks, and over remote modem connections.
A program designed to disrupt or damage a computer's applications or systems. It operates by loading itself onto a computer without the knowledge of the user and running against the user's wishes. Viruses are capable of replicating themselves and some are able to attach to programs and then transmit themselves across a network, bypassing security devices. Because of the prevalence of viruses, an Anti-Virus component should be a part of any security system.
software that is written with malicious intent to cause annoyance or damage.
A computer program that can reproduce itself and damage another program or data.
a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer; "a true virus cannot spread to another computer without human assistance"
a bacterium disease program file nuisance which can copy itself
a bit of software code that gets into a machine
a block of executable code that would replicate itself by attaching to other files or replacing another program
a capability to produce copies of itself (not exact bytewise replicas) and to incorporate them into computer networks and/or files, system areas of computers, and other executable objects
a computer program designed and written to make additional copies of itself and spread from location to location typically without one's knowledge or permission
a file designed to replicate itself while avoiding detection
a form of malicious software - also referred to as malware
a harmful program that invisibly attaches itself to a legitimate program
a kind of program designed to disrupt normal operation of a computer system or damage data ont hat system by altering or destroying it
a little program that makes copies of itself to send to other computers
a malicious parasitic program written to alter the way your system operates without your permission or knowledge
a malicious piece of code, generally disguised as something much more innocent
a malicious piece of software that replicates itself and most likely will cause harm to your computer
a malicious program code that is loaded onto your computer without your knowledge and runs against your wishes
a malicious program designed to spread throughout your computer by hiding itself in your files
a malicious program or piece of code created to cause problems on computers
a malicious program that attaches itself to other
a malicious program that can attach itself to executable files and operating system files on both floppies and hard disks
a malicious program which can reproduce itself
a malicious program which has a primary objective to spread from computer to computer, annoying users, and possibly destroying data
a malicious program which replicates and spreads itself to other computers over the Internet
a malicious, self-replicating program that infects your computer and does whatever its author wants it
a man-made code component that attacks computer software and causes a variety of debilitating conditions
a man-made computer code that disrupts a computer's functionality by infecting its system and destroying data
a man-made program or piece of code, often disguised, that replicates itself and causes unexpected and typically negative effects upon computers, applications and networks
a manmade program or piece of code that causes an unexpected, usually negative, event
a nasty computer code that can infect your system
a nasty program with the intention of crippling your computer and any other computer that you come into contact with
an element of executable software that can be transferred between programs, or between computers, with or without the knowledge of the users
an executable code that has the ability to replicate and spread quickly
an executable file designed to replicate itself and avoid detection
an executable file designed to replicate itself while avoiding detection
an executable file that is designed to
an illegal and potentially damaging computer program designed to infect other software b
an insidious piece of software that infects other software and moves from computer to computer when software is transferred
an unauthorized program that replicates itself and spreads onto various data storage media (floppy disks, hard drives, etc
an unauthorized program that replicates itself and spreads onto various data storage media (floppy disks, magnetic tapes, etc
an unauthorized software program or portion of a program that has been introduced into a computer or computer system, or network
an unwanted (though not always mischievous) program that is loaded by and
a parasite program that needs another program to survive
a parasitic program designed to intentionally enter a computer without the user's
a piece of code designed to replicate itself as many times as possible, spreadi
a piece of code designed to replicate itself as Windowsautomaticupdates
a piece of code intentionally written to cause damage to software or data files or to attempt to take control of a computer's resources to use it for malevolent purposes
a piece of code or a program that can reproduce itself quite
a piece of computer code that can replicate itself many times over or destroy computer code
a piece of executable code that attaches itself to a host program and can only propagate through the execution of the host program
a piece of executable code with the unique ability to replicate
a piece of malicious code that attaches to necessary components that enable your computer to function normally
a piece of program code, which attaches itself to a file on a computer system and
a piece of programming code that alters the way your computer works without your knowledge or permission
a piece of programming code, usually malicious, that is designed to spread among computers and cause undesirable events when downloaded or activated
a piece of self-replicating code attached to some other piece of code
a piece of software developed primarily to compromise a computer resource
a piece of software that exists for the sole purpose of causing you a headache
a piece of software that has been written to secretly enter your computer system and "infect" your files
a piece of software with the ability to copy itself and spread itself to other computers
a piece of software written with a malicious intent to cause the computer to be infected and change its behaviour unexpectedly without the user's permission
a program a block of executable code
a program and not a microorganism, but it is infectious and can be highly complex
a program, a piece of executable code
a program created by a sick mind that is smuggled
a program created specifically to invade computer s and network s and wreak havoc on them
a program created specifically to invade computers and networks and wreak havoc on them
a program designed Buy Gold to spread itself by
a program just like any other program that is installed on your computer
a program Of course, the virus will try to infect your computer without your knowledge or permission
a program or a piece of code that is loaded onto your computer without your knowledge
a program or piece of malicious code that can have any of a number of negative effects on your computer
a program, piece of code, or programming script which runs without the user's knowledge and performs destructive or otherwise unwanted actions to a computer such as disabling or over-riding security features and making it vulnerable to other attacks
a program projected to distribute itself by first infecting executable files or the system areas of hard and floppy disks and then making copies of itself
a program that can attach itself to, or infect, other programs or parts of your disk
a program that can duplicate itself by generating copies of itself, and sometimes, even modifying itself
a program that can infect (invade) other computer programs
a program that can 'infect' other legitimate programs by modifying them to include a possibly 'evolved' copy of itself
a program that can invade your computer and damage or destroy information
a program that can make copies of itself
a program that can replicate itself and spread from computer to computer
a program that copies itself, nothing more, nothing less
a program that enters a computer
a program that explicitly copies itself
a program that has the ability to make copies of itself, and spread to other files
a program that has the unique ability to replicate usually without your permission or knowledge
a program, usually hidden within another file,
a program which, after being loaded into a computer 's memory, copies itself with the purpose of spreading to other computers
a program which attaches itself to, overwrites or otherwise replaces another program in order to reproduce itself without the knowledge of the PC user
a program which attaches itself to, overwrites or replaces another program in order to replicate itself without the knowledge of the computer's user
a program which can affect your system in many different ways
a program which can destroy or erase data or lock up the system
a program which can reproduce itself within computers by attaching itself to other programs
a program which can spread from one computer to another, making copies of itself and interfering with the normal functioning of the machines
a program which effects its distribution by attaching itself to the executable code of another program, called a vector program
a program which infect other application programs (eg
a program which reproduces itself
a program with a destructive function
a program written to alter the way a computer operates, without the permission or knowledge of the user
a program written to deliberately invade a computer system without its user's permission
a program written to do a number of specific things
a program written to enter your computer system surreptitiously and "infect" it by installing or modifying files or establishing itself in memory
a program written to interfere with the proper functioning of a computer
a program written to purposely spread from computer to computer
a program written with a purpose to destroy another computer, or to
a self-replicating or destructive program spread from computer to computer
a self-replicating resource eater
a self replicating segment of computer code designed to spread to other computers by sharing infected software
a set of instructions embedded in a program which, when activated, carries out some type of destructive or undesired action
a set of programming instructions that attaches itself
a set of self-propagating, unwanted instructions that are executed on your computer and can be passed on to other computer systems without your input
a short program written to infect and alter the performance of a PC
a small piece of computer software which is designed to automatically spread itself from computer to computer like a virus
a small piece of executeable code, which performs malfunctions on the infected machine, replicates it self to other machines
a small piece of malicious programming code, designed to replicate itself within an operating environment, and eventually, take over system resources or in some instances, destroy program and data files
a small piece of programming created to enter computer systems and infect files
a small piece of software that attaches itself to other computer programs
a small program created intentionally to affect the normal computer operations
a small program in an indirect way, rather than straightforwardly through the main entry-point
a small program written permission or knowledge of the user
a small program written to alter
a software program created for the purpose of disrupting computer systems or destroying information stored on the computer
a type of malicious software that can invade your computer
a type of malware that propagates by inserting a copy of itself into and becoming part of another program
a virus that changes its appearance in host programs
A program written with a malicious intent to cause a computer to be infected and change its behavior unexpectedly without the user's permission.
A software executable code segment which is covertly incorporated into the executable program code files (i.e. EXE, BIN, BAT, SYS, COM, DLL, etc.) or data files of a computer or computer network and is activated when the host programs executes. It can cause system crashes, changes in data or complete erasure of hard drives.
A computer program that invades computers and networks and wreaks havoc on them.
A software program, installed without the user's knowledge, designed to alter the way a computer operates or to cause harm to the system.
"A parasitic program written intentionally to enter a computer without the user's permission or knowledge. The word parasitic is used because a virus attaches to files or boot sectors and replicates itself, thus continuing to spread. Though some viruses do little but replicate, others can cause serious damage or affect program and system performance. A virus should never be assumed harmless and left on a system." -- Symantec
rogue computer program, typically a short program designed to disperse copies of itself to other computers and disrupt those computers' normal operations. Although some viruses are merely disruptive, others can destroy or corrupt data or cause an operating system or applications program to malfunction. Computer viruses are spread via floppy disks, networks, or on-line services. Several thousand computer viruses are known, and on average three to five new strains are discovered every day. cryptography - The conversion of data into a secret code for transmission over a public network. The original text, or " plaintext," is converted into a coded equivalent called " ciphertext" via an encryption algorithm. The ciphertext is decoded (decrypted) at the receiving end and turned back into plaintext.
A computer program with the characteristic feature of being able to generate copies of itself, and thereby spreading. It is usually known as a dangerous program which is able to perform some harmful tasks.
is a computer program designed to replicate itself to do harmful things to your computer system that can corrupt information and programs.
A computer virus is similar to a Trojan horse (see below) insofar as it is a program that contains hidden code, which usually performs some unwanted function as a side effect. The main difference is that the hidden code in a computer virus can replicate by attaching a copy of itself to other programs and may also include an additional "payload" that triggers when specific conditions are met.
a computer problem that spreads by copying itself into other programs or documents on your computer
A small program written to do damage to a computer system. Usually, these programs attach themselves on other programs and are activated each time the host file is accessed. This, in turn, allows the virus to infect other files -- spreading like a normal virus would in a human. While some viruses only infect files, most have a specific purpose -- to destroy information on a computer system. Some viruses delete special system files and render the system unusable while others wait for a special date ("time-bomb" viruses) and format the computer harddisk. Special softare called Anti-virus software can help find these destructive programs before they delete something you wanted to keep. Table of Contents
A computer program that spreads by copying itself to other computers via networks, floppy disks, etc. (rather like the Internet Worm). Depending on the nature of the virus, the results vary from whimsical practical jokes to extensive destruction of data. [SMB
A program that infects a computer by attaching itself to another program, and propagating itself when that program is executed. A computer can become infected by files downloaded over a network, or by the installation of new software or floppy disks that are infected with viruses. Some viruses are only pranks, and perform harmless actions like displaying a screen with a joke message on it. Others can destroy files or wipe out a hard drive.
There are many different types of computer viruses but, for the purposes of this book, a computer virus may be defined as a self-replicating program released into a computer system for a number of purposes. These purposes range from the simply mischievous, such as displaying humorous or annoying messages, to the downright nefarious, such as corrupting data or destroying (or subverting) the operating system.
A program designed to do harm to programs and databases owned by others. It has at least one of the self- contagion function, incubation function, and symptom- presentation function
Software that invades operating systems or application programs through contact with corrupted files. It may seriously damage computer files if not eradicated.
any software program that destroys information or makes it difficult to use the contents of a computer disk
A program designed to attach itself to a file, reproduce, and spread from one file to another, destroying data, displaying an irritating message, or otherwise disrupting computer operations.
A computer program that can harm a computer by displaying messages, deleting files, or even destroying the computer's operating system.
A Computer Virus is a computer program which distributes copies of itself, even without permission or knowledge of the user. A computer virus is often simply called a virus if it is clear from the context that it does not refer to a biological virus. The term is commonly used to refer to a range of malware, but a true virus does not need to be harmful.