Self-copying computer pest - what is it and what is its mechanism of action? How are they created at all and who creates them? What species exist and what does a particular species do? Now you will learn what a self-copying computer pest is. The answer is divided into 6 parts. Not only classification is considered, but also ways of disposal and safety measures in order to never learn about them in practice.
Self-replicating computer pest - what is it?
Initially, you need to determine the terminology. Self-copying computer pest is the full name of a computer virus. These are programs that independently increase their number, reducing the amount of memory space available to the user and at the same time conducting sabotage activities. Sabotage can be both relatively harmless (take part of the RAM for copying for yourself) and have significant consequences (up to the failure of the computer).
One of their features is that they can not only spontaneously copy themselves, but also embed their code in other programs. However, due to the fact that for the full functioning of viruses, a rather large segment of code is required, targeted programs should also be rather big. They got their name “viruses” due to their similarity with biological viruses. Additionally, models over the past few years have gained the ability to conduct self-adaptation, which further increases the similarity. A self-replicating computer pest is the answer to many problems that arise with the computer and will occur until the virus is removed.
Virus history
The first Brain virus, which was fortunate enough to carry out a massive attack, was developed in 1986. And already in 1987-1988 there were peaks of its popularity. Viruses were before him, including in the Soviet Union, but their actions did not take on such a scale. Since then, the number of viruses has steadily increased, and today they number over 7 million.
What types of viruses exist?
Many people have developed many viruses that are classified based on their actions. There are 3 types:
- Worm. A fairly harmless program that simply engages in self-copying and the use of RAM. But with significant infection, it can create significant inconvenience when using a computer. This is especially true for those that do not have enough RAM for the worm to develop for a long time.
- Zombie virus. These viruses are used for remote computer access. The aspect of use includes a wide range of actions, from participating in a spam attack to a site to being infected by a mailing program that will send letters on the Internet. And everything is done so masterly that the user does not even notice that his computer is in the clutches of attackers.
- Access blocking program. It is a banner that blocks the window and requires you to send money somewhere. As you might guess - after sending the money does not disappear. You can remove such a program in safe computer mode.
- Programs that harm the computer. Software that destroys system files, incapacitating efficient machines and turning them into piles of iron and plastic.
Is there a difference between a virus and a malware?
Very often, the word “virus” and “malware” put an equal sign. Is it really so? Not. The fact is that, in addition to viruses, trojans and spyware fall under the concept of malware. And the very concept of “malicious programs” is more broad - so, they are all the software that is used to gain unauthorized access to a computer with criminal intent. In addition, a self-copying computer pest is such software that can be embedded in other programs, while trojans and spies are deprived of such an opportunity.
How to remove a virus?
The easiest and most popular way is to resort to the help of an antivirus (and to guarantee the destruction of a spy, an anti-spy is also available). But there are separate programs that register themselves in the registers of the operating system, and only professionals can cope with them. If you decide that you should carry the computer for repair, then this is premature: there are help departments for problems with computers on large computer forums, contact them for help and they will advise you on how to find the virus and how to remove it.
How not to pick up a computer virus?
The best problem is one that does not occur. And for this, care must be taken:
- Download files only from resources, after which you do not notice something “new” on your computer.
- If the downloaded file has the exe extension, but the archive icon, do not open it (it can be a self-extracting archive, but they are almost never used, and most likely there is a virus in front of you).
- Estimate the approximate size of the file you need and downloaded. So, if you need a program for a couple of kilobytes or a couple of gigabytes, and you are offered a file for 500 kilobytes - here is a virus or other malicious program.
Now that you know that there is such a program as a self-copying computer pest that promises with a frivolous attitude, you can be more careful and careful. This reduces your chances of meeting them and learning from experience what they are.