What are Viruses?


A virus is malicious software that is usually embedded into other programs and/or files in order to install itself into a user’s system. The effects of a virus infection vary depending on the creator’s intentions, as hey are highly customizable. The consequences of a virus infection may include remote access to your computer, file and program infection and damage, private user information theft, boot sector and computer hardware damage, etc.

There are three major virus types:

  • File infectors spread by infecting and corrupting various files
  • Another virus type is called boot record infectors, propagates by infected removable media, corrupting hardware, mostly hard disks through Master Boot Records.
  • The third most widely spread virus type is called macro viruses, which infect computers via macro commands in Microsoft Office applications.

The viruses might completely destroy original program or it might be reparable. In the most cases you will need an antivirus for fixing the infection.

Computer Virus is a distribution category: It does not describe what particular virus does once it infect system. Other distribution categories include Trojans and Worms.


1. Most of the viruses try to find MS Windows security holes and spread via these breaches to the system. There is a large part of viruses that find security vulnerabilities in firewalls and spread by themselves through these holes into the system. This is one of the most dangerous types of viruses if you do not have a proper, up to date firewall installed.

2. Some viruses get into your system is to spread via instant messengers such as AIM, MSN messenger or ICQ. Viral parasites that replicate through peer-to-peer networks such as KaZaa and LimeWire, also fall into this group. Usually, these viruses come as meaningful messages, names or message attachments, so that a user would execute them thinking there is no risk involved. Once opened, they infect the system for good.

3. Another way for a viral parasite to infect your computer is to spread through email. Such malicious software usually comes as an email file attachment or within an infected email message. Once opened, it installs itself into a user’s computer silently, in the background. Such replication is nearly impossible to notice without any real-time antivirus protection, as no install wizards, warnings or dialogs are being displayed on your screen

4. Macro viruses spread via infected MS Office documents and spreadsheets, after the user has opened the infected file.


Although most of the viruses are not controlled directly from the creator’s remote server, they are programmed to automatically deal damage to a computer and may send vital information and commands to the intruder by themselves. Viruses can:

  • Use your entire system resources to spread to other computers in your local area network and/or through your internet connection.


Naturally, viruses are best removed with the help of anti-virus software. Most of the respectable anti-virus program packages remove most of the viruses very easily, especially if the viral parasite is noticed instantly. However, even quality anti-virus software can sometimes fail to rid your system from a new and advanced virus. In such a case, use our manual removal instructions to remove the virus.

April 25, 2007 14:19