{"id":1991,"date":"2020-01-27T06:09:43","date_gmt":"2020-01-27T06:09:43","guid":{"rendered":"https:\/\/studysection.com\/blog\/?p=1991"},"modified":"2020-01-27T06:52:47","modified_gmt":"2020-01-27T06:52:47","slug":"computer-viruses-and-their-consequences","status":"publish","type":"post","link":"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/","title":{"rendered":"Computer Viruses and their Consequences"},"content":{"rendered":"<h2>Introduction to Computer Viruses<\/h2>\n<p>Computer Viruses are computer programs that interferes in another program without the user\u2019s knowledge and perform malicious actions. The virus inserts its malicious code into the computer and replicates itself. A computer virus behaves like a flu virus that can easily spread from host to host. The very first computer virus was generated in the 1970s and was called the Creeper virus. The targets of this virus were Digital Equipment Corporation(DEC) computers that were linked to ARPANET(predecessor of the current Internet).<\/p>\n<p><img decoding=\"async\" src=\"..\/wp-content\/uploads\/2020\/01\/system-virus.png\" alt=\"computer viruses\"\/><\/p>\n<p><strong>Below are some of the types of viruses which spreads in the computer:<\/strong><\/p>\n<ol>\n<li>Boot Sector Virus<\/li>\n<li>Resident Virus<\/li>\n<li>Direct Action Virus<\/li>\n<li>Multipartite Virus<\/li>\n<li>Polymorphic Virus<\/li>\n<li>Overwrite Virus<\/li>\n<li>Spacefiller Virus<\/li>\n<\/ol>\n<h3>How does a virus spread?<\/h3>\n<p>The virus attacks a computer in different ways. Viruses can be spread through Internet file downloads, email attachments either rich-text email or attached applications. Because of some shady app downloads, our phones and computers may also get affected by viruses.<\/p>\n<h3>Impacts of Viruses:<\/h3>\n<p>Some of the impacts of viruses are described below:<\/p>\n<ol>\n<li>There will be an opening of more frequent windows which persuade you to visit unusual sites. Sometimes, they lead you to download antivirus or other software programs.<\/li>\n<li>Changes may occur to your homepage. It will appear different from the normal one and you may unable to change it.<\/li>\n<li>Your information can be misused. Data and e-mails can be sent in your name from an infected computer.<\/li>\n<li>A virus can damage your hard-drive and can freeze or crash your device. All the damages that occur through the virus cannot be undone and settled back.<\/li>\n<li>Slow speed and reduced performance are also signs of the presence of a virus on the computer system.<\/li>\n<li>Sometimes there is an unusual activity such as password changes that may prevent you from logging into your computer.<\/li>\n<\/ol>\n<h3>Countermeasures:<\/h3>\n<p>Some of the points to avoid viruses are described below:<\/p>\n<ol>\n<li>PandaLabs reports should be up to date if necessary to use or it should be uninstalled from the system if there is no use of it, otherwise, it can cause harm and can be easier for cyber-criminals to affect your programs.<\/li>\n<li>Always be careful while installing or running any program on your computer. Avoid using websites that are provided with pirated material.<\/li>\n<li>Some of the things that we should keep in mind while performing some actions:\n<ul>\n<li>Never open messages from non-identified sources.<\/li>\n<li>Prefer secure pages having an address that begins with https:\/\/ and displaying a padlock icon. Other pages are non-secure pages, never go for them.<\/li>\n<li>Always use secure and strong passwords.<\/li>\n<li>Avoid confidential information via email.<\/li>\n<\/ul>\n<\/li>\n<li>Keep Windows operating system up to date, as it is difficult for the virus to affect the updated versions.<\/li>\n<li>Always opt for a good antivirus. This is an important step to keep the system free from viruses.<\/li>\n<\/ol>\n<p><small><em>jQuery presents a tree-like structure of all the elements on a webpage simplifying the syntax and further manipulating such elements. The <a href=\"https:\/\/www.studysection.com\/jquery-3.x-advanced\">jQuery Certification exam<\/a> by StudySection will secure your fundamental knowledge and a basic understanding of jQuery as an asset to improve your skills.<\/em><\/small><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Computer Viruses Computer Viruses are computer programs that interferes in another program without the user\u2019s knowledge and perform<\/p>\n","protected":false},"author":1,"featured_media":1992,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[346,92,345,252],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>StudySection Blog - Computer Viruses and their Consequences<\/title>\n<meta name=\"description\" content=\"Computer viruses can be spread through Internet file downloads, email attachments either rich-text email or attached applications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"StudySection Blog - Computer Viruses and their Consequences\" \/>\n<meta property=\"og:description\" content=\"Computer viruses can be spread through Internet file downloads, email attachments either rich-text email or attached applications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog Posts on famous people, innovations and educational topics\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/studysection\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-27T06:09:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-27T06:52:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/studysection.com\/blog\/wp-content\/uploads\/2020\/01\/virus.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin-studysection-blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@studysection\" \/>\n<meta name=\"twitter:site\" content=\"@studysection\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin-studysection-blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/\"},\"author\":{\"name\":\"admin-studysection-blog\",\"@id\":\"https:\/\/studysection.com\/blog\/#\/schema\/person\/db367e2c29a12d1808fb1979edb3d402\"},\"headline\":\"Computer Viruses and their Consequences\",\"datePublished\":\"2020-01-27T06:09:43+00:00\",\"dateModified\":\"2020-01-27T06:52:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/\"},\"wordCount\":518,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/studysection.com\/blog\/#organization\"},\"keywords\":[\"antivirus\",\"computer\",\"Consequences\",\"virus\"],\"articleSection\":[\"Learn and Grow\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/\",\"url\":\"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/\",\"name\":\"StudySection Blog - Computer Viruses and their Consequences\",\"isPartOf\":{\"@id\":\"https:\/\/studysection.com\/blog\/#website\"},\"datePublished\":\"2020-01-27T06:09:43+00:00\",\"dateModified\":\"2020-01-27T06:52:47+00:00\",\"description\":\"Computer viruses can be spread through Internet file downloads, email attachments either rich-text email or attached applications.\",\"breadcrumb\":{\"@id\":\"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/studysection.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Viruses and their Consequences\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/studysection.com\/blog\/#website\",\"url\":\"https:\/\/studysection.com\/blog\/\",\"name\":\"Blog Posts on famous people, innovations and educational topics\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/studysection.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/studysection.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/studysection.com\/blog\/#organization\",\"name\":\"StudySection\",\"url\":\"https:\/\/studysection.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/studysection.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/studysection.com\/blog\/wp-content\/uploads\/2021\/10\/studySection-logo.png\",\"contentUrl\":\"https:\/\/studysection.com\/blog\/wp-content\/uploads\/2021\/10\/studySection-logo.png\",\"width\":920,\"height\":440,\"caption\":\"StudySection\"},\"image\":{\"@id\":\"https:\/\/studysection.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/studysection\",\"https:\/\/twitter.com\/studysection\",\"https:\/\/www.instagram.com\/study.section\/\",\"https:\/\/www.linkedin.com\/company\/studysection\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/studysection.com\/blog\/#\/schema\/person\/db367e2c29a12d1808fb1979edb3d402\",\"name\":\"admin-studysection-blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/studysection.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/054ac87a6874df1932004239cd8eab36?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/054ac87a6874df1932004239cd8eab36?s=96&d=mm&r=g\",\"caption\":\"admin-studysection-blog\"},\"url\":\"https:\/\/studysection.com\/blog\/author\/admin-studysection-blog\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"StudySection Blog - Computer Viruses and their Consequences","description":"Computer viruses can be spread through Internet file downloads, email attachments either rich-text email or attached applications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/","og_locale":"en_US","og_type":"article","og_title":"StudySection Blog - Computer Viruses and their Consequences","og_description":"Computer viruses can be spread through Internet file downloads, email attachments either rich-text email or attached applications.","og_url":"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/","og_site_name":"Blog Posts on famous people, innovations and educational topics","article_publisher":"https:\/\/www.facebook.com\/studysection","article_published_time":"2020-01-27T06:09:43+00:00","article_modified_time":"2020-01-27T06:52:47+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/studysection.com\/blog\/wp-content\/uploads\/2020\/01\/virus.png","type":"image\/png"}],"author":"admin-studysection-blog","twitter_card":"summary_large_image","twitter_creator":"@studysection","twitter_site":"@studysection","twitter_misc":{"Written by":"admin-studysection-blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/#article","isPartOf":{"@id":"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/"},"author":{"name":"admin-studysection-blog","@id":"https:\/\/studysection.com\/blog\/#\/schema\/person\/db367e2c29a12d1808fb1979edb3d402"},"headline":"Computer Viruses and their Consequences","datePublished":"2020-01-27T06:09:43+00:00","dateModified":"2020-01-27T06:52:47+00:00","mainEntityOfPage":{"@id":"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/"},"wordCount":518,"commentCount":0,"publisher":{"@id":"https:\/\/studysection.com\/blog\/#organization"},"keywords":["antivirus","computer","Consequences","virus"],"articleSection":["Learn and Grow"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/","url":"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/","name":"StudySection Blog - Computer Viruses and their Consequences","isPartOf":{"@id":"https:\/\/studysection.com\/blog\/#website"},"datePublished":"2020-01-27T06:09:43+00:00","dateModified":"2020-01-27T06:52:47+00:00","description":"Computer viruses can be spread through Internet file downloads, email attachments either rich-text email or attached applications.","breadcrumb":{"@id":"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/studysection.com\/blog\/computer-viruses-and-their-consequences\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/studysection.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Computer Viruses and their Consequences"}]},{"@type":"WebSite","@id":"https:\/\/studysection.com\/blog\/#website","url":"https:\/\/studysection.com\/blog\/","name":"Blog Posts on famous people, innovations and educational topics","description":"","publisher":{"@id":"https:\/\/studysection.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/studysection.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/studysection.com\/blog\/#organization","name":"StudySection","url":"https:\/\/studysection.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/studysection.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/studysection.com\/blog\/wp-content\/uploads\/2021\/10\/studySection-logo.png","contentUrl":"https:\/\/studysection.com\/blog\/wp-content\/uploads\/2021\/10\/studySection-logo.png","width":920,"height":440,"caption":"StudySection"},"image":{"@id":"https:\/\/studysection.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/studysection","https:\/\/twitter.com\/studysection","https:\/\/www.instagram.com\/study.section\/","https:\/\/www.linkedin.com\/company\/studysection"]},{"@type":"Person","@id":"https:\/\/studysection.com\/blog\/#\/schema\/person\/db367e2c29a12d1808fb1979edb3d402","name":"admin-studysection-blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/studysection.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/054ac87a6874df1932004239cd8eab36?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/054ac87a6874df1932004239cd8eab36?s=96&d=mm&r=g","caption":"admin-studysection-blog"},"url":"https:\/\/studysection.com\/blog\/author\/admin-studysection-blog\/"}]}},"views":822,"_links":{"self":[{"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/posts\/1991"}],"collection":[{"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/comments?post=1991"}],"version-history":[{"count":5,"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/posts\/1991\/revisions"}],"predecessor-version":[{"id":1999,"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/posts\/1991\/revisions\/1999"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/media\/1992"}],"wp:attachment":[{"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/media?parent=1991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/categories?post=1991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/studysection.com\/blog\/wp-json\/wp\/v2\/tags?post=1991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}