You are on page 1of 2

401 Electronic Retailing

By. Mehul Patel

Introduction
Virus in reference to computers was first used by David Gerrold in 1972. He named a computer program as VIRUS which rang telephone number randomly until it found another computer linked to the network. In 1975, John Brunner used the term WORM. He imagined tapeworm programs that threaded their way through the computers altering records and processes. A computer work by executing set of consecutive instructions called programs. Those programs are used to done the any specific task, which is assign by the user. This advantage or working method may be work using negatively by the program developer to destroy or disturb the users processes. The computer virus, like their biological counterpart, generally tricks hosts or other types of computers into reproducing copies of the invalid organism. They spread from one computer to another through the network connection or removable storage media. Viruses are developed by the computer programmers, for fun or malice (desire to harm someone), but once they begin to spread they take on a life of their own, creating disruption, dismay (feeling sock) and paranoia (it is a mental condition in which user has consider that he need persecution) in their work.

Types of Virus
There are two types of viruses has been identified. They are Parasitic and boot virus. PARASITIC VIRUS: It is attached itself to other programs and is activated when the host program is executed. It tries to get attached to more programs so that chances of getting activated are more. It spread to other computers when the affected programs are copied. Jerusalem and Datacrime are considered as parasitic virus. Its life is depended on other programs. BOOT VIRUS: It is designed to enter the boot sector of a disk. It works by replacing the first sector on the disc with part of itself. It hides the rest of itself elsewhere on the disc, with a copy of the first sector. The virus is loaded by the built-in program when the machine is switched on. The virus loads, installs, hides the rest of it and then loads the original program. On a hard disc, virus can occupy DOS boot sector or master boot sector.

Page 1

401 Electronic Retailing

By. Mehul Patel

Trojan Horse
Trojan horse or Trojan is a program that seems innocuous (Harmless), but conceals (Hide) another function. It contained in a part of program brought from outside the machine. It is dangerous sometimes. The programs appear to be a computer game, but while you enjoy the game, it may be happily formatting your hard disk. Ti is also used as a BACK DOOR or TRAP DOOR to sneak (report another) in to the operating systems information.

Page 2

You might also like