computer virus


Also found in: Dictionary, Thesaurus, Medical, Legal, Acronyms, Wikipedia.

computer virus,

rogue computer programcomputer program,
a series of instructions that a computer can interpret and execute; programs are also called software to distinguish them from hardware, the physical equipment used in data processing.
..... Click the link for more information.
, typically a short program designed to disperse copies of itself to other computers and disrupt those computers' normal operations. A computer virus usually attaches to or inserts itself in an executable file or the boot sector (the area that contains the first instructions executed by a computer when it is started or restarted) of a disk; those that infect both files and boot records are called bimodal viruses. Although some viruses are merely disruptive, others can destroy or corrupt data or cause an operating system or applications program to malfunction.

Millions of computer malware programs are known; they can be spread via removable disks or drives, networks, or Internet websites and services. Although the term virus is commonly used for almost all computer malware, a distinction should be made between a true virus—which must attach itself to another program to be transmitted—and a bomb, a worm, and a trojan (or Trojan horse). A bomb is a program that resides silently in a computer's memory until it is triggered by a specific condition, such as a date. A worm is a destructive program that propagates itself over a network, reproducing as it goes. A trojan is a malicious program that passes itself off as a benign application; it cannot reproduce itself and, like a virus, must be distributed by a USB drive, an external disk, Internet downloads, electronic mail, or the like. Ransomware is a type of malware that encrypts or threatens to encrypt the files on a computer until money is paid, and has become a lucrative form of extortion for organized crime. Malware can also infect advanced cellular telephones (smartphones) and other devices using software. Computer malware has been used since the early 21st cent. to steal sensitive information from government, business, and personal computers and to blackmail computer users. Virus programs that patch programs with security defects that are exploited by malicious computer viruses also exist.

Antivirus programs and hardware have been developed to combat malware. These search for evidence of a malware program (by checking for appearances or behavior that are characteristic of viruses, trojans, and the like), isolate infected files, and remove malware from a computer's software. Researchers are working to sidestep the tedious process of manually analyzing malware and creating protections against each program by developing an automated immune system for computers patterned after biological processes. In 1995 Israel became the first country to legislate penalties both for those who write malware and those who spread the programs.

Bibliography

See F. B. Cohen, A Short Course on Computer Viruses (2d ed. 1994); G. Smith, The Virus Creation Labs: A Journey into the Underground (1994); W. T. Polk et al., Anti-Virus Tools and Techniques for Computer Systems (1995); M. A. Ludwig. The Giant Black Book of Computer Viruses (2d ed. 1998); P. E. Fites, P. Johnston, and M. P. J. Kratz, The Computer Virus Crisis (1999).


virus, computer:

see computer viruscomputer virus,
rogue computer program, typically a short program designed to disperse copies of itself to other computers and disrupt those computers' normal operations.
..... Click the link for more information.
.

computer virus

References in periodicals archive ?
The primary reason for this is that in computer virus cases the economic expectations of the parties are covered by commercial and contract law--it does or does not work as promised.
With Internet usage exploding, the average user is now 20 times more likely to contract a computer virus.
Because a computer virus is a software code, it can spread through any software programs on any system.
There may be no better way to avoid becoming a victim of a computer virus.
You can double check virus alerts at the Computer Virus Myths Page at http://kumite.
Computer virus makers often reuse key parts of existing viruses in their new creations, White explains.
An increasing number of recent computer virus cases illustrates the threat posed by high-tech bandits.
The National Police Agency (NPA) said Thursday it will publish daily updates on its Web site about computer virus attacks beginning Oct.
The only difference in the case of a computer virus is that the commands are sequenced in such a way as to do damage.
The computer virus that struck in late March exposed serious weaknesses in the security of many computer systems.
An e-mail warning that computer virus hunters had initially dismissed as a hoax may actually refer to a dangerous program that could wipe out a computer's memory in a matter of minutes.
JUST AFTER 9:00 PM ON WEDNESDAY, November 2, 1988, a 23-year-old Harvard computer science graduate introduced a computer virus program into a national computer network that connected computers in military facilities, universities, and research centers across the nation.

Full browser ?