Various Modules and their Performance on Microsoft in Pornographic Virus

A computer virus is a software program that is able to replicate itself and spread from one infected computer to another. The infected objects can be system, document or program files. After infecting your computer, it may slow it down, damage the contents of the infected files, mislay the information or flaw your computer systems normal operation.

The virus may also use your computer to disperse illegal adverts and send spam mails which exploit security adware, steal your private information like bank account number, credit card number etc. Spyware and Some kinds of viruses may use your computer to make a boot net virtual computer system to attack other server systems and sites.

Form of viruses on Windows based computers:

There are a number of computer Viruses that could impede the operation of your computer. Here are some of the different types of viruses:

Trojan horse: It is an email Virus that is made by a document attached to the email. If opened, it may scour your hard disk for any personal and financial information like your social security for pornographic virus alert from microsoft, account and PIN numbers. When it has collected your data, it is sent via the World Wide Web to a hacker or thief.

Macro Virus: It is a computer Virus that infects the Visual Basic language files for applications like Microsoft Word, Microsoft Excel etc this sort of virus can lead to damage for example, eliminating data on the hard disk for example.

Worms: It is a program that has the capability to self-replicate itself. It may move from one computer to another and replicate itself in your computer system then disperse countless its copies to other computers which may cause wide spread damage.

Root kit Virus:  It is a program that can be done to cover the procedures, files and information in the computer Registry a database   that is used to store Windows’s system and application settings. Root kit is usually utilized to conceal the actions of viruses and procedures which harm your PC. It is to enable a hacker to control the machine.

Boot sector Virus: A virus that attaches itself to the first portion of the hard disk that is read by the computer upon boot up. These are typically distributed by floppy disks.

Logic Bombs: It is a program that is used to send lots of data to the same email address and overwhelm the machine or block the server link. Additionally it is used to threaten others as an example email bomb.

Memory Resident Virus: This Type of virus resides in the RAM. From there it can defeat and disrupt the operations executed by the computer system. It may corrupt files and programs that are opened, closed, copied, and renamed.