Steps to make a Computer Virus

Viruses spread through network systems

A virus is actually a piece of software that replicates itself by scanning networks, security holes and data files. Once that finds a machine that has a reliability hole, it copies itself to that pc and starts replicating.

Malware can invade computers running any operating system and any computer software, but they’re most likely to target Windows equipment. They also assail Macs, iOS and Google android devices, Linux machines and IoT gadgets.

E-mail viruses

A virus’s infectious code is usually confined in an executable host document, such as an. EXE,. COM or perhaps. VBS plan. This allows the malware to do itself when the file is opened or downloaded. The file could be attached to a document, sent over the network, or perhaps stored on the removable storage device like a USB drive or perhaps hard disk.

Macro (Microsoft Office)

Another type of e-mail pathogen is a macro, which is a program that’s inlayed into Microsoft company Word or Excel paperwork. When you open an afflicted doc, it runs the virus’s malicious code, which can do anything from encrypting your data files to sending out spam messages to commandeered accounts.


A worm is another type of trojan that recreates itself on the internet. It scans for other machines which have a security hole and dégo?tant them. It uses up a whole lot of processing time and network bandwidth, and it occasionally causes key damage. A few famous worms include Code Red, which usually caused mayhem in 2001, and Slammer, which will hit Glass windows and MS SQL servers in 2003.

Leave a Comment

Your email address will not be published. Required fields are marked *