![]() ![]() Virus writers use social engineering deceptions and exploit detailed knowledge of security vulnerabilities to initially infect systems and to spread the virus. Therefore, it is not restricted by the host program, but can run independently and actively carry out attacks. By contrast, a computer worm does not need a host program, as it is an independent program or code chunk. When the program runs, the written virus program is executed first, causing infection and damage. The virus writes its own code into the host program. Ĭomputer viruses generally require a host program. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |