Computer Viruses and How to Deal With Them

1- What is a computer virus:

A computer virus is a software program that can replicate and spread from one infected computer to another. The infected objects can be a system, program, or document files. After infecting your computer, it might slow it down, damage the infected files’ contents, mislay the data, or defect your computer system’s normal operation.

Computer Viruses

The virus can also use your computer to propagate illegal adverts, send spam emails that exploit security (adWare), and steal your personal information such as bank account number, credit card number, etc. (SpyWare). Some viruses might use your computer to create a botnet (virtual computer network) to attack other server systems, websites, etc.

2- Type of viruses on Windows-based computers:

Several computer viruses can impede the functioning of your computer. Here are some of the different types of viruses:

Trojan Horse: It is an email virus that is created by a file attached to the email. If opened, it may scour your hard drive for personal and financial information, such as your social security account and PINs. Once it has collected your info, it is sent to a hacker or thief via the Internet.

Macro Virus: A computer virus infects the Visual Basic language documents for Microsoft Word, Microsoft Excel, etc. This type of virus can cause damage (such as removing data on the hard disk, for example).

Worms: It is a program that can self-replicate itself. It can move from one computer to another and replicate itself in your computer system, then spread hundreds of its copies to other computers that might cause widespread damage.

Rootkit Virus: It is a program that can cover the processes, files, and data in the computer Registry (a database used to save Windows’s system and program settings). A rootkit is usually used to hide the activities of viruses and processes that harm your computer. It is to help a hacker to control the system.


Boot Sector Virus: A virus that attaches itself to the first part of the hard disk read by the computer upon bootup. Floppy disks normally spread these.

Logic Bombs: A program sends data to the same email address, overwhelms the system, or blocks the server connection. It is also used to threaten others (for example, a mail bomb, etc.).

Memory Resident Virus: This type of virus dwells in the RAM. From there, it can overcome and interrupt the operations executed by the system. It can corrupt files and programs that are opened, closed, copied, renamed, etc.

Multipartite Virus: These viruses spread in multiple ways. It might vary in action depending on where it’s installed and the presence of certain files.

3- How do you get a virus and Prevention:

These are three common ways that your computer may get infected by viruses:

Email: You get an email from someone with one or more viruses. If the attachment is opened, the viruses may infect files in the computer. The viruses might also automatically email people from your email address book or folder. It would help if you did not open unknown email attachments or do a virus scan after opening them.

Internet: If you download an exec file or a data file from the Internet or other shared networks, viruses might be transferred to your computer. Sometimes free software programs on the Internet have viruses, especially if downloaded from Torrent or Usenet newsgroups. Therefore, if necessary, you should download files from trusted resources.

Peripheral devices: Devices such as MP3 players, USB thumb drives, Memory cards, or CD Rom are also means for spreading viruses. So, remember to do a virus scan for them after they are connected to your computer.

4- Symptoms of virus infection:

These are some of the symptoms that may indicate virus activity:

• Your computer has unusual activity (e.g., programs crashing a lot or running slowly).

• Messages or images (unrelated to your current task) come up unexpectedly.

• A program may start up unexpectedly.

• Your firewall informs that a certain application is trying to connect to the Internet (unrelated to what you are working on).

• Your friends say they get emails from you, but you did not send any to them.

• You receive many system error announcements. (Note: This may also come from another activity, such as a hardware problem or genuine system error.)

Windows does not run when you start up your computer. (Note: This may also come from a hard disk problem.)

• You realize that folders and files are removed or changed.

• You can access your hard disk (one of the small lights is blinking) even though no programs are running.

• Your web browser has abnormal indications; for example, it opens an unknown web page, or you cannot close the browser tabs.

• Advertising pages pop up, and desktop wallpaper changes.

• Exe files occur and have the same names as the folders.

• On the right corner of your computer, there is a small symbol written “Your computer is infected” or “Virus Alert,” etc.

• When you open a USB thumb drive, unknown files such as Autorun. In New Folder.exe, etc., appear.

• Cannot press Control + Alt + Delete (Task Manager), and you are warned that the Administrator banned it.

• Folder Options disappear.

• Your computer keeps restarting when you try to shut it down.

• You cannot log in to your Windows account with the right login details.

5- What to do when infected:

• Make sure that your Antivirus software is the latest update. If necessary, download the update from another computer and update it manually.

• Disconnect from the Internet or Local Area Network (LAN).

• If Windows is not running, start it in Safe Mode (when turning on your computer, keep pressing F8 as soon as it starts running, then choose ‘Safe Mode’ from the Menu).

• Run a full Antivirus scan.

• If your computer is quite infected, but you have important files or documents on it, do a full scan with your updated Antivirus software. If it finds viruses, delete them, open each ancillary disk (USB, Thumb drive, etc.), and look for Autorun. Inf files and remove them. Afterward, restart your computer.

• If you have any difficulties finding a way to remove bad programs, refer to your Internet Security Software Supplier to look for an essential dedicated tool to remove them.

• If you find a bad program, follow the instructions of your Internet Security Software Supplier. Good Security software will provide options such as turning off infected files and isolating possibly infected files, Worms, and Trojans removal.

• If you do not have any important files on your computer disks, format the disk and re-install your Windows and applications. This is quite an extreme and lengthy process, and it’s recommended to back up your computer settings before commencing. When finished, do not open on any ancillary disks (USB, Thumb drives, etc.) yet; install the Antivirus software, do a full scan, and find Autorun. In files and remove them. Restart your computer after that.

• If the Antivirus software finds nothing, your computer may not hardware and software installed on your computer meet the hardware specifications of the Operating System. Delete unnecessary or unwanted programs to save resources and ensure you have updated your Windows OS via Windows Update.

About author

I work for WideInfo and I love writing on my blog every day with huge new information to help my readers. Fashion is my hobby and eating food is my life. Social Media is my blood to connect my family and friends.
    Related posts

    Best Gaming Computer


    Buying a Well-Configured Computer


    The Ultimate Minicomputer Build Guide for Beginners


    Simple Tips to Recover Data from Damaged Hard Disk Drive

    Sign up for our newsletter and stay informed !