Introduction To Computer Viruses
Hello Friends, today I am going to give you a short description of a virus, or a computer virus. I would rather say we all consider any kind of malware as a computer virus, but there is a difference; a computer virus and other malware are very different.
Today I am going to give you a short difference between a virus and other malware. Now first let us understand what is a malware malware means a malicious where or a malicious software malicious software that can harm your computer system or your data.
Now virus is one kind of malware, so as we sa,y the full form of a virus is a vital information resource under seas which means it captures your vital information resources.
A virus is different from a form a virus is different from a Trojan horse how a virus can attach itself to some another program and then travel or we need to attach a virus to some another program or that some program which is not a malware a program or a application which is perfectly fine which is a regular software or a regular file which you’re you and we are using?
Now these viruses get attached to these files, or an attacker will purposely attach uh virus to these files, and once these files are initialized or they are triggered, then the virus will also trigger along with them, so a wireless needs you to trigger it, it just cannot trigger itself well.
Worms are little different they are different than a virus of worms they can trigger themselves and they can try replicating themselves or the network and they can travel over the network without any external support.

They don’t need any particular file or an application to travel over the network; these forms can travel over the network by themselves.
A Trojan horse is again very much different from a virus. A Trojan horse will look like a useful application; it will not harm your PC unless it is triggered by some external resource.
Frozen horses are self-programmed or sometimes just controlled by some external entity so till the time it is not triggered.
It will work like a useful application and once it is triggered and it will then start working but why does is not like a Trojan horse?
I would rather say a Trojan horse can contain a virus inside, which means once triggered, there could be a virus file in a Trojan horse file, which can work, and then.
Let’s try a PC what a virus can do, a virus can delete your files. It can intercept your files, it can modify the data, it can completely use your system resources, and do many, many wrong things to your machine; that’s a virus, so we need to always understand that virus forms Trojans.
These are different things, they are just not the sam,e because whenever something goes wrong with our machine, we generally simply say ok.
There is a virus, but it could be a truncheon, and it could be a bomb too, and there are many other malicious wares which might be there, and if you just think that it is just a virus, so that is the only small difference.
I would like to and now let us know the nature of a virus Here I am going to tell you different phases that our virus undergoes during its complete life cycle so one of the phases a dormant phase a dormant phase is a phase when a virus it’s idle it is nothing it just stays and awaits the command from its send on there is another phase that is a propagation phase.
Now, in this phase, a virus will try to create its identical copy in the machine, so why create its identical copy? Because one copy of a virus will remain safe, it will not be affected in case it is caught by another antivirus program.







