What is Cyber Attack A cyber attack is any type of offensive
Computer Virus Information-stay ahead
Most frequently takled
It is the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device’s processor.RAM is a volatile memory.
This is a hardware medium in computer device that permanently stores data on computer. It contains the programming needed to start a computer, which is essential for boot-up.ROM is not volatile memory
The term “sparse infector” is sometimes used to describe a virus that infects only occasionally (e.g. every tenth program executed), or only
files whose lengths fall within a narrow range, etc.
Macs and iPads are immune to catching viruses (and don’t need an antivirus). For the most part, that’s true. At the very least, it hasn’t happened in a long time.
Do windows get malware ?
There isn’t one clear reason why Windows has the most viruses of any operating system.The latest versions of Windows are much more secure but windows still remains a target.
A computer virus is an application that needs to be downloaded or otherwise transferred onto the host computer before the infection can take place
A computer worm is an application that accesses a computer over a network.It doesn’t require the user to download or open any host application.
Virus vs Trojan
A computer virus is a small program written to alter the way a computer operates, without the permission of the user.It can execute and replicate itself.
they do not replicate themselves like virus. Trojan horse spread through attachment
There have been viruses that have been designed to physically damage computers or hardware equipment connected to computers. One of the most notable viruses capable of damaging hardware is Stuxnet, which was designed to target industrial equipment, like nuclear reactors.
Where Computer Virus can not infect ?
A computer virus cannot infect a CD or DVD, as most CDs or DVDs are locked after being created, preventing additional files from being put on that disc. However, if during the creation of the disc a virus is also copied to the disc it would become infected.