176 relations: Action Center, Adware, Amiga, Andrew Ross (sociologist), Antivirus software, Apple DOS, Apple Inc., ARPANET, Artificial life, Assembly language, AV-TEST, Backup, Backup and Restore, BBN Technologies, Bliss (virus), Boot sector, Booting, Botnet, Brain (computer virus), Browser Helper Object, Bulletin board, Bulletin board system, Central processing unit, CIH (computer virus), Clustered file system, Cmd.exe, CNBC, CNN, Code injection, COM file, Common Vulnerabilities and Exposures, Compact disc, Comparison of computer viruses, Component Object Model, Compression virus, Computer file, Computer program, Computer security, Computer virus, Computer worm, Control flow, Copyright infringement, Creeper (program), Crimeware, Cross-site scripting, Cryptographic hash function, Cryptovirology, Cyclic redundancy check, Database, Denial-of-service attack, ..., Desktop environment, Diplom, Disk cloning, Disk image, Download, DVD, Elk Cloner, Email, Email attachment, Emulator, Encryption, Evolutionary algorithm, Exclusive or, Executable, Exploit (computer security), File system, Floppy disk, Fred Cohen, Free software, Genetic diversity, Get a Mac, Hard disk drive, Heuristic (computer science), Heuristic analysis, Home computer, IBM PC compatible, Income, Instant messaging, Internet, Interrupt, IP address, J. B. Gunn, John von Neumann, Kaspersky Lab, Key (cryptography), Keystroke logging, Kilobyte, Lahore, Leonard Adleman, Linux, Live CD, Login, Mac OS, Macintosh, Macro (computer science), Macro virus, Malicious Software Removal Tool, Malware, Mark Russinovich, Master boot record, Metamorphic code, Microsoft Excel, Microsoft Office, Microsoft Outlook, Microsoft Safety Scanner, Microsoft Security Essentials, Microsoft Windows, Microsoft Word, Modem, MPEG-4 Part 14, MS-DOS API, Multipartite virus, National Vulnerability Database, NTFS, Open-source software, Operating system, Optical disc, Patch (computing), Patch Tuesday, PDP-10, Personal computer, Phishing, Polymorphic code, Polymorphic engine, Portable Document Format, Portable Executable, Quine (computing), Random-access memory, Ransomware, Removable media, Rich Skrenta, Rootkit, Sabotage, Safe mode, Samy (computer worm), SCA (computer virus), Security bug, Self-modifying code, Self-replication, Shareware, Simile (computer virus), Social engineering (security), Software engineering, Spamming, Spyware, Subroutine, Superuser, System File Checker, System Restore, Task manager, Technical University of Dortmund, Threat (computer), TOPS-20, Trojan horse (computing), Uniform Resource Locator, USB flash drive, Usenet, Vector (malware), Virus hoax, VirusTotal, Vulnerability (computing), Windows 3.0, Windows 7, Windows 95, Windows API, Windows Defender, Windows Live Messenger, Windows ME, Windows Media Video, Windows NT, Windows Update, Windows Vista, Windows XP, Yahoo!, Zero-day (computing), .exe. Expand index (126 more) » « Shrink index
Action Center is a notification center included with Windows Phone 8.1, Windows 10 and Windows 10 Mobile.
New!!: Computer virus and Action Center ·
Adware, or advertising-supported software, is any software package that automatically renders advertisements in order to generate revenue for its author.
New!!: Computer virus and Adware ·
The Amiga is a family of personal computers sold by Commodore in the 1980s and 1990s.
New!!: Computer virus and Amiga ·
Andrew Ross (born 1956) is a cultural studies specialist who teaches in the Department of Social and Cultural Analysis and directs the American Studies program at New York University.
Antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Apple DOS was the family of disk operating systems for the Apple II series of microcomputers from late 1978 through early 1983.
New!!: Computer virus and Apple DOS ·
Apple Inc. (commonly known as Apple) is an American multinational technology company headquartered in Cupertino, California, that designs, develops, and sells consumer electronics, computer software, and online services.
New!!: Computer virus and Apple Inc. ·
The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP.
New!!: Computer virus and ARPANET ·
Artificial life (often abbreviated ALife or A-Life) is a field of study and an associated art form which examine systems related to life, its processes, and its evolution, through the use of simulations with computer models, robotics, and biochemistry.
New!!: Computer virus and Artificial life ·
An assembly language (or assembler language) is a low-level programming language for a computer, or other programmable device, in which there is a very strong (generally one-to-one) correspondence between the language and the architecture's machine code instructions.
New!!: Computer virus and Assembly language ·
AV-TEST is an independent organization which evaluates and rates antivirus and security suite software for Microsoft Windows and Android operating systems, according to a variety of criteria.
New!!: Computer virus and AV-TEST ·
In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event.
New!!: Computer virus and Backup ·
Backup and Restore (formerly Windows Backup and Restore Center) is a component of Microsoft Windows introduced in Windows Vista and included in later versions that allows users to create backups and restore from backups.
BBN Technologies (originally Bolt, Beranek and Newman) is an American high-technology company which provides research and development services.
New!!: Computer virus and BBN Technologies ·
Bliss is a computer virus, introduced in 1997, which aims to infect Linux systems.
New!!: Computer virus and Bliss (virus) ·
A boot sector or boot block is a region of a hard disk, floppy disk, optical disc, or other data storage device that contains machine code to be loaded into random-access memory (RAM) by a computer system's built-in firmware.
New!!: Computer virus and Boot sector ·
In computing, booting (or booting up) is the initialization of a computerized system.
New!!: Computer virus and Booting ·
A botnet is a number of Internet-connected computers communicating with other similar machines in an effort to complete repetitive tasks and objectives.
New!!: Computer virus and Botnet ·
Brain is the industry standard name for a computer virus that was released in its first form in January 1986, and is considered to be the first computer virus for MS-DOS.
A Browser Helper Object (BHO) is a DLL module designed as a plugin for Microsoft's Internet Explorer web browser to provide added functionality.
A bulletin board (pinboard, pin board, noticeboard, or notice board in British English) is a surface intended for the posting of public messages, for example, to advertise items wanted or for sale, announce events, or provide information.
New!!: Computer virus and Bulletin board ·
A bulletin board system, or BBS, is a computer server running custom software that allows users to connect to the system using a terminal program.
A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions.
CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows 9x computer virus which first emerged in 1998.
A clustered file system is a file system which is shared by being simultaneously mounted on multiple servers.
Command Prompt, also known as cmd.exe or cmd (after its executable file name), is the command-line interpreter on Windows NT, Windows CE, OS/2 and eComStation operating systems.
New!!: Computer virus and Cmd.exe ·
CNBC is an American basic cable and satellite business news television channel that is owned by NBCUniversal News Group, a division of Comcast Corporation.
New!!: Computer virus and CNBC ·
The Cable News Network (CNN) is an American basic cable and satellite television channel that is owned by the Turner Broadcasting System division of Time Warner.
New!!: Computer virus and CNN ·
Code injection is the exploitation of a computer bug that is caused by processing invalid data.
New!!: Computer virus and Code injection ·
A COM file is a type of simple executable file.
New!!: Computer virus and COM file ·
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures.
Compact disc (CD) is a digital optical disc data storage format.
New!!: Computer virus and Compact disc ·
To aid the fight against computer viruses and other types of malicious software, many security advisory organizations and developers of anti-virus software compile and publish lists of viruses.
Component Object Model (COM) is a binary-interface standard for software components introduced by Microsoft in 1993.
A compression virus is an example of a benevolent computer virus, invented by Fred Cohen.
New!!: Computer virus and Compression virus ·
A computer file is a resource for storing information, which is available to a computer program and is usually based on some kind of durable storage.
New!!: Computer virus and Computer file ·
A computer program or app is a sequence of instructions, written to perform a specified task on a computer.
New!!: Computer virus and Computer program ·
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
New!!: Computer virus and Computer security ·
A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".
New!!: Computer virus and Computer virus ·
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.
New!!: Computer virus and Computer worm ·
In computer science, control flow (or alternatively, flow of control) refers to the specification of the order in which the individual statements, instructions or function calls of an imperative program are executed or evaluated.
New!!: Computer virus and Control flow ·
Copyright infringement is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works.
Creeper was an experimental self-replicating program written by Bob Thomas at BBN in 1971.
New!!: Computer virus and Creeper (program) ·
Crimeware is a class of malware designed specifically to automate cybercrime.
New!!: Computer virus and Crimeware ·
Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications.
A cryptographic hash function is a hash function which is considered practically impossible to invert, that is, to recreate the input data from its hash value alone.
Cryptovirology is a field that studies how to use cryptography to design powerful malicious software.
New!!: Computer virus and Cryptovirology ·
A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.
A database is an organized collection of data.
New!!: Computer virus and Database ·
In computing, a denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
In computing, a desktop environment (DE) is an implementation of the desktop metaphor made of a bundle of programs running on top of a computer operating system, which share a common graphical user interface (GUI).
A Diplom (from δίπλωμα diploma) is an academic degree in the German-speaking countries Germany, Austria, and Switzerland and a similarly named degree in some other European countries including Bulgaria, Belarus, Bosnia and Herzegovina, Croatia, Estonia, Finland (only for engineers), France, Greece, Hungary, Russia, Romania, Serbia, Macedonia, Slovenia, and Ukraine.
New!!: Computer virus and Diplom ·
Disk cloning is the process of copying the contents of one computer hard disk to another disk or to an "image" file.
New!!: Computer virus and Disk cloning ·
Disk images, in computing, are computer files containing the contents and structure of a disk volume or an entire data storage device, such as a hard disk drive, tape drive, floppy disk, optical disc or USB flash drive.
New!!: Computer virus and Disk image ·
In computer networks, to download means to receive data to a local system from a remote system, or to initiate such a data transfer.
New!!: Computer virus and Download ·
DVD ("digital versatile disc" or "digital video disc") is a digital optical disc storage format invented and developed by Philips, Sony, Toshiba, and Panasonic in 1995.
New!!: Computer virus and DVD ·
Elk Cloner is one of the first known microcomputer viruses that spread "in the wild", i.e., outside the computer system or laboratory in which it was written.
New!!: Computer virus and Elk Cloner ·
Electronic mail, most commonly referred to as email or e-mail since around 1993, is a method of exchanging digital messages from an author to one or more recipients.
New!!: Computer virus and Email ·
An email attachment is a computer file sent along with an email message.
New!!: Computer virus and Email attachment ·
In computing, an emulator is hardware or software that enables one computer system (called the host) to behave like another computer system (called the guest).
New!!: Computer virus and Emulator ·
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it.
New!!: Computer virus and Encryption ·
In artificial intelligence, an evolutionary algorithm (EA) is a subset of evolutionary computation, a generic population-based metaheuristic optimization algorithm.
Exclusive disjunction or exclusive or is a logical operation that outputs true only when both inputs differ (one is true, the other is false).
New!!: Computer virus and Exclusive or ·
In computing, an executable file or executable program, or sometimes simply an executable, causes a computer "to perform indicated tasks according to encoded instructions," as opposed to a data file that must be parsed by a program to be meaningful.
New!!: Computer virus and Executable ·
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).
In computing, a file system (or filesystem) is used to control how data is stored and retrieved.
New!!: Computer virus and File system ·
A floppy disk, also called a diskette or just disk, is a type of disk storage composed of a disk of thin and flexible magnetic storage medium, sealed in a rectangular plastic carrier lined with fabric that removes dust particles.
New!!: Computer virus and Floppy disk ·
Frederick B. Cohen (born 1956) is an American computer scientist and best known as the inventor of computer virus defense techniques.
New!!: Computer virus and Fred Cohen ·
Free software, software libre, or libre software is computer software that gives users the freedom to run the software for any purpose as well as to study, change, and distribute the software and the adapted versions.
New!!: Computer virus and Free software ·
Genetic diversity is the total number of genetic characteristics in the genetic makeup of a species.
New!!: Computer virus and Genetic diversity ·
The Get a Mac campaign was a television advertising campaign created for Apple Inc. (Apple Computer, Inc. at the start of the campaign) by TBWA\Media Arts Lab, the company's advertising agency, that ran from 2006 to 2009.
New!!: Computer virus and Get a Mac ·
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid ("hard") rapidly rotating disks (platters) coated with magnetic material.
New!!: Computer virus and Hard disk drive ·
In computer science, artificial intelligence, and mathematical optimization, a heuristic is a technique designed for solving a problem more quickly when classic methods are too slow, or for finding an approximate solution when classic methods fail to find any exact solution.
Heuristic analysis is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the "wild".
Home computers were a class of microcomputers (almost all 8-bit) entering the market in 1977, and becoming common during the 1980s.
New!!: Computer virus and Home computer ·
IBM PC compatible computers are those similar to the original IBM PC, XT, and AT and able to run the same software as those.
New!!: Computer virus and IBM PC compatible ·
Income is the consumption and savings opportunity gained by an entity within a specified timeframe, which is generally expressed in monetary terms.
New!!: Computer virus and Income ·
Instant messaging (IM) is a type of online chat which offers real-time text transmission over the Internet.
New!!: Computer virus and Instant messaging ·
The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide.
New!!: Computer virus and Internet ·
In systems programming, an interrupt is a signal to the processor emitted by hardware or software indicating an event that needs immediate attention.
New!!: Computer virus and Interrupt ·
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.
New!!: Computer virus and IP address ·
John Battiscombe "J.
New!!: Computer virus and J. B. Gunn ·
John von Neumann (Hungarian: Neumann János,; December 28, 1903 – February 8, 1957) was a Hungarian-American pure and applied mathematician, physicist, inventor, polymath, and polyglot.
New!!: Computer virus and John von Neumann ·
Kaspersky Lab (Russian: Лаборатория Касперского, Laboratoriya Kasperskovo) is an international software security group operating in almost 200 countries and territories worldwide.
New!!: Computer virus and Kaspersky Lab ·
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher.
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
New!!: Computer virus and Keystroke logging ·
The kilobyte is a multiple of the unit byte for digital information.
New!!: Computer virus and Kilobyte ·
Lahore (ALA-LC:; لہور, لاہور ALA-LC) is the capital city of the Pakistani province of Punjab, the second largest metropolitan area in the country and 16th most populous city in the world.
New!!: Computer virus and Lahore ·
Leonard Max Adleman (born December 31, 1945) is an American theoretical computer scientist and professor of computer science and molecular biology at the University of Southern California.
New!!: Computer virus and Leonard Adleman ·
Linux (pronounced or, less frequently) is a Unix-like and mostly POSIX-compliant computer operating system (OS) assembled under the model of free and open-source software development and distribution.
New!!: Computer virus and Linux ·
A live CD, live DVD, or live disc is a complete bootable computer installation including operating system which runs in a computer's memory, rather than loading from a hard disk drive; the CD itself is read-only.
New!!: Computer virus and Live CD ·
In computer security, a login or logon or sign in or sign on refers to the credentials required to obtain access to a computer system or other restricted area.
New!!: Computer virus and Login ·
Mac OS is a series of graphical user interface–based operating systems developed by Apple Inc. for their Macintosh line of computer systems.
New!!: Computer virus and Mac OS ·
The Macintosh (branded as Mac since 1998) is a series of personal computers (PCs) designed, developed, and marketed by Apple Inc. Steve Jobs introduced the original Macintosh computer on January 24, 1984.
New!!: Computer virus and Macintosh ·
A macro (short for "macroinstruction", from Greek μακρο- 'long') in computer science is a rule or pattern that specifies how a certain input sequence (often a sequence of characters) should be mapped to a replacement output sequence (also often a sequence of characters) according to a defined procedure.
In computing terminology, a macro virus is a virus that is written in a macro language: that is to say, a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications).
New!!: Computer virus and Macro virus ·
Microsoft Windows Malicious Software Removal Tool is a freely distributed virus removal tool developed by Microsoft for the Microsoft Windows operating system.
Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
New!!: Computer virus and Malware ·
Mark Eugene Russinovich (born 1966) is CTO of Microsoft Azure.
New!!: Computer virus and Mark Russinovich ·
A master boot record (MBR) is a special type of boot sector at the very beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond.
Metamorphic code is code that when run outputs a logically equivalent version of its own code under some interpretation.
New!!: Computer virus and Metamorphic code ·
Microsoft Excel is a spreadsheet application developed by Microsoft for Microsoft Windows,, and iOS.
New!!: Computer virus and Microsoft Excel ·
Microsoft Office is an office suite of applications, servers and services.
New!!: Computer virus and Microsoft Office ·
Microsoft Outlook is a personal information manager from Microsoft, available as a part of the Microsoft Office suite.
New!!: Computer virus and Microsoft Outlook ·
Microsoft Safety Scanner is a free disposable virus scanner similar to Windows Malicious Software Removal Tool that can be used to scan a system for computer viruses and other forms of malware.
Microsoft Security Essentials (MSE) is an antivirus software (AV) product that provides protection against different types of malicious software such as computer viruses, spyware, rootkits and Trojan horses.
Microsoft Windows (or simply Windows) is a metafamily of graphical operating systems developed, marketed, and sold by Microsoft.
New!!: Computer virus and Microsoft Windows ·
Microsoft Word is a word processor developed by Microsoft.
New!!: Computer virus and Microsoft Word ·
A modem (modulator-demodulator) is a device that modulates signals to encode digital information and demodulates signals to decode the transmitted information.
New!!: Computer virus and Modem ·
MPEG-4 Part 14 or MP4 is a digital multimedia format most commonly used to store video and audio, but can also be used to store other data such as subtitles and still images.
New!!: Computer virus and MPEG-4 Part 14 ·
The MS-DOS API is an API which originated with 86-DOS and is used in MS-DOS/PC DOS and other DOS-compatible operating systems.
New!!: Computer virus and MS-DOS API ·
A multipartite virus is a computer virus that infects and spreads in multiple ways.
The National Vulnerability Database is the U.S. government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol (SCAP).
NTFS (New Technology File System) is a proprietary file system developed by Microsoft.
New!!: Computer virus and NTFS ·
Open-source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose.
An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.
New!!: Computer virus and Operating system ·
In computing and optical disc recording technologies, an optical disc (OD) is a flat, usually circular disc which encodes binary data (bits) in the form of pits (binary value of 0 or off, due to lack of reflection when read) and lands (binary value of 1 or on, due to a reflection when read) on a special material (often aluminium) on one of its flat surfaces.
New!!: Computer virus and Optical disc ·
A patch is a piece of software designed to update a computer program or its supporting data, to fix or improve it.
New!!: Computer virus and Patch (computing) ·
Patch Tuesday (a.k.a. Update Tuesday) is an unofficial term used to refer to when Microsoft regularly releases security patches for its software products.
New!!: Computer virus and Patch Tuesday ·
The PDP-10 is a discontinued mainframe computer family manufactured by Digital Equipment Corporation (DEC) from 1966 into the 1980s.
New!!: Computer virus and PDP-10 ·
A personal computer is a general-purpose computer whose size, capabilities and original sale price make it useful for individuals, and is intended to be operated directly by an end-user with no intervening computer operator.
New!!: Computer virus and Personal computer ·
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
New!!: Computer virus and Phishing ·
In computer terminology, polymorphic code is code that uses a polymorphic engine to mutate while keeping the original algorithm intact.
New!!: Computer virus and Polymorphic code ·
A polymorphic engine (sometimes called mutation engine or mutating engine) is a computer program that can be used to transform a program into a subsequent version that consists of different code yet operates with the same functionality.
Portable Document Format (PDF) is a file format used to present documents in a manner independent of application software, hardware and operating systems.
The Portable Executable (PE) format is a file format for executables, object code, DLLs, FON Font files, and others used in 32-bit and 64-bit versions of Windows operating systems.
A quine is a non-empty computer program which takes no input and produces a copy of its own source code as its only output.
New!!: Computer virus and Quine (computing) ·
Random-access memory (RAM) is a form of computer data storage.
Ransomware is a type of malware that restricts access to a computer system that it infects in some way, and demands that the user pay a ransom to the operators of the malware to remove the restriction.
New!!: Computer virus and Ransomware ·
In computer storage, some types of removable media are designed to be read to or written to by removable readers, writers and drives.
New!!: Computer virus and Removable media ·
Richard "Rich" Skrenta (born 1967 in Pittsburgh, Pennsylvania) is a computer programmer and Silicon Valley entrepreneur who created the search engine blekko.
New!!: Computer virus and Rich Skrenta ·
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that would not otherwise be allowed (for example, to an unauthorized user) while at the same time masking its existence or the existence of other software.
New!!: Computer virus and Rootkit ·
Sabotage is a deliberate action aimed at weakening a polity or corporation through subversion, obstruction, disruption, or destruction.
New!!: Computer virus and Sabotage ·
Safe mode is a diagnostic mode of a computer operating system (OS).
New!!: Computer virus and Safe mode ·
Samy (also known as JS.Spacehero) is an XSS worm that was designed to propagate across the MySpace social-networking site written by Samy Kamkar.
The SCA virus is the first computer virus created for the Commodore Amiga and one of the first to gain public notoriety.
A security bug or security defect is a software bug that can be exploited to gain unauthorized access or privileges on a computer system.
New!!: Computer virus and Security bug ·
In computer science, self-modifying code is code that alters its own instructions while it is executing - usually to reduce the instruction path length and improve performance or simply to reduce otherwise repetitively similar code, thus simplifying maintenance.
Self-replication is any behavior of a dynamical system that yields construction of an identical copy of itself.
New!!: Computer virus and Self-replication ·
Shareware is a type of proprietary software which is provided (initially) free of charge to users, who are allowed and encouraged to make and share copies of the program, which helps to distribute it.
New!!: Computer virus and Shareware ·
Win32/Simile (also known as Etap and MetaPHOR) is a metamorphic computer virus written in assembly language for Microsoft Windows.
Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.
Software engineering is the study and an application of engineering to the design, development, and maintenance of software.
Electronic spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site.
New!!: Computer virus and Spamming ·
Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.
New!!: Computer virus and Spyware ·
In computer programming, a subroutine is a sequence of program instructions that perform a specific task, packaged as a unit.
New!!: Computer virus and Subroutine ·
In computing, the superuser is a special user account used for system administration.
New!!: Computer virus and Superuser ·
System File Checker is a utility in Microsoft Windows that allows users to scan for and restore corruptions in Windows system files.
System Restore is a feature in Microsoft Windows that allows the user to revert their computer's state (including system files, installed applications, Windows Registry, and system settings) to that of a previous point in time, which can be used to recover from system malfunctions or other problems.
New!!: Computer virus and System Restore ·
A task manager is a system monitor program used to provide information about the processes and programs running on a computer, as well as the general status of the computer.
New!!: Computer virus and Task manager ·
TU Dortmund University (Technische Universität Dortmund) is a university in Dortmund, North Rhine-Westphalia, Germany with over 20,000 students, and over 3,000 staff.
In computer security a threat is a possible danger that might exploit a vulnerability to breach security and thus cause possible harm.
New!!: Computer virus and Threat (computer) ·
The TOPS-20 operating system by Digital Equipment Corporation (DEC) was a proprietary OS for the PDP-10 mainframe computer.
New!!: Computer virus and TOPS-20 ·
A Trojan horse, or Trojan, in computing is any malicious computer program which misrepresents itself as useful, routine, or interesting in order to persuade a victim to install it.
A Uniform Resource Locator (URL) (commonly informally referred to as a web address, although the term is not defined identically) is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.
A USB flash drive, also known under a variety of other names, is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface.
New!!: Computer virus and USB flash drive ·
Usenet is a worldwide distributed discussion system.
New!!: Computer virus and Usenet ·
A vector in computing, specifically when talking about malicious code such as viruses or worms, is the method that this code uses to propagate itself or infect the computer.
New!!: Computer virus and Vector (malware) ·
A computer virus hoax is a message warning the recipients of a non-existent computer virus threat.
New!!: Computer virus and Virus hoax ·
VirusTotal is a website, originally developed by Hispasec, that provides free checking of files for viruses. It uses 55 different antivirus products and 61 online scan engines to check for viruses that the user's own antivirus solution may have missed, or to verify against any false positives. Files up to 128 MB can be uploaded to the website or sent via email. Anti-virus software vendors can receive copies of files that were flagged by other scans but passed by their own engine, to help improve their software and, by extension, VirusTotal's own capability. Users can also scan suspect URLs and search through the VirusTotal dataset. VirusTotal for dynamic analysis of malware use Cuckoo sandbox. At the moment, VirusTotal is available in 24 languages. VirusTotal was selected by PC World as one of the best 100 products of 2007. Friday, 7 September 2012 it was announced that Google Inc. had acquired VirusTotal from Hispasec.
New!!: Computer virus and VirusTotal ·
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
Windows 3.0, a graphical environment, is the third major release of Microsoft Windows, and was released on May 22, 1990.
New!!: Computer virus and Windows 3.0 ·
Windows 7 (codenamed Vienna, formerly Blackcomb) is a personal computer operating system developed by Microsoft.
New!!: Computer virus and Windows 7 ·
Windows 95 (codenamed Chicago) is a consumer-oriented operating system developed by Microsoft.
New!!: Computer virus and Windows 95 ·
The Windows API, informally WinAPI, is Microsoft's core set of application programming interfaces (APIs) available in the Microsoft Windows operating systems.
New!!: Computer virus and Windows API ·
Windows Defender is a software product that attempts to detect and remove malware.
New!!: Computer virus and Windows Defender ·
Windows Live Messenger (formerly MSN Messenger) is a discontinued instant messaging client developed by Microsoft for Windows, Xbox 360, Blackberry OS, iOS, Java ME, S60 on Symbian OS 9.x, and Zune HD.
Windows Millennium Edition, or Windows ME (marketed with the pronunciation of the pronoun "me", but commonly pronounced as an initialism, "M-E"), is a graphical operating system from Microsoft released to manufacturing in June 2000, and launched in September 2000.
New!!: Computer virus and Windows ME ·
Windows Media Video (WMV) is a file type which can contain video in one of several video compression formats developed by Microsoft.
Windows NT is a family of operating systems produced by Microsoft, the first version of which was released in July 1993.
New!!: Computer virus and Windows NT ·
Windows Update (WU), a service offered by Microsoft, provides updates for Windows components.
New!!: Computer virus and Windows Update ·
Windows Vista (codenamed Longhorn) is an operating system by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.
New!!: Computer virus and Windows Vista ·
Windows XP (codenamed Whistler) is a personal computer operating system that was produced by Microsoft as part of the Windows NT family of operating systems.
New!!: Computer virus and Windows XP ·
Yahoo Inc. (styled as Yahoo!) is an American multinational technology company headquartered in Sunnyvale, California.
New!!: Computer virus and Yahoo! ·
A zero-day (also known as zero-hour or 0-day) vulnerability is an undisclosed and uncorrected computer application vulnerability that could be exploited to adversely affect the computer programs, data, additional computers or a network.
.exe is a common filename extension denoting an executable file (the main execution point of a computer program) for DOS, OpenVMS, Microsoft Windows, Symbian or OS/2.
New!!: Computer virus and .exe ·
@mm, Boot sector virus, Boot virus, Computer Virus, Computer Virus Wikipedia, Computer Viruses, Computer viri, Computer virology, Computer virus threat, Computer viruses, Comuter virus, DOS Boot Record infector virus, E-mail virus, Email virus, File infector, File virus, Hello (computer virus), Internet virus, Mail virus, Online virus, Pc virus, Phone Virus, Software virus, Stealth virus, Stealth virus (computers), Stealth-adapted virus, Summary of Computer Viruses, Surfsidekick, Threat of internet viruses, Viral programming, Virus (computer), Virus (computers), Virus (computing), Virus program, Virus signature, Vital Information Resource Under Siege.