Get it on Google Play
New! Download Unionpedia on your Android™ device!
Faster access than browser!
New! » Create account

A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". [1]

176 relations: Action Center, Adware, Amiga, Andrew Ross (sociologist), Antivirus software, Apple DOS, Apple Inc., ARPANET, Artificial life, Assembly language, AV-TEST, Backup, Backup and Restore, BBN Technologies, Bliss (virus), Boot sector, Booting, Botnet, Brain (computer virus), Browser Helper Object, Bulletin board, Bulletin board system, Central processing unit, CIH (computer virus), Clustered file system, Cmd.exe, CNBC, CNN, Code injection, COM file, Common Vulnerabilities and Exposures, Compact disc, Comparison of computer viruses, Component Object Model, Compression virus, Computer file, Computer program, Computer security, Computer virus, Computer worm, Control flow, Copyright infringement, Creeper (program), Crimeware, Cross-site scripting, Cryptographic hash function, Cryptovirology, Cyclic redundancy check, Database, Denial-of-service attack, ..., Desktop environment, Diplom, Disk cloning, Disk image, Download, DVD, Elk Cloner, Email, Email attachment, Emulator, Encryption, Evolutionary algorithm, Exclusive or, Executable, Exploit (computer security), File system, Floppy disk, Fred Cohen, Free software, Genetic diversity, Get a Mac, Hard disk drive, Heuristic (computer science), Heuristic analysis, Home computer, IBM PC compatible, Income, Instant messaging, Internet, Interrupt, IP address, J. B. Gunn, John von Neumann, Kaspersky Lab, Key (cryptography), Keystroke logging, Kilobyte, Lahore, Leonard Adleman, Linux, Live CD, Login, Mac OS, Macintosh, Macro (computer science), Macro virus, Malicious Software Removal Tool, Malware, Mark Russinovich, Master boot record, Metamorphic code, Microsoft Excel, Microsoft Office, Microsoft Outlook, Microsoft Safety Scanner, Microsoft Security Essentials, Microsoft Windows, Microsoft Word, Modem, MPEG-4 Part 14, MS-DOS API, Multipartite virus, National Vulnerability Database, NTFS, Open-source software, Operating system, Optical disc, Patch (computing), Patch Tuesday, PDP-10, Personal computer, Phishing, Polymorphic code, Polymorphic engine, Portable Document Format, Portable Executable, Quine (computing), Random-access memory, Ransomware, Removable media, Rich Skrenta, Rootkit, Sabotage, Safe mode, Samy (computer worm), SCA (computer virus), Security bug, Self-modifying code, Self-replication, Shareware, Simile (computer virus), Social engineering (security), Software engineering, Spamming, Spyware, Subroutine, Superuser, System File Checker, System Restore, Task manager, Technical University of Dortmund, Threat (computer), TOPS-20, Trojan horse (computing), Uniform Resource Locator, USB flash drive, Usenet, Vector (malware), Virus hoax, VirusTotal, Vulnerability (computing), Windows 3.0, Windows 7, Windows 95, Windows API, Windows Defender, Windows Live Messenger, Windows ME, Windows Media Video, Windows NT, Windows Update, Windows Vista, Windows XP, Yahoo!, Zero-day (computing), .exe. Expand index (126 more) »

Action Center

Action Center is a notification center included with Windows Phone 8.1, Windows 10 and Windows 10 Mobile.

New!!: Computer virus and Action Center · See more »


Adware, or advertising-supported software, is any software package that automatically renders advertisements in order to generate revenue for its author.

New!!: Computer virus and Adware · See more »


The Amiga is a family of personal computers sold by Commodore in the 1980s and 1990s.

New!!: Computer virus and Amiga · See more »

Andrew Ross (sociologist)

Andrew Ross (born 1956) is a cultural studies specialist who teaches in the Department of Social and Cultural Analysis and directs the American Studies program at New York University.

New!!: Computer virus and Andrew Ross (sociologist) · See more »

Antivirus software

Antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.

New!!: Computer virus and Antivirus software · See more »

Apple DOS

Apple DOS was the family of disk operating systems for the Apple II series of microcomputers from late 1978 through early 1983.

New!!: Computer virus and Apple DOS · See more »

Apple Inc.

Apple Inc. (commonly known as Apple) is an American multinational technology company headquartered in Cupertino, California, that designs, develops, and sells consumer electronics, computer software, and online services.

New!!: Computer virus and Apple Inc. · See more »


The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP.

New!!: Computer virus and ARPANET · See more »

Artificial life

Artificial life (often abbreviated ALife or A-Life) is a field of study and an associated art form which examine systems related to life, its processes, and its evolution, through the use of simulations with computer models, robotics, and biochemistry.

New!!: Computer virus and Artificial life · See more »

Assembly language

An assembly language (or assembler language) is a low-level programming language for a computer, or other programmable device, in which there is a very strong (generally one-to-one) correspondence between the language and the architecture's machine code instructions.

New!!: Computer virus and Assembly language · See more »


AV-TEST is an independent organization which evaluates and rates antivirus and security suite software for Microsoft Windows and Android operating systems, according to a variety of criteria.

New!!: Computer virus and AV-TEST · See more »


In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event.

New!!: Computer virus and Backup · See more »

Backup and Restore

Backup and Restore (formerly Windows Backup and Restore Center) is a component of Microsoft Windows introduced in Windows Vista and included in later versions that allows users to create backups and restore from backups.

New!!: Computer virus and Backup and Restore · See more »

BBN Technologies

BBN Technologies (originally Bolt, Beranek and Newman) is an American high-technology company which provides research and development services.

New!!: Computer virus and BBN Technologies · See more »

Bliss (virus)

Bliss is a computer virus, introduced in 1997, which aims to infect Linux systems.

New!!: Computer virus and Bliss (virus) · See more »

Boot sector

A boot sector or boot block is a region of a hard disk, floppy disk, optical disc, or other data storage device that contains machine code to be loaded into random-access memory (RAM) by a computer system's built-in firmware.

New!!: Computer virus and Boot sector · See more »


In computing, booting (or booting up) is the initialization of a computerized system.

New!!: Computer virus and Booting · See more »


A botnet is a number of Internet-connected computers communicating with other similar machines in an effort to complete repetitive tasks and objectives.

New!!: Computer virus and Botnet · See more »

Brain (computer virus)

Brain is the industry standard name for a computer virus that was released in its first form in January 1986, and is considered to be the first computer virus for MS-DOS.

New!!: Computer virus and Brain (computer virus) · See more »

Browser Helper Object

A Browser Helper Object (BHO) is a DLL module designed as a plugin for Microsoft's Internet Explorer web browser to provide added functionality.

New!!: Computer virus and Browser Helper Object · See more »

Bulletin board

A bulletin board (pinboard, pin board, noticeboard, or notice board in British English) is a surface intended for the posting of public messages, for example, to advertise items wanted or for sale, announce events, or provide information.

New!!: Computer virus and Bulletin board · See more »

Bulletin board system

A bulletin board system, or BBS, is a computer server running custom software that allows users to connect to the system using a terminal program.

New!!: Computer virus and Bulletin board system · See more »

Central processing unit

A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions.

New!!: Computer virus and Central processing unit · See more »

CIH (computer virus)

CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows 9x computer virus which first emerged in 1998.

New!!: Computer virus and CIH (computer virus) · See more »

Clustered file system

A clustered file system is a file system which is shared by being simultaneously mounted on multiple servers.

New!!: Computer virus and Clustered file system · See more »


Command Prompt, also known as cmd.exe or cmd (after its executable file name), is the command-line interpreter on Windows NT, Windows CE, OS/2 and eComStation operating systems.

New!!: Computer virus and Cmd.exe · See more »


CNBC is an American basic cable and satellite business news television channel that is owned by NBCUniversal News Group, a division of Comcast Corporation.

New!!: Computer virus and CNBC · See more »


The Cable News Network (CNN) is an American basic cable and satellite television channel that is owned by the Turner Broadcasting System division of Time Warner.

New!!: Computer virus and CNN · See more »

Code injection

Code injection is the exploitation of a computer bug that is caused by processing invalid data.

New!!: Computer virus and Code injection · See more »

COM file

A COM file is a type of simple executable file.

New!!: Computer virus and COM file · See more »

Common Vulnerabilities and Exposures

The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures.

New!!: Computer virus and Common Vulnerabilities and Exposures · See more »

Compact disc

Compact disc (CD) is a digital optical disc data storage format.

New!!: Computer virus and Compact disc · See more »

Comparison of computer viruses

To aid the fight against computer viruses and other types of malicious software, many security advisory organizations and developers of anti-virus software compile and publish lists of viruses.

New!!: Computer virus and Comparison of computer viruses · See more »

Component Object Model

Component Object Model (COM) is a binary-interface standard for software components introduced by Microsoft in 1993.

New!!: Computer virus and Component Object Model · See more »

Compression virus

A compression virus is an example of a benevolent computer virus, invented by Fred Cohen.

New!!: Computer virus and Compression virus · See more »

Computer file

A computer file is a resource for storing information, which is available to a computer program and is usually based on some kind of durable storage.

New!!: Computer virus and Computer file · See more »

Computer program

A computer program or app is a sequence of instructions, written to perform a specified task on a computer.

New!!: Computer virus and Computer program · See more »

Computer security

Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.

New!!: Computer virus and Computer security · See more »

Computer virus

A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".

New!!: Computer virus and Computer virus · See more »

Computer worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

New!!: Computer virus and Computer worm · See more »

Control flow

In computer science, control flow (or alternatively, flow of control) refers to the specification of the order in which the individual statements, instructions or function calls of an imperative program are executed or evaluated.

New!!: Computer virus and Control flow · See more »

Copyright infringement

Copyright infringement is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works.

New!!: Computer virus and Copyright infringement · See more »

Creeper (program)

Creeper was an experimental self-replicating program written by Bob Thomas at BBN in 1971.

New!!: Computer virus and Creeper (program) · See more »


Crimeware is a class of malware designed specifically to automate cybercrime.

New!!: Computer virus and Crimeware · See more »

Cross-site scripting

Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications.

New!!: Computer virus and Cross-site scripting · See more »

Cryptographic hash function

A cryptographic hash function is a hash function which is considered practically impossible to invert, that is, to recreate the input data from its hash value alone.

New!!: Computer virus and Cryptographic hash function · See more »


Cryptovirology is a field that studies how to use cryptography to design powerful malicious software.

New!!: Computer virus and Cryptovirology · See more »

Cyclic redundancy check

A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.

New!!: Computer virus and Cyclic redundancy check · See more »


A database is an organized collection of data.

New!!: Computer virus and Database · See more »

Denial-of-service attack

In computing, a denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.

New!!: Computer virus and Denial-of-service attack · See more »

Desktop environment

In computing, a desktop environment (DE) is an implementation of the desktop metaphor made of a bundle of programs running on top of a computer operating system, which share a common graphical user interface (GUI).

New!!: Computer virus and Desktop environment · See more »


A Diplom (from δίπλωμα diploma) is an academic degree in the German-speaking countries Germany, Austria, and Switzerland and a similarly named degree in some other European countries including Bulgaria, Belarus, Bosnia and Herzegovina, Croatia, Estonia, Finland (only for engineers), France, Greece, Hungary, Russia, Romania, Serbia, Macedonia, Slovenia, and Ukraine.

New!!: Computer virus and Diplom · See more »

Disk cloning

Disk cloning is the process of copying the contents of one computer hard disk to another disk or to an "image" file.

New!!: Computer virus and Disk cloning · See more »

Disk image

Disk images, in computing, are computer files containing the contents and structure of a disk volume or an entire data storage device, such as a hard disk drive, tape drive, floppy disk, optical disc or USB flash drive.

New!!: Computer virus and Disk image · See more »


In computer networks, to download means to receive data to a local system from a remote system, or to initiate such a data transfer.

New!!: Computer virus and Download · See more »


DVD ("digital versatile disc" or "digital video disc") is a digital optical disc storage format invented and developed by Philips, Sony, Toshiba, and Panasonic in 1995.

New!!: Computer virus and DVD · See more »

Elk Cloner

Elk Cloner is one of the first known microcomputer viruses that spread "in the wild", i.e., outside the computer system or laboratory in which it was written.

New!!: Computer virus and Elk Cloner · See more »


Electronic mail, most commonly referred to as email or e-mail since around 1993, is a method of exchanging digital messages from an author to one or more recipients.

New!!: Computer virus and Email · See more »

Email attachment

An email attachment is a computer file sent along with an email message.

New!!: Computer virus and Email attachment · See more »


In computing, an emulator is hardware or software that enables one computer system (called the host) to behave like another computer system (called the guest).

New!!: Computer virus and Emulator · See more »


In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it.

New!!: Computer virus and Encryption · See more »

Evolutionary algorithm

In artificial intelligence, an evolutionary algorithm (EA) is a subset of evolutionary computation, a generic population-based metaheuristic optimization algorithm.

New!!: Computer virus and Evolutionary algorithm · See more »

Exclusive or

Exclusive disjunction or exclusive or is a logical operation that outputs true only when both inputs differ (one is true, the other is false).

New!!: Computer virus and Exclusive or · See more »


In computing, an executable file or executable program, or sometimes simply an executable, causes a computer "to perform indicated tasks according to encoded instructions," as opposed to a data file that must be parsed by a program to be meaningful.

New!!: Computer virus and Executable · See more »

Exploit (computer security)

An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

New!!: Computer virus and Exploit (computer security) · See more »

File system

In computing, a file system (or filesystem) is used to control how data is stored and retrieved.

New!!: Computer virus and File system · See more »

Floppy disk

A floppy disk, also called a diskette or just disk, is a type of disk storage composed of a disk of thin and flexible magnetic storage medium, sealed in a rectangular plastic carrier lined with fabric that removes dust particles.

New!!: Computer virus and Floppy disk · See more »

Fred Cohen

Frederick B. Cohen (born 1956) is an American computer scientist and best known as the inventor of computer virus defense techniques.

New!!: Computer virus and Fred Cohen · See more »

Free software

Free software, software libre, or libre software is computer software that gives users the freedom to run the software for any purpose as well as to study, change, and distribute the software and the adapted versions.

New!!: Computer virus and Free software · See more »

Genetic diversity

Genetic diversity is the total number of genetic characteristics in the genetic makeup of a species.

New!!: Computer virus and Genetic diversity · See more »

Get a Mac

The Get a Mac campaign was a television advertising campaign created for Apple Inc. (Apple Computer, Inc. at the start of the campaign) by TBWA\Media Arts Lab, the company's advertising agency, that ran from 2006 to 2009.

New!!: Computer virus and Get a Mac · See more »

Hard disk drive

A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid ("hard") rapidly rotating disks (platters) coated with magnetic material.

New!!: Computer virus and Hard disk drive · See more »

Heuristic (computer science)

In computer science, artificial intelligence, and mathematical optimization, a heuristic is a technique designed for solving a problem more quickly when classic methods are too slow, or for finding an approximate solution when classic methods fail to find any exact solution.

New!!: Computer virus and Heuristic (computer science) · See more »

Heuristic analysis

Heuristic analysis is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the "wild".

New!!: Computer virus and Heuristic analysis · See more »

Home computer

Home computers were a class of microcomputers (almost all 8-bit) entering the market in 1977, and becoming common during the 1980s.

New!!: Computer virus and Home computer · See more »

IBM PC compatible

IBM PC compatible computers are those similar to the original IBM PC, XT, and AT and able to run the same software as those.

New!!: Computer virus and IBM PC compatible · See more »


Income is the consumption and savings opportunity gained by an entity within a specified timeframe, which is generally expressed in monetary terms.

New!!: Computer virus and Income · See more »

Instant messaging

Instant messaging (IM) is a type of online chat which offers real-time text transmission over the Internet.

New!!: Computer virus and Instant messaging · See more »


The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide.

New!!: Computer virus and Internet · See more »


In systems programming, an interrupt is a signal to the processor emitted by hardware or software indicating an event that needs immediate attention.

New!!: Computer virus and Interrupt · See more »

IP address

An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.

New!!: Computer virus and IP address · See more »

J. B. Gunn

John Battiscombe "J.

New!!: Computer virus and J. B. Gunn · See more »

John von Neumann

John von Neumann (Hungarian: Neumann János,; December 28, 1903 – February 8, 1957) was a Hungarian-American pure and applied mathematician, physicist, inventor, polymath, and polyglot.

New!!: Computer virus and John von Neumann · See more »

Kaspersky Lab

Kaspersky Lab (Russian: Лаборатория Касперского, Laboratoriya Kasperskovo) is an international software security group operating in almost 200 countries and territories worldwide.

New!!: Computer virus and Kaspersky Lab · See more »

Key (cryptography)

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher.

New!!: Computer virus and Key (cryptography) · See more »

Keystroke logging

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

New!!: Computer virus and Keystroke logging · See more »


The kilobyte is a multiple of the unit byte for digital information.

New!!: Computer virus and Kilobyte · See more »


Lahore (ALA-LC:; لہور, لاہور ALA-LC) is the capital city of the Pakistani province of Punjab, the second largest metropolitan area in the country and 16th most populous city in the world.

New!!: Computer virus and Lahore · See more »

Leonard Adleman

Leonard Max Adleman (born December 31, 1945) is an American theoretical computer scientist and professor of computer science and molecular biology at the University of Southern California.

New!!: Computer virus and Leonard Adleman · See more »


Linux (pronounced or, less frequently) is a Unix-like and mostly POSIX-compliant computer operating system (OS) assembled under the model of free and open-source software development and distribution.

New!!: Computer virus and Linux · See more »

Live CD

A live CD, live DVD, or live disc is a complete bootable computer installation including operating system which runs in a computer's memory, rather than loading from a hard disk drive; the CD itself is read-only.

New!!: Computer virus and Live CD · See more »


In computer security, a login or logon or sign in or sign on refers to the credentials required to obtain access to a computer system or other restricted area.

New!!: Computer virus and Login · See more »

Mac OS

Mac OS is a series of graphical user interface–based operating systems developed by Apple Inc. for their Macintosh line of computer systems.

New!!: Computer virus and Mac OS · See more »


The Macintosh (branded as Mac since 1998) is a series of personal computers (PCs) designed, developed, and marketed by Apple Inc. Steve Jobs introduced the original Macintosh computer on January 24, 1984.

New!!: Computer virus and Macintosh · See more »

Macro (computer science)

A macro (short for "macroinstruction", from Greek μακρο- 'long') in computer science is a rule or pattern that specifies how a certain input sequence (often a sequence of characters) should be mapped to a replacement output sequence (also often a sequence of characters) according to a defined procedure.

New!!: Computer virus and Macro (computer science) · See more »

Macro virus

In computing terminology, a macro virus is a virus that is written in a macro language: that is to say, a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications).

New!!: Computer virus and Macro virus · See more »

Malicious Software Removal Tool

Microsoft Windows Malicious Software Removal Tool is a freely distributed virus removal tool developed by Microsoft for the Microsoft Windows operating system.

New!!: Computer virus and Malicious Software Removal Tool · See more »


Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

New!!: Computer virus and Malware · See more »

Mark Russinovich

Mark Eugene Russinovich (born 1966) is CTO of Microsoft Azure.

New!!: Computer virus and Mark Russinovich · See more »

Master boot record

A master boot record (MBR) is a special type of boot sector at the very beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond.

New!!: Computer virus and Master boot record · See more »

Metamorphic code

Metamorphic code is code that when run outputs a logically equivalent version of its own code under some interpretation.

New!!: Computer virus and Metamorphic code · See more »

Microsoft Excel

Microsoft Excel is a spreadsheet application developed by Microsoft for Microsoft Windows,, and iOS.

New!!: Computer virus and Microsoft Excel · See more »

Microsoft Office

Microsoft Office is an office suite of applications, servers and services.

New!!: Computer virus and Microsoft Office · See more »

Microsoft Outlook

Microsoft Outlook is a personal information manager from Microsoft, available as a part of the Microsoft Office suite.

New!!: Computer virus and Microsoft Outlook · See more »

Microsoft Safety Scanner

Microsoft Safety Scanner is a free disposable virus scanner similar to Windows Malicious Software Removal Tool that can be used to scan a system for computer viruses and other forms of malware.

New!!: Computer virus and Microsoft Safety Scanner · See more »

Microsoft Security Essentials

Microsoft Security Essentials (MSE) is an antivirus software (AV) product that provides protection against different types of malicious software such as computer viruses, spyware, rootkits and Trojan horses.

New!!: Computer virus and Microsoft Security Essentials · See more »

Microsoft Windows

Microsoft Windows (or simply Windows) is a metafamily of graphical operating systems developed, marketed, and sold by Microsoft.

New!!: Computer virus and Microsoft Windows · See more »

Microsoft Word

Microsoft Word is a word processor developed by Microsoft.

New!!: Computer virus and Microsoft Word · See more »


A modem (modulator-demodulator) is a device that modulates signals to encode digital information and demodulates signals to decode the transmitted information.

New!!: Computer virus and Modem · See more »

MPEG-4 Part 14

MPEG-4 Part 14 or MP4 is a digital multimedia format most commonly used to store video and audio, but can also be used to store other data such as subtitles and still images.

New!!: Computer virus and MPEG-4 Part 14 · See more »


The MS-DOS API is an API which originated with 86-DOS and is used in MS-DOS/PC DOS and other DOS-compatible operating systems.

New!!: Computer virus and MS-DOS API · See more »

Multipartite virus

A multipartite virus is a computer virus that infects and spreads in multiple ways.

New!!: Computer virus and Multipartite virus · See more »

National Vulnerability Database

The National Vulnerability Database is the U.S. government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol (SCAP).

New!!: Computer virus and National Vulnerability Database · See more »


NTFS (New Technology File System) is a proprietary file system developed by Microsoft.

New!!: Computer virus and NTFS · See more »

Open-source software

Open-source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose.

New!!: Computer virus and Open-source software · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: Computer virus and Operating system · See more »

Optical disc

In computing and optical disc recording technologies, an optical disc (OD) is a flat, usually circular disc which encodes binary data (bits) in the form of pits (binary value of 0 or off, due to lack of reflection when read) and lands (binary value of 1 or on, due to a reflection when read) on a special material (often aluminium) on one of its flat surfaces.

New!!: Computer virus and Optical disc · See more »

Patch (computing)

A patch is a piece of software designed to update a computer program or its supporting data, to fix or improve it.

New!!: Computer virus and Patch (computing) · See more »

Patch Tuesday

Patch Tuesday (a.k.a. Update Tuesday) is an unofficial term used to refer to when Microsoft regularly releases security patches for its software products.

New!!: Computer virus and Patch Tuesday · See more »


The PDP-10 is a discontinued mainframe computer family manufactured by Digital Equipment Corporation (DEC) from 1966 into the 1980s.

New!!: Computer virus and PDP-10 · See more »

Personal computer

A personal computer is a general-purpose computer whose size, capabilities and original sale price make it useful for individuals, and is intended to be operated directly by an end-user with no intervening computer operator.

New!!: Computer virus and Personal computer · See more »


Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

New!!: Computer virus and Phishing · See more »

Polymorphic code

In computer terminology, polymorphic code is code that uses a polymorphic engine to mutate while keeping the original algorithm intact.

New!!: Computer virus and Polymorphic code · See more »

Polymorphic engine

A polymorphic engine (sometimes called mutation engine or mutating engine) is a computer program that can be used to transform a program into a subsequent version that consists of different code yet operates with the same functionality.

New!!: Computer virus and Polymorphic engine · See more »

Portable Document Format

Portable Document Format (PDF) is a file format used to present documents in a manner independent of application software, hardware and operating systems.

New!!: Computer virus and Portable Document Format · See more »

Portable Executable

The Portable Executable (PE) format is a file format for executables, object code, DLLs, FON Font files, and others used in 32-bit and 64-bit versions of Windows operating systems.

New!!: Computer virus and Portable Executable · See more »

Quine (computing)

A quine is a non-empty computer program which takes no input and produces a copy of its own source code as its only output.

New!!: Computer virus and Quine (computing) · See more »

Random-access memory

Random-access memory (RAM) is a form of computer data storage.

New!!: Computer virus and Random-access memory · See more »


Ransomware is a type of malware that restricts access to a computer system that it infects in some way, and demands that the user pay a ransom to the operators of the malware to remove the restriction.

New!!: Computer virus and Ransomware · See more »

Removable media

In computer storage, some types of removable media are designed to be read to or written to by removable readers, writers and drives.

New!!: Computer virus and Removable media · See more »

Rich Skrenta

Richard "Rich" Skrenta (born 1967 in Pittsburgh, Pennsylvania) is a computer programmer and Silicon Valley entrepreneur who created the search engine blekko.

New!!: Computer virus and Rich Skrenta · See more »


A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that would not otherwise be allowed (for example, to an unauthorized user) while at the same time masking its existence or the existence of other software.

New!!: Computer virus and Rootkit · See more »


Sabotage is a deliberate action aimed at weakening a polity or corporation through subversion, obstruction, disruption, or destruction.

New!!: Computer virus and Sabotage · See more »

Safe mode

Safe mode is a diagnostic mode of a computer operating system (OS).

New!!: Computer virus and Safe mode · See more »

Samy (computer worm)

Samy (also known as JS.Spacehero) is an XSS worm that was designed to propagate across the MySpace social-networking site written by Samy Kamkar.

New!!: Computer virus and Samy (computer worm) · See more »

SCA (computer virus)

The SCA virus is the first computer virus created for the Commodore Amiga and one of the first to gain public notoriety.

New!!: Computer virus and SCA (computer virus) · See more »

Security bug

A security bug or security defect is a software bug that can be exploited to gain unauthorized access or privileges on a computer system.

New!!: Computer virus and Security bug · See more »

Self-modifying code

In computer science, self-modifying code is code that alters its own instructions while it is executing - usually to reduce the instruction path length and improve performance or simply to reduce otherwise repetitively similar code, thus simplifying maintenance.

New!!: Computer virus and Self-modifying code · See more »


Self-replication is any behavior of a dynamical system that yields construction of an identical copy of itself.

New!!: Computer virus and Self-replication · See more »


Shareware is a type of proprietary software which is provided (initially) free of charge to users, who are allowed and encouraged to make and share copies of the program, which helps to distribute it.

New!!: Computer virus and Shareware · See more »

Simile (computer virus)

Win32/Simile (also known as Etap and MetaPHOR) is a metamorphic computer virus written in assembly language for Microsoft Windows.

New!!: Computer virus and Simile (computer virus) · See more »

Social engineering (security)

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.

New!!: Computer virus and Social engineering (security) · See more »

Software engineering

Software engineering is the study and an application of engineering to the design, development, and maintenance of software.

New!!: Computer virus and Software engineering · See more »


Electronic spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site.

New!!: Computer virus and Spamming · See more »


Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.

New!!: Computer virus and Spyware · See more »


In computer programming, a subroutine is a sequence of program instructions that perform a specific task, packaged as a unit.

New!!: Computer virus and Subroutine · See more »


In computing, the superuser is a special user account used for system administration.

New!!: Computer virus and Superuser · See more »

System File Checker

System File Checker is a utility in Microsoft Windows that allows users to scan for and restore corruptions in Windows system files.

New!!: Computer virus and System File Checker · See more »

System Restore

System Restore is a feature in Microsoft Windows that allows the user to revert their computer's state (including system files, installed applications, Windows Registry, and system settings) to that of a previous point in time, which can be used to recover from system malfunctions or other problems.

New!!: Computer virus and System Restore · See more »

Task manager

A task manager is a system monitor program used to provide information about the processes and programs running on a computer, as well as the general status of the computer.

New!!: Computer virus and Task manager · See more »

Technical University of Dortmund

TU Dortmund University (Technische Universität Dortmund) is a university in Dortmund, North Rhine-Westphalia, Germany with over 20,000 students, and over 3,000 staff.

New!!: Computer virus and Technical University of Dortmund · See more »

Threat (computer)

In computer security a threat is a possible danger that might exploit a vulnerability to breach security and thus cause possible harm.

New!!: Computer virus and Threat (computer) · See more »


The TOPS-20 operating system by Digital Equipment Corporation (DEC) was a proprietary OS for the PDP-10 mainframe computer.

New!!: Computer virus and TOPS-20 · See more »

Trojan horse (computing)

A Trojan horse, or Trojan, in computing is any malicious computer program which misrepresents itself as useful, routine, or interesting in order to persuade a victim to install it.

New!!: Computer virus and Trojan horse (computing) · See more »

Uniform Resource Locator

A Uniform Resource Locator (URL) (commonly informally referred to as a web address, although the term is not defined identically) is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.

New!!: Computer virus and Uniform Resource Locator · See more »

USB flash drive

A USB flash drive, also known under a variety of other names, is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface.

New!!: Computer virus and USB flash drive · See more »


Usenet is a worldwide distributed discussion system.

New!!: Computer virus and Usenet · See more »

Vector (malware)

A vector in computing, specifically when talking about malicious code such as viruses or worms, is the method that this code uses to propagate itself or infect the computer.

New!!: Computer virus and Vector (malware) · See more »

Virus hoax

A computer virus hoax is a message warning the recipients of a non-existent computer virus threat.

New!!: Computer virus and Virus hoax · See more »


VirusTotal is a website, originally developed by Hispasec, that provides free checking of files for viruses. It uses 55 different antivirus products and 61 online scan engines to check for viruses that the user's own antivirus solution may have missed, or to verify against any false positives. Files up to 128 MB can be uploaded to the website or sent via email. Anti-virus software vendors can receive copies of files that were flagged by other scans but passed by their own engine, to help improve their software and, by extension, VirusTotal's own capability. Users can also scan suspect URLs and search through the VirusTotal dataset. VirusTotal for dynamic analysis of malware use Cuckoo sandbox. At the moment, VirusTotal is available in 24 languages. VirusTotal was selected by PC World as one of the best 100 products of 2007. Friday, 7 September 2012 it was announced that Google Inc. had acquired VirusTotal from Hispasec.

New!!: Computer virus and VirusTotal · See more »

Vulnerability (computing)

In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.

New!!: Computer virus and Vulnerability (computing) · See more »

Windows 3.0

Windows 3.0, a graphical environment, is the third major release of Microsoft Windows, and was released on May 22, 1990.

New!!: Computer virus and Windows 3.0 · See more »

Windows 7

Windows 7 (codenamed Vienna, formerly Blackcomb) is a personal computer operating system developed by Microsoft.

New!!: Computer virus and Windows 7 · See more »

Windows 95

Windows 95 (codenamed Chicago) is a consumer-oriented operating system developed by Microsoft.

New!!: Computer virus and Windows 95 · See more »

Windows API

The Windows API, informally WinAPI, is Microsoft's core set of application programming interfaces (APIs) available in the Microsoft Windows operating systems.

New!!: Computer virus and Windows API · See more »

Windows Defender

Windows Defender is a software product that attempts to detect and remove malware.

New!!: Computer virus and Windows Defender · See more »

Windows Live Messenger

Windows Live Messenger (formerly MSN Messenger) is a discontinued instant messaging client developed by Microsoft for Windows, Xbox 360, Blackberry OS, iOS, Java ME, S60 on Symbian OS 9.x, and Zune HD.

New!!: Computer virus and Windows Live Messenger · See more »

Windows ME

Windows Millennium Edition, or Windows ME (marketed with the pronunciation of the pronoun "me", but commonly pronounced as an initialism, "M-E"), is a graphical operating system from Microsoft released to manufacturing in June 2000, and launched in September 2000.

New!!: Computer virus and Windows ME · See more »

Windows Media Video

Windows Media Video (WMV) is a file type which can contain video in one of several video compression formats developed by Microsoft.

New!!: Computer virus and Windows Media Video · See more »

Windows NT

Windows NT is a family of operating systems produced by Microsoft, the first version of which was released in July 1993.

New!!: Computer virus and Windows NT · See more »

Windows Update

Windows Update (WU), a service offered by Microsoft, provides updates for Windows components.

New!!: Computer virus and Windows Update · See more »

Windows Vista

Windows Vista (codenamed Longhorn) is an operating system by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.

New!!: Computer virus and Windows Vista · See more »

Windows XP

Windows XP (codenamed Whistler) is a personal computer operating system that was produced by Microsoft as part of the Windows NT family of operating systems.

New!!: Computer virus and Windows XP · See more »


Yahoo Inc. (styled as Yahoo!) is an American multinational technology company headquartered in Sunnyvale, California.

New!!: Computer virus and Yahoo! · See more »

Zero-day (computing)

A zero-day (also known as zero-hour or 0-day) vulnerability is an undisclosed and uncorrected computer application vulnerability that could be exploited to adversely affect the computer programs, data, additional computers or a network.

New!!: Computer virus and Zero-day (computing) · See more »


.exe is a common filename extension denoting an executable file (the main execution point of a computer program) for DOS, OpenVMS, Microsoft Windows, Symbian or OS/2.

New!!: Computer virus and .exe · See more »

Redirects here:

@mm, Boot sector virus, Boot virus, Computer Virus, Computer Virus Wikipedia, Computer Viruses, Computer viri, Computer virology, Computer virus threat, Computer viruses, Comuter virus, DOS Boot Record infector virus, E-mail virus, Email virus, File infector, File virus, Hello (computer virus), Internet virus, Mail virus, Online virus, Pc virus, Phone Virus, Software virus, Stealth virus, Stealth virus (computers), Stealth-adapted virus, Summary of Computer Viruses, Surfsidekick, Threat of internet viruses, Viral programming, Virus (computer), Virus (computers), Virus (computing), Virus program, Virus signature, Vital Information Resource Under Siege.


[1] https://en.wikipedia.org/wiki/Computer_virus

Hey! We are on Facebook now! »