Page 78 - Code Craft Computer-7
P. 78

3. Macro Viruses : Macro viruses use another application’s macro programming language to
            distribute themselves. They infect files that are created using macro language or programs that
            contain macros like .doc, .xl, .pps etc. They infect documents, such as Microsoft word or Microsoft

            Excel and cause a sequence of actions to be performed automatically when the application is
            started.  They  can  be  spread,  through  e-mail  attachments,  discs,  networks,  modems  and  the
            Internet.
            Example : DMY, Melissa and Word Concept.


            VIRUS SYMPTOMS

            A virus can cause problems in a computer in many ways, such as :

            1.  Frequent hanging of the system.
            2.  Causing strange movements or patterns on the screen.

            3.  Showing abnormal write protect error.

            4.  Reduce the speed of a computer by decreasing the memory.
            5.  Reformatting the hard disk.

            6.  Displaying a change in data against the filename in the directory, when a virus modifies the file.

            7.  Increasing the use of disk space and growth in file size as the virus gets attached itself to many
               files.

            8.  Deleting or damaging files.

            PREVENTING A VIRUS INFECTION

            Generally computer virus infects and spreads from one computer to another through transferring
            infected data using e-mail, flash drives, or other sources. To prevent virus attack, follow the given
            tips :

            •  Every PC should be equipped with some antivirus program.

            •  Always scan the pen drive before copying files.

            •  Do not install pirated software.
            •  Scan the hard disk twice a month.

            •  Take the backup of important files every day.

            •  Use Internet and e-mail attachments very carefully.



                 Extra Bytes

                 What kind of attempts are made by an individual to obtain confidential information from a
                 person by falsifying their identity?







                                                                 78
   73   74   75   76   77   78   79   80   81   82   83