Having a virus unleash itself within a computer system can be a nightmare for the user, as this is most often done unintentionally but with no less detrimental effects. There is no real way to detect how a virus really attacks and spreads but a lot of effort is put into how to ensure the damage done is as minimal as possible.
How They Get Around
The following are some of the more frequent ways that viruses can spread form computer system to another effectively until detection is almost too late to save the infected material:
• Email attachments are by far the most popular way that viruses find their way into the user’s computer system. When the Microsoft’s Outlook Express automatically opens attachments to emails received, the virus in automatically unleashed on the system. However, most users now tend to avoid opening attachments they are unfamiliar with and instead resort to immediately deleting them to ensure the virus does not gain access into the system.
• Rogue websites are another problem area for unleashing viruses. Sometimes the virus is introduced into the system by simply visiting websites without knowing the possibility of the virus being embedded in the site’s content. Thus when the site is downloaded, so will be the virus too.
• Networks are also another popular way the virus is able to gain some momentum, as any user on the same server opening a site where there is a virus will unleash the virus onto other user’s systems too. It usually takes only one party to accidently open an infected site and all the other users on the network will be exposed to the virus infecting their systems too.
• Infected disks are sometimes the cause of the virus spreading, as the user of the infected disk is the source of the hard drive being infected and thus corrupting all the material on the hard drive itself.