Antivirus is a computer software that has the capability to prevent and protect your computer from dangerous malicious codes. This software can offer a peace of mind even for experienced computer users, who doesn't want to mess up with viruses.
Antivirus programming works in two different ways. Firstly, it has a huge "lexicon" of virus database and it sweeps the files and documents in a system and tags them if they are known to be viral and also it screens the framework of any suspicious action. Another technique includes -making a bait document in critical file systems and monitor about any changes to the document. It has the ability to identify any user interventions and also the changes from any external sources.
For people who have good knowledge about computer systems and programs, this topic will not be so useful. But if you are a novice or a fundamental user, this small article may help you to get more idea about the concepts of viruses and anti-viruses.
What is an anti-virus?
An exceptional fundamental definition for an anti-virus can be something like this – A machine program which sweeps all the files and documents in a system to recognize and dispose system viruses (dangerous codes) and malwares (malicious software’s). There may be numerous more definitions for this yet this stands out as the most essential and simplest.
Some of our novice readers won't apprehend what a virus is. Viruses in computers are a program or simply a code that gets loaded in your computer without your permission/information. The viruses can create different impacts on your personal computer depends upon the different abilities imposed in its codes. It may be harmful or puckish by intention and can erase information’s from your computer. Some dangerous codes can replicate themselves - which implies they will create a replica of it once more and then more and more like that. This can now randomly use all your system memory resources and can lead your system to halt state.
There are viruses which can transmit across networks giving dodge to security systems. These viruses can be transmitted as an associate degree attachment with an e-mail or with every downloaded file from Internet or it will even be a gift on a disc or CD.
Main categories of viruses:
There are a wide variety of Virus threats like malwares, adwares, spywares, rootkits, keyloggers, botnets, Trojan horses, worms etc in the current cyber world. But still there are main three categories which are outlined below for a better understanding.
The first one is those that can infect files: These file infector viruses can attach themselves to program files like .COM and .EXE extensions. Once these file extensions downloaded from Internet and executed in your local PC – these viruses gets loaded additionally along with the original files. The second category is those that can infect system files or boot-records. The third one is the Macro viruses which are typical- these viruses can insert unwanted words or phrases in a word processing system application.
Enough reading viruses! Let’s return to anti-virus once more.
The anti-virus examines the files by employing a virus wordbook as the target here to seek out the noted viruses. In the second technique, it identifies the suspicious behavior of any computer program that indicates the infection in the computer.
Virus wordbook approach
A wordbook of noted viruses has been created by the author of anti-virus software package. Once anti-virus software package examines a file, it then refers to the current wordbook. Just in case, a chunk of code within the file matches with the virus known within the wordbook then anti-virus either deletes that file or quarantines it. So this infected file becomes inaccessible to alternate programs.
It needs periodic downloads of updated virus wordbook entries to achieve this success. You will also be able to conjointly send your infected files to the authors of anti-virus software package, so the anti-virus research organization can update the knowledge regarding the new viruses.
Suspicious behavior approach
As it is self-understood by the word “suspicious” , if something uncommon or suspicious happens to the program – this is often referred to as Suspicious behavior approach. For instance, if one program tries to write down information to associate degree feasible program then it is flagged as ‘suspicious’. It provides protection against fresh viruses by the proper observation about the behavior of all programs.
There are wide varieties of useful and effective Anti-virus packages available in the market from various vendors. The emergence of open source technologies also gives us the option for various open source Anti-virus packages like ClamAV , RKHunter etc. As we discussed earlier, it is always a peace of mind for system users if they have a good Ant-virus installed.