This is by no means an all inclusive list.
![new computer worm virus new computer worm virus](https://c8.alamy.com/comp/MF1AMT/laptop-computer-with-worm-virus-infect-MF1AMT.jpg)
Below are ten viruses currently cited as being the most prevalent in terms of being seen the most or in their ability to potentially cause damage.
#NEW COMPUTER WORM VIRUS SOFTWARE#
Generally, 'bomb' is a software inserted in a program by a person working in the company.Įvery day new computer viruses are created to annoy us and to wreak havoc on our computer systems. An event triggered routine in a program that causes a program to crash is defined as a 'bomb'. Bomb: This is also know as 'Logic Bomb' and 'Time Bomb'. Fortunately the virus was located in March 1989 itself and the damage reported after October 13 was minimal. An antidote called 'Vchecker' was developed by the American Computer Society. This virus enters COM and EXE files and damages the hard disk. Track zero of computer hard disk is destroyed and the contents of discs are rendered unreadable. Daracrime/Columbus or October the 13th virus: This virus is similar to Jerusalem and was programmed to attack on October 13, 1989. This virus attaches itself to COM and EXE files to damage the data. This is similar to Cascade virus in that it is parasitic in nature. Jerusalem: Found in 1987 at Hebrew University, Jerusalem, this virus was designed to activate only on Friday, January 13 and delete all the files executed on that day. It gets copied to other PCs when the programs are copied. It attaches itself to other programs and gets activated when the host program is executed. The letters on the screen could be seen dropping vertically down to the bottom of screen after the virus picked them off in alphabetical order. Cascade: This virus attacked IBM PCs and compatibles. It displayed a message of peace on the monitor and killed itself.
![new computer worm virus new computer worm virus](https://thumbs.dreamstime.com/z/computer-worm-virus-19140557.jpg)
This was not noticed on any IBM compatible PCs. Not much damage is reported because of this virus. Macmag: This virus attacked Apple Macintosh computers only.
#NEW COMPUTER WORM VIRUS PC#
The virus enters the machine memory once the PC is booted with the infected floppy. This is designed to stay in the boot sector of the disc or near zero sector. This was the most famous virus ever found and has a record of damaging few millions of personal computers. Some Reported Viruses C-Brain: Amjad and Basit, two pakistani brothers, developed this software in January 1986 to discourage people from buying illegal software at throwaway prices. On a hard disc, virus can occupy DOS boot sector or master boot sector. The virus loads, installs itself, hides the rest of itself and then loads the original program. The virus is loaded by the computers built-in start-up program when the machine is switched on. It hides the rest of itself elsewhere on the disc, with a copy of the first sector. It works by replacing the first sector on the disc with part of itself.
![new computer worm virus new computer worm virus](http://4.bp.blogspot.com/-o6eHLd6eEFo/U3eg0McMDFI/AAAAAAAAAHc/Z24YCEdZiow/w1200-h630-p-k-no-nu/computer-virus-removal-tips.png)
A Boot virus is designed to enter the boot sector of a floppy disc. 'Jerusalem' and 'Datacrime' are parasitic viruses. It spreads to other computers when the affected programs are copied. It tries to get attached to more programs so that chances of getting activated is more. A Parasitic virus attaches itself to other programs and is activated when the host program is executed. There are two types of computer viruses 'parasitic' and 'boot' virus. A virus infects data or program every time the user runs the infected program and the virus takes advantages and replicates itself. It replicates itself and spreads to others through floppy transfer. Viruses and such A Virus is defined as a program inserted into another program.
![new computer worm virus new computer worm virus](https://factfile.org/wp-content/uploads/2016/02/Computer-Virus-Pic.jpg)
The machine should be put into use only after the virus is eliminated. The virus can be removed by giving an antidote by studying the virus. If the virus is found in any of the PC's that PC should immediately be isolated.