33 Following


Computer Viruses

A program virus usually infects other programs by placing a copy of itself at the end of the intended target. It then modifies the first few instructions of the host program so that when the host is executed, control passes to the virus. Afterwards, control returns to the host program. Making a program read only is ineffective protection against a virus. Viruses can gain access to read-only files by simply disabling the read-only attribute. After infection the read-only attribute would be restored. Below, you can see the operation of a program before and after it has been infected. Give your points on this topic. 
Regards: Michelle Smith 

Specialist In: Mantra to Punish Enemy