The Simple Ways in Which Computer Viruses Spread

A computer virus basically is a program, which has been designed to destroy or corrupt the typical functions of a computer plus its files. Computer viruses attach and place themselves to a host, most often usually a data file, program file or files in your operating system. After it has done so it can it replicates itself and spread the infections to unaffected files.

In order for a computer virus to spread through an entire or part of a computer system or network, the virus must be in active mode or activated. By a virus being activated, it means that a file that is already infected or contains the virus must be executed or opened for the virus to be active. Once activated, the viruses search for particular programs to infect. This mainly depends on how they have been programmed and what they are designed to do. The viruses spread to all your files and folders by duplicating themselves hence multiplying and increasing in number.

Spread through sending and opening of emails.

Email is certainly one of the most commonly known methods of spreading viruses. It is, however, known that emails, which are just Plain text email, do not usually spread viruses. This is because most e-mail viruses are dispersed through attachments attached to email messages. Another way is through email messages, which contain embedded codes that are executable. For viruses enclosed in email messages to attack your documents and files in your computer, they normally involve your computer in execution of some code.

Sharing of software

Sharing of software from one computer to another can facilitate spreading of viruses since some viruses are known to hide among the files of some software. When such software is shared among users, it then changes itself upon installation to an unaffected computer and ends up infecting files of that computer Through the use of removable mass storage.

Most mass storage devices such as the flash disks and memory cards lack virus infection protection and so any data carried using then is prone to infection since the viruses can hide in such medium and it’s mostly noticeable when you have a flash disk with a userspace yet there is no folder visible.

Downloading software’s, media and documents from un-trusted websites.

Many of the websites offering free items are known to have malicious programs attached to such files and on downloading such files you end up downloading viruses, which later affect your computer and corrupts your files and folders.

Spread during booting and rebooting of your computer.

Some viruses are programmed to activate themselves each time your computer is booted. So when such an action occurs the viruses contained in your hard drives ends up spreading to the entire drive.

The opening of written documents

Common viruses include Macro and are specifically designed for macro applications found on your computers such as Microsoft Word, Outlook and Excel. When a document that is infected by the virus is opened using any one of these programs, it leads to the program itself becoming infected, therefore, allowing the viruses to spread to all other documents opened-up inside those programs During running and installation of software.

While installing software to your system, some viruses which remain hidden and are self-contained modify existing software and as you run such software the programs these viruses are duplicated and spread to files and emails.

Understanding Malicious Software and Other Security Threats

As Internet usage has increased and high-speed internet connections have become more easily available, the threat to individuals as well as businesses due to malware and unauthorized computer access has increased. For most Internet users, their computer and internet access is the tool for entertainment and enhancing productivity, they are not aware of the problems faced until they suffer tremendous financial losses and legal action for acts which they have not committed. For understanding malicious software and other security threats, it is necessary to understand the profile of the person who is being targeted as well as the different types of malicious software and security threats.

An online business selling a digital product online is a significant target for malicious software and online hackers. This includes webmasters with websites, which are a passive source of income, that is, very little work has to be done by the webmaster once the website has been developed, but generate revenue monthly. This is because the hackers believe that they will earn a steady source of income without much effort, once they take over the business. The business owner is subjected to harassment online and offline, which includes putting the business under surveillance for many years, which makes identity theft easier. Offline businesses are also targeted by hackers as the financial and other information can be sold to their competitors, to take over the business or access confidential information. High net worth individuals and investors are other targets as blackmailers and extortionists may target them to earn easy money. College students are least vulnerable to malware and hackers as they do not have many assets and use the internet mainly for entertainment.

One of the primary problems faced by online business owners is identity theft when people falsely claim to be involved in a business, so as to bag lucrative assignments by faking their experience and qualifications Business owners receiving payment through Paypal are particularly vulnerable. Identity theft involves gaining control of the online business owners computer. Compared to desktops, laptops are more vulnerable to being hacked as most laptops available in the market today have inbuilt wi-fi connections. This wi-fi connection is used by hackers to gain control of the laptop, install malicious software and make unauthorized changes. It is very difficult to even reformat these laptops and install a new operating system again.

All activities on the laptop are monitored very closely and the gang of identity thieves will falsely claim that their protege is doing all the work when he or she is doing nothing. Simultaneously the webmaster/business owner who is spending the money and doing most of the work, will be subjected to persecution both online and offline to destroy the person mentally, physically and financially. Important emails from customers will be diverted to competitors, causing business losses, directed energy weapons causing severe headaches will be used repeatedly on the business owner, and it will be difficult to eat out, as the business owner is subjected to repeated food poisoning attempts.

Why The Microsoft Surface Pro Is Not Selling Well

Microsoft has continued to record dismal sales for its surface pro. Even the $100 cut in the price of surface pro tablets has not helped Microsoft’s cause. Compared to sales figures by some of the tablets on the market, the surface pro has really done poorly. However much Microsoft may not admit that the surface pro has not been a huge success, statistics prove otherwise. Microsoft received a combined revenue $853m for both the Surface RT and the Surface Pro, way too small for a company of Microsoft’s stature. While the surface pro looked more stylish and powerful than the RT, it still lacked some features that cheap tablet computers out there came with and therefore could not compete favourably with the likes of iPads and galaxy tabs. Several people have been left wondering why the Microsoft surface pro is not selling well, given that it comes with a host of unique features and is very much beautifully designed. Well, one would have to scratch their heads to find out why the tablet is not doing well.

First and foremost, most people consider the $799 price tag that comes with the tablet to be way too much for a device that does not quite compare with some of its cheaper competitors out there. Even with the $100 discount, beautiful design and nice display, most people still consider it not true value for money. Though the surface pro is a mile better than the Surface RT, most people still look at it as a second-rate tablet that has no potential to compete favourably in a market that’s flooded with high quality and lower priced tablets.
Limited availability is another reason why the surface pro has recorded dismal sales figures. Microsoft basically sells its surface tablets in 29 markets and close to 10,000 locations. For a company like Microsoft that has the potential to sell its products worldwide, this is simply not good enough for it to be able to compete with some of its bigger rivals like apple and Samsung whose tablets are shipped almost to the entire world. If Microsoft really intends to increase sales for its surface pro tablets, it has to broaden its tablet availability. The more available the tablets will come across the world, the more sales Microsoft will record.

Another reason why the surface pro has not lived to its expectations is the fact that it runs on windows 8. From the word go, Windows 8 did not receive a warm reception on the market and devices running on Windows 8 have continued to lag behind android powered devices. For this reason, both the surface pro and RT were bound to struggle to gain the attention of users who have already been glued to the Android operating system. The limited availability of Windows 8 apps as compared to Android apps is another reason why consumers have not been so keen on purchasing the surface pro, leading to the dismal figures.

Last but not least, the low battery life of the surface pro has also accounted for the poor sales. Being a mobile device, Microsoft could have done more to improve the battery life to match that of rival tabs. However, it did not do much and in a market where consumers want gadgets with batteries that can last for days minus recharging, the surface pro was less likely to woo customers.
If Microsoft does not address some of these issues, the Microsoft surface pro will continue to lag behind rival tablets.