This can be the only way to save a computer at times, for example if the memory storage has been filled up with worms that keep copying themselves until the system stops responding. Viruses range in severity from the harmless to the downright system crippling. See answer (1) Copy. A virus that affects files replaces code or adds infected code to executable files. A programming language for computers that does not data type of a variable is referred to as being loosely typed language. Depending on the virus, the cost of damage to your systems could be immeasurably high. Which capital is farther north Salt Lake City Utah or Carson City Nevada? Macro viruses can infect any operating system since they target software rather than systems, and they are typically seen in word processors such as Microsoft Word and Excel. Mobile proxy solutions can help you access any content or site from the entire web while ensuring security and anonymity. 14. Whereas any unauthorized access in the computer system by an intruder can be termed as Intrusion and controlled by IDS. 3-virus can stole the valuable data of your computer. What are the advantages and disadvantages of pesticides? A microbe infects an organism (which is known as the host of the microbe). in this article, we will check the advantages and disadvantages of computer systems. A computer virus can be thought of as an illness of the computer, just like human viruses that cause diseases in humans. Fast communicators.2. The Word Computer means to the middle Processor Unit plus Internal memory. Microsofts TechNet saw a more than 1,000 percent increase in unique visitors the week SoBig hit; Symantecs online unique visitor count increased more than 300 percent. To that end, the company developed Primary Response, a server-based software system that, like our bodies immune systems, learns from both user actions and external stimulus. Someday, Evans added, our computers could manage to remain up and running even as new viruses spread, the same way an organism survives even when its cells fail and its environment changes.. Now they come up with a weakest link story and they even find a journalist to write that up! Here are the top 15 computer viruses in the world that you must know about: 15. Virus Protection. Engage with IT decision makers and key influencers. 2. This other guy was actually a pretty . Antivirus blocks spyware from even touching the computer's data, allowing for secure shopping and online banking. Please mail your requirement at [emailprotected] Duration: 1 week to 2 week. Disadvantages -Viruses can cause many problems on your computer. The end consequence is the introduction of unwanted advertising into the browser and, in certain cases, substituting the hijacker website for the browser's default home page or search engine. That virus is called Win32/DH{eRUTxVzF3U} and it is one of the bad viruses that we do not want on our computers. In order to prevent form the computer virus many antivirus software are being developed. To encrypt and decrypt data a secret key is used. Many of these tools are free and guard against viruses damaging your computer. 10 advantages of computer Rating: 8,2/10 282reviews Increased efficiency: With the help of computers, tasks can be completed faster and with greater accuracy, resulting in increased efficiency and productivity. Overwrite virus. Keep in mind that all this is mostly done before the virus gets to harm the system. Software such as Bullguard Internet Security works against these malicious virus-containing ads and websites by blocking their direct access to your computer network. Code Red. Hackers usually use a malware or virus program to access their victims computer. Every time you are exposed to a virus, your immune system builds resistance to that particular bug. With the advancement in technology, our whole lives are now dependent on the computer and the internet. Antivirus An antivirus software, as the name indicates, is a program that works against virus protection. The Trojans attacks the network by modifying blocking and even delete data. A multipartite virus that spreads quickly targets the boot sector and executable files simultaneously using boot infectors or file infectors. A computer virus is a malicious application or authored code used to perform destructive activity on a device or local network. And it duplicates itself by automatically mailing itself other people from the users email address. The polymorphic virus replicates itself after infection by making useable copies of itself that have been slightly altered. In cryptography two types of operation are performed. https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/e-reader.jpg, https://www.technewsworld.com/story/color-android-apps-change-the-game-for-e-paper-tablets-177150.html, Color, Android Apps Change the Game for E-Paper Tablets, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/frustrated-computer-user.jpg, https://www.technewsworld.com/story/why-tech-jobs-are-vaporizing-177744.html, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/legal-gavel.jpg, https://www.technewsworld.com/story/meta-lowers-legal-hammer-on-law-enforcement-data-scraper-177669.html, Meta Lowers Legal Hammer on Law Enforcement Data Scraper, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/Aptera-Launch-Edition.jpg, https://www.technewsworld.com/story/aptera-solar-powered-vehicle-set-to-roll-in-2023-lightyear-puts-brakes-on-250k-spev-177721.html, Aptera Solar-Powered Vehicle Set To Roll in 2023, Lightyear Puts Brakes on $250K SPEV, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/12/metaverse-shopping.jpg, https://www.technewsworld.com/story/retail-in-the-metaverse-facing-hardware-identity-challenges-177271.html, Retail in the Metaverse Facing Hardware, Identity Challenges, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/HP-E27u-QHD-Monitor-Workspace.jpg, https://www.technewsworld.com/story/hp-unveils-new-hybrid-gear-for-remote-workforce-productivity-177613.html, HP Unveils New Hybrid Gear for Remote Workforce Productivity, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/11/female-soldier-soluting.jpg, https://www.technewsworld.com/story/female-army-veteran-uses-tech-to-help-create-a-better-future-177372.html, Female Army Veteran Uses Tech To Help Create a Better Future. Get it now with a no-commitment free trial. New users create a free account. However, when applied with logic circuits, both methods have distinct advantages because they allow subtraction to be performed solely with addition. Firewalls limit traffic to and from the computer on which they're installed, or to which they're connected, if you're using a hardware firewall. But secret key cryptosystem has suffered from the problem of. Advantages Generic virus protection would make all other virus scanners obsolete and would be sufficient to stop any virus. The U.S. Air Force was among the first installations, he said. 2.Huge . Why do people say that forever is not altogether real in love and relationship. Without an antivirus program your system will be vulnerable to viruses and other threats. Keep in mind that all this is mostly done before the virus gets to harm the system. Unfortunately, the environment in which our computers live that is, the world of the Internet is increasingly hostile. Cybersecurity includes evaluating networks and systems, information policies for organization, incident response team, Cryptography is a technique or method to secure personal data from unauthorized user. The same goes for the files and data that you receive from an external network. To infect files on the computer, a resident virus is a computer virus that embeds itself into the device's memory and activates whenever the operating system carries out a particular task. Reasonably so, spam mail is also referred to as one of the largest carriers of viruses. You take advantage of my small size, I give your computer a "virus". they may attack almost any living organism. The only advantage of computer viruses is that they are only codes that do not physically damage computers. Advantages of computer network A network is very useful for connection and communication purposes. Advantages and Disadvantages of Indirect Tax. They install malware into the computer without the knowledge of the victim. . A-143, 9th Floor, Sovereign Corporate Tower, We use cookies to ensure you have the best browsing experience on our website. A disadvantage is that . The Metaverse in 2023: Doomed or Just Growing Pains? Without your intervention, your default search engine was modified. Boot Sector Virus Bitdefender is an app for Windows with computer scans, antivirus features, and web protection against phishing and fraud. We all know browsers, namely Chrome, Firefox, Internet Explorer and Safari, which are used extensively by more than 95% of all 3.5 billion users. Web scraping, residential proxy, proxy manager, web unlocker, search engine crawler, and all you need to collect web data. For one thing, he pointed out, We dont know how half of our immune system works. But the quest is worthwhile, he said and not merely for the sake of creating virus-resistant, self-healing machines. Can broadcast itself.3. Enter your Username and Password to sign in. 1. A virus may change your computer's system after it infects it, allowing you to access features you previously couldn't. The following section will consider advantages and limitation of the first two mentioned types of digital forensics: Traditional (dead) and Live computer forensics. To avoid infecting your computer with malware, select an email service provider that mandates that all attachments be screened before opening. Make sure you are secured as soon as you turn on that computer. So, if you want to protect your computer system as well as computers of your acquaintances, then consider getting an antivirus. Viruses will invade a cell in the body and uses part of the cell to multiple causing new viruses to produce. First seen in May 2000, ILOVEYOU was the first virus to be ever created as a worm. Viruses can easily be transmitted to your network via infected files, and these, in turn, can potentially harm your data and files. Cyber-attacks are attacks on a target system carried about by different people and may not be associated with a terrorist group. When coupled with antivirus, firewall protection double checks every file or piece of data that you send or transfer from your computer via the internet to another network. they ensure the proper utilization of resources of your pc, see a virus can fill you 1TB drive easily, but you are never ever gonna do that. To prevent detection, stealth viruses are skilled at hiding in files, partitions, and boot regions. On the bright side, a computer user who suffers the effects of a virus typically responds like the heart-attack survivor who, overnight, adopts healthy habits. Product Employment. A parent cant always keep an eye on what their children are doing on the computer. I was a small kid, getting bullied for nor fucking reason at all (I suspect because I was the most intelligent of the boys and small so I couldn't defend myself) by this new guy who had been transferred with his whole class bc who cares. Norton Antivirus software guards your computer and prevents viruses, spyware, worms, and Trojan horses from getting in and doing damage. An antivirus software limits your web access to restrict your activities on unauthorized networks. Being aware of viruses and other malware is a good thing, and protecting your surroundings from them is less expensive than having to make amends. According to experts, one of the advantages of Computer Viruses is it allows for companies to create stronger virus protection programs to combat them. The viruses won't only cause damages to your data, it can degrade the general system performance. Avast and Norton are some of the most popular antivirus software that is available in the market these days. How many nieces and nephew luther vandross have? Or do you want to hide your identity and protect personal data from snooping websites? They must be continuously updated and run, but when utilized properly, they are effective. This means that you need to have a robust security plan in place to deal with these ever-changing threats. what are the advantages of virus These viruses can be found in pen . There obviously are no advantages for viruses, all do something to corrupt your PC, some viruses are meant to be for fun, but it is not fun when you need to do serious work. Mainly encryption are classified into two based on key used are: asymmetric key encryption and symmetric key encryption. Computer systems are essential to everyday life across the entire planet. The last attack that I will describing is Worms, worms and viruses are similar in the way how fast they spread through the network, worms also fill up the storage space with junk the result of this slows down the. Bacteria multiple itself by division. One of the best ways to make sure that doesnt happen is to have antivirus software on your system, and if the virus is already on your system you just. about the benefits of antivirus read more below. A browser hijacker is defined as "unwanted software that changes a web browser's settings without the user's permission." Antivirus applications only require a small financial outlay and are completely worth it. NCERT Solutions Class 12 Business Studies, NCERT Solutions Class 12 Accountancy Part 1, NCERT Solutions Class 12 Accountancy Part 2, NCERT Solutions Class 11 Business Studies, NCERT Solutions for Class 10 Social Science, NCERT Solutions for Class 10 Maths Chapter 1, NCERT Solutions for Class 10 Maths Chapter 2, NCERT Solutions for Class 10 Maths Chapter 3, NCERT Solutions for Class 10 Maths Chapter 4, NCERT Solutions for Class 10 Maths Chapter 5, NCERT Solutions for Class 10 Maths Chapter 6, NCERT Solutions for Class 10 Maths Chapter 7, NCERT Solutions for Class 10 Maths Chapter 8, NCERT Solutions for Class 10 Maths Chapter 9, NCERT Solutions for Class 10 Maths Chapter 10, NCERT Solutions for Class 10 Maths Chapter 11, NCERT Solutions for Class 10 Maths Chapter 12, NCERT Solutions for Class 10 Maths Chapter 13, NCERT Solutions for Class 10 Maths Chapter 14, NCERT Solutions for Class 10 Maths Chapter 15, NCERT Solutions for Class 10 Science Chapter 1, NCERT Solutions for Class 10 Science Chapter 2, NCERT Solutions for Class 10 Science Chapter 3, NCERT Solutions for Class 10 Science Chapter 4, NCERT Solutions for Class 10 Science Chapter 5, NCERT Solutions for Class 10 Science Chapter 6, NCERT Solutions for Class 10 Science Chapter 7, NCERT Solutions for Class 10 Science Chapter 8, NCERT Solutions for Class 10 Science Chapter 9, NCERT Solutions for Class 10 Science Chapter 10, NCERT Solutions for Class 10 Science Chapter 11, NCERT Solutions for Class 10 Science Chapter 12, NCERT Solutions for Class 10 Science Chapter 13, NCERT Solutions for Class 10 Science Chapter 14, NCERT Solutions for Class 10 Science Chapter 15, NCERT Solutions for Class 10 Science Chapter 16, NCERT Solutions For Class 9 Social Science, NCERT Solutions For Class 9 Maths Chapter 1, NCERT Solutions For Class 9 Maths Chapter 2, NCERT Solutions For Class 9 Maths Chapter 3, NCERT Solutions For Class 9 Maths Chapter 4, NCERT Solutions For Class 9 Maths Chapter 5, NCERT Solutions For Class 9 Maths Chapter 6, NCERT Solutions For Class 9 Maths Chapter 7, NCERT Solutions For Class 9 Maths Chapter 8, NCERT Solutions For Class 9 Maths Chapter 9, NCERT Solutions For Class 9 Maths Chapter 10, NCERT Solutions For Class 9 Maths Chapter 11, NCERT Solutions For Class 9 Maths Chapter 12, NCERT Solutions For Class 9 Maths Chapter 13, NCERT Solutions For Class 9 Maths Chapter 14, NCERT Solutions For Class 9 Maths Chapter 15, NCERT Solutions for Class 9 Science Chapter 1, NCERT Solutions for Class 9 Science Chapter 2, NCERT Solutions for Class 9 Science Chapter 3, NCERT Solutions for Class 9 Science Chapter 4, NCERT Solutions for Class 9 Science Chapter 5, NCERT Solutions for Class 9 Science Chapter 6, NCERT Solutions for Class 9 Science Chapter 7, NCERT Solutions for Class 9 Science Chapter 8, NCERT Solutions for Class 9 Science Chapter 9, NCERT Solutions for Class 9 Science Chapter 10, NCERT Solutions for Class 9 Science Chapter 11, NCERT Solutions for Class 9 Science Chapter 12, NCERT Solutions for Class 9 Science Chapter 13, NCERT Solutions for Class 9 Science Chapter 14, NCERT Solutions for Class 9 Science Chapter 15, NCERT Solutions for Class 8 Social Science, NCERT Solutions for Class 7 Social Science, NCERT Solutions For Class 6 Social Science, CBSE Previous Year Question Papers Class 10, CBSE Previous Year Question Papers Class 12, JEE Main 2022 Question Paper Live Discussion. What is the advantages of computer virus? If no, then get an antivirus software as soon as possible so you can use your computer without the constant fear of falling prey to a virus attack. Both types of viruses take advantage of weakened services that don't have computer virus protection services. While we await evolutionary changes in computer-human relations, new threats in our current computing environment appear almost daily. The multipartite virus has the potential to cause more damage than any other virus due to its ability to concurrently infect program files and the boot sector. The world is full of viruses, and new ones are developing daily. Others ways to protect a computer from virus are: if you dont know the sender of a message with an attachment, dont open it; back up your files often to keep your data safe from virus; use routers and firewalls to monitor your computer activity and block unauthorized entries; disable macro security settings in working with Word or Excel to prevent running without permission. Browser links lead to the wrong web page. Logic circuits make it simple to determine a binary number's 1's and 2's complement; The fact that the end-around-carry operation, which is a feature of the 1 . The rate of transmission of the virus occurs rapidly. The last two attacks that can damage the network in different ways is Trojans and worms, I will start off with Trojans how Trojans inter the network is when a person downloads free software or programs to the system and they is a Trojan with them, this is why it is very hard for anti-virus software to find and damage the Trojans. Advantages of Antivirus 1. Symmetric key encryption is also known as private key encryption. Bacteria are much larger than viruses. Advantages of Anti-virus software When you install the anti-virus software on your computer, You get protection against the viruses, Trojans , worms , spyware , adware , rootkits and keyloggers. Mydoom - $38 billion. Yes get a Mac!The whole world of Windows users have to be the stupidest herd of idiots imaginable. Antivirus software works as a prophylactic so that it not only eliminates a virus but also prevents any potential virus from infecting your computer in the future. Post Office attempted to replace controversial Horizon system 10 years ago, but was put off by project's scale and cost. Unremembered installation/creation of new desktop icons or apps, Applications running without your permission, Programs that end without your permission. You can unintentionally open a downright malicious website or email and then fall prey to a phishing attack. Accessing unauthorized websites can expose your computer system to several cyber threats, including spyware, hackers, ransomware, etc. Advantages of virus: Viruses are utilized as vectors or carriers, transporting the material needed to treat a disease to various target cells. https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/student-computer.jpg, https://www.technewsworld.com/story/edtech-developers-study-game-approach-aces-med-school-testing-curve-177727.html, EdTech Developers Study Game Approach Aces Med School Testing Curve, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/02/Samsung-Galaxy-Unpacked-stage.jpg, https://www.technewsworld.com/story/samsung-galaxy-unpacked-2023-hollywood-look-out-177756.html, Samsung Galaxy Unpacked 2023: Hollywood, Look Out, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/Apple-Mac-Mini-M2-M2-Pro.jpg, https://www.technewsworld.com/story/mac-mini-macbook-pro-refreshed-with-latest-apple-silicon-177671.html, Mac Mini, MacBook Pro Refreshed With Latest Apple Silicon, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/02/Computer-Frustration.jpg, https://www.technewsworld.com/story/how-puppy-linux-saved-the-day-176905.html, https://www.technewsworld.com/wp-content/uploads/sites/3/2021/04/internet-user.jpg, https://www.technewsworld.com/story/tips-to-help-mask-your-identity-online-177846.html, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/12/us-capitol.jpg, https://www.technewsworld.com/story/proposed-us-law-seeks-to-silence-tiktoks-data-flow-to-china-177229.html, Proposed US Law Seeks To Silence TikToks Data Flow to China, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/devops.jpg, https://www.technewsworld.com/story/2023-year-of-the-software-developer-177724.html, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/04/brain-on-chip-2.jpg, https://www.technewsworld.com/story/generative-ai-is-immature-why-abusing-it-is-likely-to-end-badly-177849.html, Generative AI Is Immature: Why Abusing It Is Likely To End Badly, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/accountant.jpg, https://www.technewsworld.com/story/b2b-funding-firms-banking-on-embedded-finance-176805.html, B2B Funding Firms Banking on Embedded Finance, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/ces-2023-setting-up.jpg, https://www.technewsworld.com/story/dissecting-the-pre-ces-wave-of-pc-and-chip-vendor-competition-177630.html, Dissecting the Pre-CES Wave of PC and Chip Vendor Competition, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/IT-team.jpg, https://www.technewsworld.com/story/cyber-forecast-for-2023-and-beyond-hang-on-for-a-bumpy-digital-ride-177752.html, Cyber Forecast for 2023 and Beyond: Hang on for a Bumpy Digital Ride, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/02/windows-365.jpg, https://www.technewsworld.com/story/windows-365-and-the-coming-abyss-in-the-pc-market-177839.html, Windows 365 and the Coming Abyss in the PC Market, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/12/pharmacy-delivery.jpg, https://www.technewsworld.com/story/report-calls-for-crackdown-on-advertising-by-digital-pill-mills-177483.html, Report Calls for Crackdown on Advertising by Digital Pill Mills, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/waterfall-view.jpg, https://www.technewsworld.com/story/how-to-add-a-stunning-view-to-a-home-office-or-apartment-anywhere-177732.html, How To Add a Stunning View to a Home, Office, or Apartment Anywhere, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/linux-chromebook.jpg, https://www.technewsworld.com/story/how-to-run-a-full-linux-desktop-on-a-chromebook-176864.html, How To Run a Full Linux Desktop on a Chromebook, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/iot.jpg, https://www.technewsworld.com/story/unresolved-conflicts-slow-esim-upgrade-path-to-better-iot-security-176886.html, Unresolved Conflicts Slow eSIM Upgrade Path to Better IoT Security, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/02/laid-off-worker.jpg, https://www.technewsworld.com/story/excess-exuberance-not-bossism-behind-rash-of-tech-layoffs-177833.html, Excess Exuberance, Not Bossism Behind Rash of Tech Layoffs, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/malware-alert.jpg, https://www.technewsworld.com/story/linux-malware-rates-rise-to-record-levels-amid-hacker-inconsistency-176834.html, Linux Malware Rates Rise to Record Levels Amid Hacker Inconsistency, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/apple-pay-google-pay.jpg, https://www.technewsworld.com/story/big-banks-and-big-tech-set-to-square-off-over-digital-wallets-177326.html, Big Banks and Big Tech Set To Square Off Over Digital Wallets, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/02/linux-penguins.jpg, https://www.technewsworld.com/story/not-all-linux-systems-are-created-equal-but-theyre-all-equally-linux-176894.html, Not All Linux Systems Are Created Equal, but Theyre All Equally Linux, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/11/Holiday-Shopping-Couple-1.jpg, https://www.technewsworld.com/story/mozilla-releases-gift-guide-with-privacy-in-mind-177407.html, Mozilla Releases Gift Guide With Privacy in Mind, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/AnkerWork-SR500-Speakerphone.jpg, https://www.technewsworld.com/story/ankerwork-sr500-speakerphone-near-nirvana-for-pc-use-phones-heck-no-177679.html, AnkerWork SR500 Speakerphone: Near Nirvana for PC Use, Phones Heck No, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/10/kid-video-game-player.jpg, https://www.technewsworld.com/story/research-finds-potential-benefits-for-pre-teen-video-game-players-177303.html, Research Finds Potential Benefits for Pre-Teen Video Game Players, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/02/bing-edge-ai-announcement-nadella.jpg, https://www.technewsworld.com/story/microsoft-wakes-up-the-world-once-again-with-chatgpt-bing-and-browser-177779.html, Microsoft Wakes Up the World Once Again With ChatGPT Bing and Browser, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/amd-and-intel.jpg, https://www.technewsworld.com/story/amd-vs-intel-suddenly-the-desktop-pc-is-in-play-177042.html, AMD vs. Intel: Suddenly the Desktop PC Is in Play, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/01/2023-forecast.jpg, https://www.technewsworld.com/story/tech-industry-trends-and-predictions-for-2023-177598.html, Tech Industry Trends and Predictions for 2023, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/social-media-apps.jpg, https://www.technewsworld.com/story/social-media-account-hijacking-jumps-1000-in-last-12-months-report-177164.html, Social Media Account Hijacking Jumps 1,000% in Last 12 Months: Report, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/Space-BACN.jpg, https://www.technewsworld.com/story/darpa-moves-forward-with-project-to-revolutionize-satellite-communication-177003.html, DARPA Moves Forward With Project To Revolutionize Satellite Communication, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/10/metaverse-city.jpg, https://www.technewsworld.com/story/the-metaverse-in-2023-doomed-or-just-growing-pains-177755.html. Computer is a programmed device with a group of instructions to perform specific tasks and generate results at a really high speed. Stops Virus Attacks Controlling your systems entry points and preventing virus attacks are two of firewalls most obvious advantages. Ahh, lucky you. . The use of computers has led to a decrease in face-to-face interaction with other people. Computer security team is greater visibility: As you can see your computer security team carry out their work with your own eyes, it is easier for you to monitor what they are doing and to make sure that they are contributing positively to the protection of your network. The microbes are also known as pathogens. it can be programmed to refrain from mutating when it infects a file on a computer that already contains copies of the virus. Similarly, in the same way that flu viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document. Email is still the most popular method for virus transmission. After the SoBig attack last fall, hundreds of thousands of computer users updated software, installed virus protection and reconfigured firewalls.