Computer Viruses: frequently asked questions

Published 12/05/2004 22:56   |    Updated 23/04/2008 14:08
What are some common questions asked about computer viruses?

Here are answers to some common questions about viruses, worms and Trojan horses.


What is a virus?

A virus is a program that replicates itself. It spreads by making copies of itself on a computer or by inserting computer code into program or operating system files. Viruses don't always damage files or computers, but they usually affect a computer's performance and stability. For a virus to infect a computer or to spread, you usually have to do something, such as open an infected email attachment.


Are all viruses harmful?

Yes, to varying degrees. Virus damage can range from slowing computer performance to a loss of information and programs. In the worst case, viruses delete or modify information and programs on your computer. Some email viruses send confidential information in messages when spreading. Even when a virus is not directly damaging information, the process of replication can slow your computer and Internet connection.


What is a worm?

A worm is computer code that spreads without user interaction. Most worms begin as email attachments that infect a computer when they're opened. The worm scans the infected computer for files, such as address books, or temporary webpages, that contain email addresses. The worm uses the addresses to send infected email, and often mimics (or spoofs) the "From" addresses in subsequent email messages so that those infected messages appear to be from someone you know.


Worms then spread automatically through email, networks, or operating system vulnerabilities, often overwhelming those systems before the cause is known. Worms aren't always destructive to computers, but they usually cause computer and network performance and stability problems.


What is a Trojan horse?
A Trojan horse is a malicious software program that hides inside other programs. It enters a computer hidden inside a legitimate program, such as a screen saver. It then puts code into the operating system, which enables a hacker to access the infected computer. Trojan horses do not usually spread by themselves; they are spread by viruses, worms, or downloaded software.


What is a blended threat?

A blended threat is a combination of some or all of the malicious programs discussed in the sections above. Blended threats often begin when someone interacts with a virus (such as opening an unsafe email attachment). The virus automatically propagates using worm behavior, and then installs a Trojan horse on the infected computer.


How do I prevent viruses?

Install an antivirus program. To be most effective, an antivirus program should always be turned on, should scan incoming email, and should scan file access. For more information, see the external Microsoft link* How can I help protect my computer from viruses?


How do I know if my computer has a virus?

There is no single indicator of a virus infection, but some of the more common effects include poor computer performance, pop-up ads displaying (even when you have turned on a pop-up blocker or disconnected from the Internet). For more information, see: How do I tell if my computer has a virus?


How do I check for and remove viruses?

To check for viruses and remove them from your computer, you need to run antivirus software. For more information, see: How can I tell if my computer has a virus?  and the external Microsoft link* How do I remove a computer virus?


*Note: BT cannot be held responsible for the content or advice given by external websites, nor the result of misconfiguration arising from such advice.



See also: How do I tell if my computer is infected with spyware?


Please tell us how we can make this answer more useful.