There is so many kind of viruses and there is so many dangarous virus and program, i give you a virus information and how to stay from viruses...
Viruses:
Worms-worm differs from a computer virus in that a computer worm can run itself. A virus needs a host program to run, and the virus code runs as part of the host program. A computer worm can spread without a host program, although some modern computer worms also use files to hide inside.
Trojan Virus-Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.
Heur/Malware-a malicious file or program that gets onto your system by pretending to be benign or desirable
to protect your computer try this tools:
[Only registered and activated users can see links. Click Here To Register...]
[Only registered and activated users can see links. Click Here To Register...]
Antivirus:
Top 5 Free Antivirus Software
1.Avira Antivir
[Only registered and activated users can see links. Click Here To Register...]
2.Rising Antivirus
[Only registered and activated users can see links. Click Here To Register...]
3.Avast Antivirus
[Only registered and activated users can see links. Click Here To Register...]
4.Comodo Antivirus
[Only registered and activated users can see links. Click Here To Register...]
5.AVG Anti Virus
[Only registered and activated users can see links. Click Here To Register...]
Hope i Help....
Viruses:
Worms-worm differs from a computer virus in that a computer worm can run itself. A virus needs a host program to run, and the virus code runs as part of the host program. A computer worm can spread without a host program, although some modern computer worms also use files to hide inside.
Trojan Virus-Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.
Heur/Malware-a malicious file or program that gets onto your system by pretending to be benign or desirable
to protect your computer try this tools:
[Only registered and activated users can see links. Click Here To Register...]
[Only registered and activated users can see links. Click Here To Register...]
Antivirus:
Top 5 Free Antivirus Software
1.Avira Antivir
[Only registered and activated users can see links. Click Here To Register...]
2.Rising Antivirus
[Only registered and activated users can see links. Click Here To Register...]
3.Avast Antivirus
[Only registered and activated users can see links. Click Here To Register...]
4.Comodo Antivirus
[Only registered and activated users can see links. Click Here To Register...]
5.AVG Anti Virus
[Only registered and activated users can see links. Click Here To Register...]
Hope i Help....