N&Q Investments

Terminology - Virus Protection



A virus is a piece of malicious code that can replicate itself and infect a computer without the knowledge, or consent, of the user.
A piece of code that is secretly introduced into a system in order to corrupt it or destroy data. Often viruses are hidden in other programs or documents and when opened, the virus is let loose.

Virus protection

Software described as "Virus Protection" is a piece of software, with the purpose of preventing the spread of viruses on a user's computer.

The same anti-virus software is used to protect against viruses and to destroy them if your computer becomes infected.


Virus Types:

Boot Sector Virus:

A "Boot Sector" virus is a virus that infects during the "booting-up" of a computer.
In the past, an infected floppy disk was the most common form of boot sector virus. When a person accidentally leaves a floppy disk in the (A:) drive and starts their PC back up again, the computer attempts to start up from the floppy disk, which allows the virus to spread while the computer is still warming up.

Email Virus:

An e-mail virus, as the name suggests, is a virus that is spread through e-mails. The most common form is being sent as an attachment, which is downloaded, opened and the virus set loose over the computer systems. Not all e-mail viruses are sent with the intention or corrupting a computer's hard drive, some are sent in the form of advertisement, using the address book of the victim, to e-mail their "Spam" to all of the victim's contacts.
A worm is a very common form of e-mail virus.

Macro Virus:

A Macro Virus is a virus embedded within a document. It is executed when the document is opened.
It can infect the program used to open the document (like Microsoft Word) and embed itself in any further documents created with the program.

Logic Bomb:

Logic Bombs are viruses designed to "lay dormant" or "do nothing" until a certain event triggers their initiation.
Some triggers include certain dates and times being reached or a specific phrase or word being typed. Once this occurs, the virus is started and let loose on the computer's Operating System.


A worm is a malicious file that attempts to deplete user's hard drive space, rather than infiltrating or destroying files, while sending copies of itself to unsuspecting others.
One of the most common forms of worm, is one that opens the outlook express or outlook address book, and e-mails itself, as an attachment, to all the people on the users address book. Because it was designed to be sent from a friend or colleague or the victim, the victim was far more likely to become infected as a result.

Virus Protection:

There are many forms of virus protection on the market.

Pay to use:

Norton Anti-Virus and McAfee are two very popular Anti-Virus providers. However, there are some free to use Anti-Virus software on the internet. Generally however, the pay-to-use software is better protection.


AVG Anti-virus and Spybot Search and Destroy are two very popular examples of "free to use" anti-virus software.
Both are free to download, and update automatically, or when the user wishes to.
Understandably, because it is a free program, the company needs to pay the expenses somehow. The most common way is through advertisement.
Also, donations are heavily relied upon for the continual maintenance of the software.

Issues of concernIssues of concern

  • some antivurs softwares can slow doen the computer and this can become fruystrating for the consumer therefore forcing them to remove it which will increase the risk of viruses.
  • It is important to note that one should not have more than one memory-resident antivirus software solution installed on a single computer at any given time. Otherwise, the computer may be crippled.

  • Many antivirus softwares have subscriptions. for example, McAfee needs to be unsubscribed at least 60 days before the present expiration. Norton antivirus renews by default.
  • Some softwares have spyware which damage the computer evern more.
  • Some commercial antivurus softwares have adware as well.

Relevant/Related Pages


References and Resources