New viruses, worms and Trojan horse programs are identified daily. As of October 2014, McAfee and Bitdefender are two companies, of many, that maintain online virus databases. Three of McAfee's top-tracked viruses originated in 2008, 2009 and 2010. Its website has detailed, up-to-date information on the viruses that are current threats and provides instructions on how to remove them.Know More
Computer viruses infect existing programs. This is similar to the way biological viruses need to insert themselves into a live cell to survive and reproduce. Virus writers identify weaknesses in popular software programs, such as word processing and email applications, and then create a customized virus for it. Software companies must publish frequent updates to combat viruses and address vulnerabilities. Viruses are more prevalent in PCs and Android-based devices than on Macs and iPhones.
Worms and Trojans are similar to viruses in that they seek out vulnerable computers and inflict damage once they gain access. Worms are different from viruses in that they are standalone programs that copy themselves onto other devices. Trojans are programs that appear to be helpful, fun or useful programs but actually act as back doors that allow the virus writer unrestricted access to the infected system.Learn more about Software
Computer software is the programming that tells a computer what to do to make it work. This contrasts with computer hardware, which includes the visible, physical parts of the computer.Full Answer >
A computer word is a unit of data that has defined length expressed in bits. The bit length of a computer word typically corresponds to the width of the computer's data bus, which allows a single CPU operation to move it from storage to processor register.Full Answer >
Computer sabotage involves deliberate attacks intended to disable computers or networks for the purpose of disrupting commerce, education and recreation for personal gain, committing espionage, or facilitating criminal conspiracies, such as drug and human trafficking. According to the Federal Bureau of Investigation, computer sabotage costs billions of dollars in legal fees to recover damages such as identity theft and to repair vital infrastructure that serves hospitals, banks and 911 services.Full Answer >
The clipboard on a computer is not a specific software that can be accessed; it is a tool used by the computer to save cut or copied information for pasting to another location. Accessing the clipboard on computers that use Windows Vista, 7 or 8, requires third-party software.Full Answer >