A computer virus program is altering program and it replicated itself by coping itself into other programs stored in a computer.
The word "virus" is also commonly used broadly to include computer viruses, worms, and Trojan horse programs. For example, so-called "anti-virus software" will remove all three classes of these malicious programs.
The first virus was born in the very beginning of 1970’s or even in the end of 1960’s although nobody was calling it a virus back then. Pervading animal and Christmas tree were the first. Virus started infecting files. However today virus has multiplied and mostly all are alike in a sense. They periodically kill files or ruin them in which a person will not be able to locate or ever used them again.
According to Device Daily.com, in November 1983, a university of southern California graduate Fred Cohen demonstrated a computer virus doing a seminar at Lehigh University in Pennsylvania. Cohen inserted his concept code into a UNIX command, and within five minutes into the system Cohen was able to gain control of the whole mainframe computer. In His other demonstration, Cohen code managed to evade all the security measures that were installed in the mainframe computer at that time. The code toke approximately an half an hour on a normal. In those years, is only referred to as a code, it is Cohen’s professor, Land Adlemar, who coined the term virus for the self replication program.
The Melissa virus in 1992 was the first fast moving virus that reached about 250, 000, computers, Virus and other forms of worms have been rampant in the internet. The motives of its creators have become diverse as well from hacking to stealing internet identities. But luckily, we have also developed new kinds of anti-virus software that can protect our computer and laptops from viruses.
The computer worm is not like a virus, a worm is a software program that copy itself from one computer to another without human interaction. The difference between a virus and worm is a virus never copies itself; a virus is copied only when the infected executable file is run.
In the wholesome original form, a worm neither deleted nor changed filed on the victim’s computer the worm basically...