How Computer Viruses Work

Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person.A biological virus is a fragment of DNA inside a protective jacket. Unlike a cell, a virus has no way to do anything or to reproduce by itself.


Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person.

A biological virus is a fragment of DNA inside a protective jacket. Unlike a cell, a virus has no way to do anything or to reproduce by itself. Instead, a biological virus must inject its DNA into a cell. The viral DNA then uses the cell's existing machinery to reproduce itself.

A computer virus must piggyback on top of some other program or document to get executed. Once it is running, it is able to infect other programs or documents. The analogy between computer and biological viruses is a stretch. But there are enough similarities that the name sticks.

The "Melissa" virus, which became a worldwide phenomenon in March 1999, was so powerful that it forced Microsoft and a number of other large companies to completely turn off their e-mail systems until the virus could be contained. The "ILOVEYOU" virus in 2000 had a similarly devastating effect.

The most common forms of electronic infection are:

  • Virus —A small piece of software that piggy-backs on real programs. For example, a virus might attach itself to a program like a spreadsheet. Each time the program runs, the virus runs too. It has the chance to reproduce by attaching to other programs or wreak havoc.

  • E-mail virus —Moves around in e-mail messages. It usually replicates by automatically mailing itself to dozens of people in the victim's e-mail address book.

  • Worm —A small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans a network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, then starts replicating from there as well.

    • Using a network, a worm can expand from a single copy incredibly quickly. For example, the Code Red worm replicated itself over 250,000 times in approximately nine hours on July 19, 2001.

      Worms devour computer time and network bandwidth when they are replicating, and they often have some sort of evil intent. The Code Red worm slowed down internet traffic when it began to replicate itself. Each copy of the worm scans the internet for Windows NT or Windows 2000 servers that do not have the security patch installed. Each time it finds an unsecured server, the worm copies itself to that server. The new copy then scans for other servers to infect. Depending on the number of unsecured servers, a worm could conceivably create hundreds of thousands of copies.

      • Trojan Horse —A normal computer program that claims to do one thing, for example, a game, but instead does damage such as erasing your hard disk when you run it. Trojan horses have no way to replicate automatically.

        • Protecting your computer

          If you are worried about traditional (as opposed to e-mail) viruses, you should be running a secure operating system like UNIX or Windows NT. Their security features keep viruses (and unwanted human visitors) away from your hard disk. If you are using an unsecured operating system, using virus protection software is a nice safeguard.

          By avoiding programs from unknown sources such as the internet, you eliminate almost all of the risk from traditional viruses. Instead, use commercial software purchased on CDs. You should disable floppy disk booting. Most computers now allow you to do this. It eliminates the risk of a boot sector virus coming from a floppy disk accidentally left in the drive.

          You should make sure that macro virus protection is enabled in all Microsoft applications. And you should never run macros in a document unless you know what they do. To enable macro virus protection, open the Options dialog from the Tools menu in Microsoft Word and ensure that macro virus protection is enabled.

          In the case of the ILOVEYOU e-mail virus, the only defense is personal discipline. You should never

Top Plant
The Top Plant program honors outstanding manufacturing facilities in North America.
Product of the Year
The Product of the Year program recognizes products newly released in the manufacturing industries.
System Integrator of the Year
Each year, a panel of Control Engineering and Plant Engineering editors and industry expert judges select the System Integrator of the Year Award winners in three categories.
June 2018
2018 Lubrication Guide, Motor and maintenance management, Control system migration
May 2018
Electrical standards, robots and Lean manufacturing, and how an aluminum packaging plant is helping community growth.
April 2018
2017 Product of the Year winners, retrofitting a press, IMTS and Hannover Messe preview, natural refrigerants, testing steam traps
June 2018
Machine learning, produced water benefits, programming cavity pumps
April 2018
ROVs, rigs, and the real time; wellsite valve manifolds; AI on a chip; analytics use for pipelines
February 2018
Focus on power systems, process safety, electrical and power systems, edge computing in the oil & gas industry
Spring 2018
Burners for heat-treating furnaces, CHP, dryers, gas humidification, and more
April 2018
Implementing a DCS, stepper motors, intelligent motion control, remote monitoring of irrigation systems
February 2018
Setting internal automation standards

Annual Salary Survey

After two years of economic concerns, manufacturing leaders once again have homed in on the single biggest issue facing their operations:

It's the workers—or more specifically, the lack of workers.

The 2017 Plant Engineering Salary Survey looks at not just what plant managers make, but what they think. As they look across their plants today, plant managers say they don’t have the operational depth to take on the new technologies and new challenges of global manufacturing.

Read more: 2017 Salary Survey

The Maintenance and Reliability Coach's blog
Maintenance and reliability tips and best practices from the maintenance and reliability coaches at Allied Reliability Group.
One Voice for Manufacturing
The One Voice for Manufacturing blog reports on federal public policy issues impacting the manufacturing sector. One Voice is a joint effort by the National Tooling and Machining...
The Maintenance and Reliability Professionals Blog
The Society for Maintenance and Reliability Professionals an organization devoted...
Machine Safety
Join this ongoing discussion of machine guarding topics, including solutions assessments, regulatory compliance, gap analysis...
Research Analyst Blog
IMS Research, recently acquired by IHS Inc., is a leading independent supplier of market research and consultancy to the global electronics industry.
Marshall on Maintenance
Maintenance is not optional in manufacturing. It’s a profit center, driving productivity and uptime while reducing overall repair costs.
Lachance on CMMS
The Lachance on CMMS blog is about current maintenance topics. Blogger Paul Lachance is president and chief technology officer for Smartware Group.
Electrical Safety Update
This digital report explains how plant engineers need to take greater care when it comes to electrical safety incidents on the plant floor.
Maintenance & Safety
The maintenance journey has been a long, slow trek for most manufacturers and has gone from preventive maintenance to predictive maintenance.
IIoT: Machines, Equipment, & Asset Management
Articles in this digital report highlight technologies that enable Industrial Internet of Things, IIoT-related products and strategies.
Randy Steele
Maintenance Manager; California Oils Corp.
Matthew J. Woo, PE, RCDD, LEED AP BD+C
Associate, Electrical Engineering; Wood Harbinger
Randy Oliver
Control Systems Engineer; Robert Bosch Corp.
Data Centers: Impacts of Climate and Cooling Technology
This course focuses on climate analysis, appropriateness of cooling system selection, and combining cooling systems.
Safety First: Arc Flash 101
This course will help identify and reveal electrical hazards and identify the solutions to implementing and maintaining a safe work environment.
Critical Power: Hospital Electrical Systems
This course explains how maintaining power and communication systems through emergency power-generation systems is critical.
click me