\r\n\r\nEveryone has been infected with a virus at one time or another either through the common cold or the flu. A virus attacks the human body by entering through one of the many openings and attaching itself to a host cell. It releases a piece of genetic information into the cell and recruits the cellâ€™s enzymes to propagate the genetic information. Once the genetic code has been adequately replicated, it destroys the cell and attacks cells nearby.\r\n\r\nHow does a computer virus simulate a biological virus? Just as a biological virus injects its own genetic information into a cell and interferes with the bodyâ€™s normal operations, a computer virus is a program written to interfere with the proper functioning of a computer. It may damage programs, delete files, reformat hard disks and perform other forms of destructive acts.\r\n\r\nTo be classified as a virus, a program must meet two criteria. It must be able to execute itself by placing its own code in the execution path of another program. The program must also be able to replicate itself by replacing existing computer files with copies of the virus-infected files. Similar to the way a biological virus requires a host cell, a computer virus requires an infected host file to propagate itself.\r\n\r\nViruses have become the villains of the computer world, propagating themselves and destroying everything in their path. However, another tool of destruction, known as the worm, has been creeping into the computer industry. Most of us have heard of the dreaded Blaster worm that attacks Microsoft websites, but what exactly is a worm and how does it differ from a virus? Actually, a worm is a type of virus that attacks the computer in a method differing from the way a typical virus attacks a computer. Unlike the typical virus, the worm does not require a host program to propagate. A worm enters a computer through a weakness in the computer system and propagates itself using network flaws.\r\n\r\nThe typical virus requires activation through user intervention, such as double clicking or sending outgoing email. However, a worm releases a document containing the â€œwormâ€ macro and sends copies of itself to other computers through network flaws, therefore bypassing any need for user intervention.\r\n\r\nSo, what can you do to protect your computer from virus infection? There are a number of preventative measures that you can take. For example, you can purchase and continually update virus scan software. Make sure that this software contains the â€œreal-timeâ€ scanning feature which monitors all incoming and outgoing mail. You may also install a firewall which prohibits unauthorized access to your computer. By installing these preventative devices, you can proactively defend against viruses.\r\n
\r\nAOL.com: What’s the Difference Between Viruses, Worms, and Trojans? (2005).\r\n\r\n Phoenix. CastleCops.biz: What is the Difference Between Viruses, Worms, and Trojans? (2003.)\r\n\r\nSullivan, Rob. SearchEnginePosition.com: The Difference Between Viruses and Worms. SEP. (2004)\r\n\r\nSymantec.com: What is the Difference Between Viruses, Worms, and Trojans? Symantec Corporation. (2005).