The so-called picture virus, is to be able to display in the picture at the same time automatically activated virus, this "beauty meter" in the form of widespread transmission of the virus, its harm than simple virus more serious. To understand what is a picture virus, you need to understand the "file" first.
In the computer, we contact the audio and visual graphics and text are in the form of documents exist. In other words, all data processing operations in the computer are based on documents. For example, in the Windows7 flagship edition in Word edited a document file, with "tape recorder" record a sound file, with whereas like a head shot an image file, infected by a virus file, and so on. Typically, the file consists of a filename and an extension, separated by a half-width dot, as shown in the figure.
Note: Individual files can also have no dot and extension, such as the C-packing directory under the NTLDR is such a file. Typically, the file name needs to be named by myself, and the extension is automatically set by the program that creates the file. If Word creates a file name extension of. doc, the Notepad program generates a. txt file extension.
A file name extension is a set of characters that help windows understand the type of information in a file and which program should be used to open the file. It is called an extension because it appears at the end of the file name and is behind the period. We and the XP operating system to determine whether a file is a picture file, mainly through the file name extension to identify. Common image file extensions are: BMP, GIF, PNG, Tif/tiff. CDR, WMF, Jpg/jpeg, PSD, TGA.
The so-called "virus" can be simply understood as a malicious code, which can be attached to other files, or can be used in the form of a file (usually the extension of. exe to execute the file) independently. The purpose of the virus appears to be to target the computer that reads the code (such as infection, destruction, deletion of some or all files), the destruction of the system slows down, delete files, steal information, and so on.