After a computer virus is triggered, it is possible to carry out destructive activities, light interference with the screen display, reduce the speed of computer operation, serious cases make the computer soft hard disk files, data is tampered with or all lost, even paralyzing the entire computer system.
Common destruction methods include:
(1) Delete A specific executable or data file on the disk.
(2) modify or destroy the data in the file.
(3) generate useless new files in the system.
(4) encrypt or decrypt the files stored by users in the system.
(5) destroy the file allocation table.
(6) change the storage status of the target information on the disk.
(7) change or re-write the volume label of the disk.
(8) Create "bad" sectors on the disk, reduce disk space, and destroy related programs or data files.
(9) change the disk allocation so that data is written into the wrong disk zone.
(10) format the specific track of the entire disk or disk.
(11) The system hangs empty, leading to screen or keyboard blocking.
(12) affect the normal operation of memory resident programs.
(13) change the normal operation of the system.
(14) Stealing important user data.
In short, a virus is a program that can do everything the program can do.
However, a computer virus is essentially a program, and it can only do what the program can do. It is not omnipotent, and it cannot intrude into the RAM of unstarted machines, it is also impossible to infect a "Write protection" floppy disk (unless the disk drive is physically faulty), nor can it damage the motherboard or burn out power. Viruses are not a "scapegoat" for hardware faults and software problems ".