asfenever.blogg.se

Mouse recorder 2 virus
Mouse recorder 2 virus











mouse recorder 2 virus

The virus subsequently replicated at an extraordinarily fast rate. Opening an email containing a document infected with the virus caused the email to send itself to the first 50 addresses in the user’s contact list. An example of a macro virusĪ now-classic example of a macro virus is the Melissa Virus from 1999. One of their more common missions? Delivering destructive viruses and malware. For example, a macro virus can create new files, corrupt data, move text, send files, format hard drives, and insert pictures. Macro viruses are programmed to perform lots of tasks on computers.

  • Downloading a file via the internet or an intranet and then opening the fileĪs with many other forms of viruses and malware, macro viruses can be difficult to detect.
  • Downloading a file via a modem and then opening the file.
  • Opening a file that is an email attachment.
  • The most common methods of spreading macro viruses include: They run on applications and not on operating systems. Macro viruses spread whenever a user opens or closes an infected document. Once an infected macro is executed, it can jump to every other document on the user’s computer and infect them. The virus will access the files in the recipient’s address book and send an infected email to everyone on the contact list.īecause the email looks like it came from a credible source, many recipients open it. Macro viruses are often spread through phishing emails containing attachments that have been embedded with the virus. These actions cause damage to the computer and its applications. When an infected file is opened, the macro virus releases a sequence of actions that begin automatically. If a macro virus has infected these files, it has the potential to damage the document or other computer software.













    Mouse recorder 2 virus