A trojan horse is a kind of malicious code or program that, when executed, reproduces itself by customizing other computer programs and inserting its own code. When this duplication prospers, the affected areas are then stated to be contaminated with a virus.
dig this Infections often spread out by creating a copy of themselves on a user's computer system without the user's understanding or approval. In most cases, infections will be spread out by e-mail accessories or by files shared on peer-to-peer networks. When a virus has actually infected a computer, it can spread out to other computers on the very same network.
Some infections are configured to spread themselves in a method that could trigger major damage to a computer system. For example, a virus might delete files, fill a disk drive with useless data, or corrupt system files. In some cases, an infection might even show a message or image that is created to scare the user.
The majority of viruses are reasonably safe, and just trigger small inconvenience to the user. However, some infections can be very harmful, and can cause prevalent damage to computer systems.