Natasha Beyersdorf Married, Camp Haven Utah, Used Campers For Sale By Owner In Tennessee, Articles A

An antivirus software limits your web access to restrict your activities on unauthorized networks. A virus attack can inflict as much damage as forcing you to buy a new computer because your old computer has been damaged beyond repair. After that, they can use the victims data as per their will; they can delete or damage it and steal it to demand ransom later on. https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/student-computer.jpg, https://www.technewsworld.com/story/edtech-developers-study-game-approach-aces-med-school-testing-curve-177727.html, EdTech Developers Study Game Approach Aces Med School Testing Curve, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/02/Samsung-Galaxy-Unpacked-stage.jpg, https://www.technewsworld.com/story/samsung-galaxy-unpacked-2023-hollywood-look-out-177756.html, Samsung Galaxy Unpacked 2023: Hollywood, Look Out, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/Apple-Mac-Mini-M2-M2-Pro.jpg, https://www.technewsworld.com/story/mac-mini-macbook-pro-refreshed-with-latest-apple-silicon-177671.html, Mac Mini, MacBook Pro Refreshed With Latest Apple Silicon, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/02/Computer-Frustration.jpg, https://www.technewsworld.com/story/how-puppy-linux-saved-the-day-176905.html, https://www.technewsworld.com/wp-content/uploads/sites/3/2021/04/internet-user.jpg, https://www.technewsworld.com/story/tips-to-help-mask-your-identity-online-177846.html, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/12/us-capitol.jpg, https://www.technewsworld.com/story/proposed-us-law-seeks-to-silence-tiktoks-data-flow-to-china-177229.html, Proposed US Law Seeks To Silence TikToks Data Flow to China, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/devops.jpg, https://www.technewsworld.com/story/2023-year-of-the-software-developer-177724.html, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/04/brain-on-chip-2.jpg, https://www.technewsworld.com/story/generative-ai-is-immature-why-abusing-it-is-likely-to-end-badly-177849.html, Generative AI Is Immature: Why Abusing It Is Likely To End Badly, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/accountant.jpg, https://www.technewsworld.com/story/b2b-funding-firms-banking-on-embedded-finance-176805.html, B2B Funding Firms Banking on Embedded Finance, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/ces-2023-setting-up.jpg, https://www.technewsworld.com/story/dissecting-the-pre-ces-wave-of-pc-and-chip-vendor-competition-177630.html, Dissecting the Pre-CES Wave of PC and Chip Vendor Competition, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/IT-team.jpg, https://www.technewsworld.com/story/cyber-forecast-for-2023-and-beyond-hang-on-for-a-bumpy-digital-ride-177752.html, Cyber Forecast for 2023 and Beyond: Hang on for a Bumpy Digital Ride, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/02/windows-365.jpg, https://www.technewsworld.com/story/windows-365-and-the-coming-abyss-in-the-pc-market-177839.html, Windows 365 and the Coming Abyss in the PC Market, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/12/pharmacy-delivery.jpg, https://www.technewsworld.com/story/report-calls-for-crackdown-on-advertising-by-digital-pill-mills-177483.html, Report Calls for Crackdown on Advertising by Digital Pill Mills, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/waterfall-view.jpg, https://www.technewsworld.com/story/how-to-add-a-stunning-view-to-a-home-office-or-apartment-anywhere-177732.html, How To Add a Stunning View to a Home, Office, or Apartment Anywhere, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/linux-chromebook.jpg, https://www.technewsworld.com/story/how-to-run-a-full-linux-desktop-on-a-chromebook-176864.html, How To Run a Full Linux Desktop on a Chromebook, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/iot.jpg, https://www.technewsworld.com/story/unresolved-conflicts-slow-esim-upgrade-path-to-better-iot-security-176886.html, Unresolved Conflicts Slow eSIM Upgrade Path to Better IoT Security, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/02/laid-off-worker.jpg, https://www.technewsworld.com/story/excess-exuberance-not-bossism-behind-rash-of-tech-layoffs-177833.html, Excess Exuberance, Not Bossism Behind Rash of Tech Layoffs, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/malware-alert.jpg, https://www.technewsworld.com/story/linux-malware-rates-rise-to-record-levels-amid-hacker-inconsistency-176834.html, Linux Malware Rates Rise to Record Levels Amid Hacker Inconsistency, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/apple-pay-google-pay.jpg, https://www.technewsworld.com/story/big-banks-and-big-tech-set-to-square-off-over-digital-wallets-177326.html, Big Banks and Big Tech Set To Square Off Over Digital Wallets, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/02/linux-penguins.jpg, https://www.technewsworld.com/story/not-all-linux-systems-are-created-equal-but-theyre-all-equally-linux-176894.html, Not All Linux Systems Are Created Equal, but Theyre All Equally Linux, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/11/Holiday-Shopping-Couple-1.jpg, https://www.technewsworld.com/story/mozilla-releases-gift-guide-with-privacy-in-mind-177407.html, Mozilla Releases Gift Guide With Privacy in Mind, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/AnkerWork-SR500-Speakerphone.jpg, https://www.technewsworld.com/story/ankerwork-sr500-speakerphone-near-nirvana-for-pc-use-phones-heck-no-177679.html, AnkerWork SR500 Speakerphone: Near Nirvana for PC Use, Phones Heck No, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/10/kid-video-game-player.jpg, https://www.technewsworld.com/story/research-finds-potential-benefits-for-pre-teen-video-game-players-177303.html, Research Finds Potential Benefits for Pre-Teen Video Game Players, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/02/bing-edge-ai-announcement-nadella.jpg, https://www.technewsworld.com/story/microsoft-wakes-up-the-world-once-again-with-chatgpt-bing-and-browser-177779.html, Microsoft Wakes Up the World Once Again With ChatGPT Bing and Browser, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/amd-and-intel.jpg, https://www.technewsworld.com/story/amd-vs-intel-suddenly-the-desktop-pc-is-in-play-177042.html, AMD vs. Intel: Suddenly the Desktop PC Is in Play, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/01/2023-forecast.jpg, https://www.technewsworld.com/story/tech-industry-trends-and-predictions-for-2023-177598.html, Tech Industry Trends and Predictions for 2023, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/social-media-apps.jpg, https://www.technewsworld.com/story/social-media-account-hijacking-jumps-1000-in-last-12-months-report-177164.html, Social Media Account Hijacking Jumps 1,000% in Last 12 Months: Report, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/Space-BACN.jpg, https://www.technewsworld.com/story/darpa-moves-forward-with-project-to-revolutionize-satellite-communication-177003.html, DARPA Moves Forward With Project To Revolutionize Satellite Communication, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/10/metaverse-city.jpg, https://www.technewsworld.com/story/the-metaverse-in-2023-doomed-or-just-growing-pains-177755.html. Some of The Trojans attacks the network by modifying blocking and even delete data. One is suffering from the consequences of a virus attack, such as slow processing speed and frequent crashes. Advantages of computer in Education. Although some two hundred kinds of viruses are known to infect, sicken, or kill us, as the emergence of SARS-CoV-2 has most recently hammered home, that's only one part of the picture. So, will you leave your door open for intruders? Department of Homeland Security plays roles in securing the federal government and helping to secure a cyber-ecosystem by helping with investigations and arrest of cyber criminals, releasing cyber alerts about threats, and educate the public and stay safe online. The same goes for the files and data that you receive from an external network. Over a few days or a week, the speed of the computer or web browser can significantly be decreased. Cost Effective. Explore these tools to check and remove the malware. Without your intervention, your default search engine was modified. 2. Antivirus An antivirus software, as the name indicates, is a program that works against virus protection. Are each of you that stupid? So, even if you are a kid or a person new to technology, you'll find it easy to connect. Unremembered installation/creation of new desktop icons or apps, Applications running without your permission, Programs that end without your permission. There are no alternatives for securing a single device. Logic circuits make it simple to determine a binary number's 1's and 2's complement; The fact that the end-around-carry operation, which is a feature of the 1 . perform millions or trillions of work in one second. Wondering how to enjoy YouTube videos in good quality, bypassing any geo-restrictions? Countless, right? The microbes are also known as pathogens. The ancient Greeks could bisect an angle using only a straightedge? Mainly encryption are classified into two based on key used are: asymmetric key encryption and symmetric key encryption. Do we have a process in place in order to cancel anyone VPN access rights as soon as their reason for having the VPN is invalidated? They must be continuously updated and run, but when utilized properly, they are effective. This can be the only way to save a computer at times, for example if the memory storage has been filled up with worms that keep copying themselves until the system stops responding. And we have ourselves to blame. When the replication is done, this code infects the other files and program present on your system. Once it starts to replicate itself that will take up space in your hard drive and make it so that you have less space for you to use. You protect your valuable data and accounts with a password, and then you think that your data and accounts are protected. Antimalware such as Malwarebytes either put an antihacking lock, or they perform regular scans to detect the presence of any hacker or hacking based programs in the computer network. It can self-replicate and spread. These are considered non-living organisms outside the host body, once a host organism is obtained, viruses tend to replicate. However, modern computers can do tons quite calculate. Disadvantages Although these are huge benefits to heuristic virus checking, the technology today is not sufficient. 10 advantages of computer Rating: 8,2/10 282reviews Increased efficiency: With the help of computers, tasks can be completed faster and with greater accuracy, resulting in increased efficiency and productivity. Protects from spyware The antivirus software can also protect the computer from spyware and integrity theft. They install malware into the computer without the knowledge of the victim. Here we will discuss about both the traditional and the new viruses so that we will be able to protect our computers from it. Both proactive and reactive antivirus software is available. Advantages of Computer : One of the primary benefits of computers is . To avoid detection, a tunneling virus first launches itself behind antivirus software and then goes to the operating system's interruption handlers and intercepts them. If the computer infection is discovered, there is no need to panic. Mail us on [emailprotected], to get more information about given services. These kinds of viruses are uncommon, although they exist in the wild. 1-Virus can crash window 2-Virus can remove window files due to this the computer system slow down. Bacteria multiple itself by division. To keep your computer secure, Norton Antivirus receives routine and automated updates. The Metaverse in 2023: Doomed or Just Growing Pains? Like Evans, Sana Securitys Hofmeyr has spent years contemplating bugs of both the electronic and biological sort. There are many encryption algorithms in which some of these take more computation time, some of these take less, but all has their own advantages and disadvantages. So, antivirus software provides full-proof protection against hackers. Ahh, lucky you. A computer virus can be thought of as an illness of the computer, just like human viruses that cause diseases in humans. Invicti uses the Proof-Based Scanning to automatically verify the identified vulnerabilities and generate actionable results within just hours. An exploit is a type of program created to target a given weakness known as a vulnerability in a piece of software or hardware. A multipartite virus that spreads quickly targets the boot sector and executable files simultaneously using boot infectors or file infectors. These viruses also causes worth a billion of dollars of economic loss every year by increasing the maintenance cost, corrupting computer data, etc. Which amongst the both will have a better speed? In cryptography two types of operation are performed. 1. How many 5 letter words can you make from Cat in the Hat? A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. not fun when you need to do serious work. Hofmeyr believes that when we design computers that more closely mimic nature, they will also be inherently more user-friendly. Geekflare is supported by our audience. Advantages of Virus To make money and become more well-known, many programmers have devoted their careers to creating viruses and their countermeasures. Below are some of the prominent ones: 1. This unique characters, otherwise called signatures can be a byte pattern in the virus. Most viruses damage the system, the boot sector, or the application files. Some antiviruses may even delete and remove useless files from unknown sources to free up disk space, increasing the speed of the PC. Cyberterrorism is when a group attacks a target with intention of causing harm and further political, social, religious, or other goals. https://www.technewsworld.com/wp-content/uploads/sites/3/2022/09/e-reader.jpg, https://www.technewsworld.com/story/color-android-apps-change-the-game-for-e-paper-tablets-177150.html, Color, Android Apps Change the Game for E-Paper Tablets, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/frustrated-computer-user.jpg, https://www.technewsworld.com/story/why-tech-jobs-are-vaporizing-177744.html, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/legal-gavel.jpg, https://www.technewsworld.com/story/meta-lowers-legal-hammer-on-law-enforcement-data-scraper-177669.html, Meta Lowers Legal Hammer on Law Enforcement Data Scraper, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/Aptera-Launch-Edition.jpg, https://www.technewsworld.com/story/aptera-solar-powered-vehicle-set-to-roll-in-2023-lightyear-puts-brakes-on-250k-spev-177721.html, Aptera Solar-Powered Vehicle Set To Roll in 2023, Lightyear Puts Brakes on $250K SPEV, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/12/metaverse-shopping.jpg, https://www.technewsworld.com/story/retail-in-the-metaverse-facing-hardware-identity-challenges-177271.html, Retail in the Metaverse Facing Hardware, Identity Challenges, https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/HP-E27u-QHD-Monitor-Workspace.jpg, https://www.technewsworld.com/story/hp-unveils-new-hybrid-gear-for-remote-workforce-productivity-177613.html, HP Unveils New Hybrid Gear for Remote Workforce Productivity, https://www.technewsworld.com/wp-content/uploads/sites/3/2022/11/female-soldier-soluting.jpg, https://www.technewsworld.com/story/female-army-veteran-uses-tech-to-help-create-a-better-future-177372.html, Female Army Veteran Uses Tech To Help Create a Better Future. A virus is any unwanted program that enters a user's system without their knowledge. Norton Antivirus software guards your computer and prevents viruses, spyware, worms, and Trojan horses from getting in and doing damage. It can self-replicate and spread. Viruses range in severity from the harmless to the downright system crippling. Emails- The fastest way to send documents and information and follow the format of recipient and subject. Why do you keep searching for a solution to Windows 82,000 viruses when there is a 100% secure solution? A virus that affects files replaces code or adds infected code to executable files. So, this means that most of the viruses are countered way before they get to do any harm to your systems. But how do you spot a virus in the first place? If you do a quick survey on how viruses enter the computer systems of its victims, you will be amazed by the proportion of viruses that use pop up ads and websites to make their way into your computers. A virus can be thought of as an illness of the computer, just like human viruses that cause diseases in humans. can be used (under controlled instruction) as to solve instant boot crashes on line, that is if our system crashes or fail to boot due to a missing file (Accidentally deleted), by sending a boot status and getting back the file from vendors5. instant and fast communication in defenseas they(defense) do not encourage vast information in crisis6. in instant whether forecasting, specially Coastlines7. instant Nuclear power plants safety alerts signals across the staff, faculty, administration etc8. network crashes A teacher walks into the Classroom and says If only Yesterday was Tomorrow Today would have been a Saturday Which Day did the Teacher make this Statement? Advantages of Computer : Multitasking- Multitasking is one among the main advantage of computer. 2.Huge . A (n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software. The code's malicious activity could damage the local file system, steal data, interrupt services, download additional malware, or any other actions coded into the program by the malware author. That is so because the USB or removable device served as a transmission device for a virus. Klez (2001): This computer virus ended up infecting 7.2% of computers in the world. The password thief can, later on, blackmail you for ransom or use your password to access sensitive information. Viruses will invade a cell in the body and uses part of the cell to multiple causing new viruses to produce. All those files are put under a scan to check for any peculiarity or maliciousness. It may vary slightly or significantly with other versions. Dumpster diver will dig for the information that has all of the information about payroll, position and title that puts business at risk. Who were the models in Van Halen's finish what you started video? It refers to any computer code that can harm or malfunction the computer system by infecting it. These viruses frequently infect computers when they are started using contaminated floppy discs; the boot attempt does not have to be successful for the virus to infect the computer's hard drive. Because their source code is sometimes unintelligible by humans and thus can be challenging to fix, they can occasionally be challenging to combat. Developed by JavaTpoint. If no, then get an antivirus software as soon as possible so you can use your computer without the constant fear of falling prey to a virus attack. As antivirus software is a must for every computer system in the present scenario because of the benefits and advantages of antivirus programs. Some of them also cause damage to your computer and data, phishing attacks, and even stealing your identity. A parent cant always keep an eye on what their children are doing on the computer. With the help of viruses, nanoscale materials are arranged. In a human host, the microorganism causes a disease by either disrupting an important body process or by stimulating the immune system to mount a defensive reaction. multipartite. Even if you now have antivirus software installed, it's entirely possible that you won't be able to do so in the future. When the virus is executed, it spreads by copying itself into or over data files, programs, the hard drive boot sector, or anything else writable. Trilling noted that there is widespread interest in developing antivirus and data recovery systems that mimic our bodies natural defenses. Internal intruders are individuals who are authorized to access the system but perform unauthorized activities on the system. The following section will consider advantages and limitation of the first two mentioned types of digital forensics: Traditional (dead) and Live computer forensics. A source code virus is a computer virus that targets source code and attempts to corrupt it. To that end, the company developed Primary Response, a server-based software system that, like our bodies immune systems, learns from both user actions and external stimulus. This other guy was actually a pretty . While we await evolutionary changes in computer-human relations, new threats in our current computing environment appear almost daily. Person can do multiple task, multiple operation at a same time, calculate numerical problems within few seconds. It detects or recognizes the virus, and then after detecting the presence of the virus, it works on removing it from the computer system. Until that day arrives when our computers can literally take care of themselves, a few preventive actions can go a long way toward keeping your system healthy. Also, as the worm uses its network it expands really quickly. Viruses and Intrusions are amongst most common threats that affects computer systems. they test the breaking point of pc, by installing viruses you can check how much virus can you pc can bear. This is done to make sure that you only access the websites that are safe and harmless for your computer system. . ESET is one of the most prominent antiviruses that offers parental control. In the asymmetric key encryption, all the recipients have their public key and sender has its own private key, which is kept secret from everyone. To make money and become more well-known, many programmers have devoted their careers to creating viruses and their countermeasures. It is more convenient to simply run the antivirus than having to waste time trying to locate it, delete it, and restore any data . Both of these outcomes are considered to be data losses. Then the hacker can easily hack into their desired files and programs. Microsofts TechNet saw a more than 1,000 percent increase in unique visitors the week SoBig hit; Symantecs online unique visitor count increased more than 300 percent. A firewall, in general, monitors incoming and outgoing traffic from your computer network. As a society, we have become very dependent on computers and when the systems go down we cannot function as well, businesses cannot conduct their business. The virus's designers do not want you to be able to remove it. Once a macro virus infects a file, it can easily spread to other computers when that file is shared, for example via email. VPN access is only accessible with higher-tier services. Computer viruses are included under the word malware. Computer security team is greater visibility: As you can see your computer security team carry out their work with your own eyes, it is easier for you to monitor what they are doing and to make sure that they are contributing positively to the protection of your network. . Who benefits from computer viruses? Many premium antivirus programs extend web-scanning features. Suspicious or unauthorized network activity can be detected and blocked, a key step in identifying Trojan viruses and hijacking attempts. Obsolete security protocols make the outdated rainbow table attack a threat. Advantages of Computer : Multitasking Multitasking -. Other, methods such as anti-virus software can detect threats but do not always remove them successfully. In the present era everyone needs fast processing and less space required to store results in computation process as well as security of information. Engage with IT decision makers and key influencers. Now, he told TechNewsWorld, his goal at Sana Security is to realize a mode of computing that is much more biological in nature.. In other words, an exploit is a tool that allows a hacker . Immune systems are part of the solution, but not all of it neither in computer systems nor in nature, Evans explained. Antivirus applications only require a small financial outlay and are completely worth it. First seen in May 2000, ILOVEYOU was the first virus to be ever created as a worm. Each time a new virus is reported, we download patches and upgrade security systems in droves. Advantages and disadvantages of mobile computers, Advantages and Disadvantages of ARM processor, Advantages and Disadvantages of Microcontroller, Advantages and Disadvantages of Flash Memory, Advantages and Disadvantages of Multicore Processors, Advantages and Disadvantages of Analytical Engine, Advantages and disadvantages of Optical Disks, Advantages & Disadvantages of Hardwired Control Unit. Unusual emails or social media posts made to a big audience without your consent. As we listen to the news we hear about various electronic infection or about the loss of billions of dollars people face because the computer virus. The viruses won't only cause damages to your data, it can degrade the general system performance. It detects any potential virus and then works to remove it. Copyright 1998-2023 ECT News Network, Inc. All Rights Reserved. Featuring a reliable anti-virus, an ad blocker with anti-tracking function, unlimited VPN, data breach monitoring, and built-in 24/7 support from live security experts, the app is always guarding your computer and mobile devices. Please sign in to post or reply to a comment. Multitasking Multitasking is one among the main advantage of computer. Viruses can easily be transmitted to your network via infected files, and these, in turn, can potentially harm your data and files. 2. Numerous operating systems, including Macintosh, Windows, and Unix, are susceptible to this virus infection. If this is the case then deleting everything can be the easiest way to stop. Another benefit of viruses is the crucial role they play in Earth's deep carbon, oxygen . He noted that we can learn from studying other natural defense mechanisms, such as decentralization and diversity. Private Key makes the encryption process faster. One of the best ways to make sure that doesnt happen is to have antivirus software on your system, and if the virus is already on your system you just. Avoid websites like those. Even Microsoft has always known who to follow who to copy and who to immitate, why cant the herd of morons using their Windows products figure it out? When the virus is executed, it spreads itself inside or on top of data files, software, the hard drive's boot sector, and other writable media. Now they come up with a weakest link story and they even find a journalist to write that up! It performs unwanted and malicious actions that end up affecting the system's performance and user's data/files. Fill your funnel and grow revenue with our lead gen expertise. Boot sector viruses are computer programs that can infect a disc's partition table or boot sector. A single key is used to encrypt and decrypt the plain text. These computer viruses are present in various types and each of them can infect a device in a different manner. In case your computer is attacked by a virus, it can affect your computer in the following ways: Antivirus software is like a ray of bright light in a world full of dark viruses. You may have a virus if it takes a long time for your Mac to start or access apps. The good news about malware, then, is that each new worm, virus or blended threat encourages more users to develop healthy habits. But what if someone steals your passwords using a virus? What level of abuse are you prepared to endure from Microsoft? Some examples for computer worms is Bulubebek which was spread through email which destroyed the fire walls , code red was also a jamming worm virus in computer which helped hackers to hack the computer system from the. What are the advantages and disadvantages of a virus? A computer virus that infects a computer's master boot record and often spreads through removable storage devices and media. Among those viruses the most common viruses are: 1) Viruses: It is small software hidden in a computer program. to corrupt your PC, some viruses are meant to be for fun, but it is Spam Protection. Similarly, in the same way that flu viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document. A (n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.