Error opening template: advertisement/zones/468x60_generic.tplError opening template: advertisement/zones/728x90_leaderboard.tplError opening template: advertisement/zones/728x90_bottom_ad.tplError opening template: advertisement/zones/300x250_right_ros_up.tplError opening template: advertisement/zones/300x250_right_ros_down.tplError opening template: advertisement/zones/160x600_left_nav.tplError opening template: advertisement/zones/160x600_right_nav.tpl Macro Virus

Understanding the Macro Virus

A macro virus is a computer infection written in macro language, which is commonly built into word processing applications.  In general, macros is a series of commands and executions that help automate specific tasks.  Regardless of how they are created, they must be executed by a system able to interpret stored commands.  Some macro systems are actually self-contained utilities while others are built into more advanced applications that allow users to easily repeat a sequence of commands or enable a programmer to customize the application to suite the user's needs. 

What has made some programs vulnerable to the macro virus is a feature that allows macros to be stored in the documents that are edited, processed and saved by the application.  This means that a virus can be easily attached to a document without the user's knowledge and executed upon opening the file.  This provides a mechanism that enables the infection to spread throughout the system. 

How it Functions

A macro virus may be distributed via email, floppy disk, network sharing, a modem and compromised sites on the internet.  Since most macros automatically start when a documented is opened and closed, a macros virus seeks to replace the original with it's malicious code.  From their, the infection tags the replacement code with the same name and functions when the command is executed which happens when a user accesses the file. 

Once opened, the macro virus begins to embed itself within other documents and templates.  It also makes preparations to infect any files that will eventually be created.  Depending on what resources it is able to access, a macro virus can damage other areas of the operating system.  This occurs as the infected documents are shared amongst other users and devices. 

One of the most popular variations of this infection is the Melissa Virus, first detected in 1999.  It spread via email attachment and infected any recipient who opened it.  This virus manipulated the victim's address book and distributed itself to numerous email contacts, enabling it to replicate at an alarming rate. 

A macro virus has the ability to infect nearly any system running word processing software.  This is because it seeks to corrupt that application opposed to the operating system.  The virus has been known to attack computers running Mac OS X, Windows and other platforms that are compatible with Microsoft Word. 

Prevention

Because of the wide spread of macro viruses, it is important to remain cautious of the emails you receive.  Many of the messages waiting in your inbox are attached with financial scams and malicious programs.  By downloading an attachment from these unsolicited messages, a macro virus can be easily installed onto your computer, and from there, the madness begins. 

The best defense against a macro virus is a reliable anti-virus program.  A good scanner will check every file and directory in your system and even scan emails and attachments before you even open them.  This small step is one that can save you a lot of time, money and the frustrations associated with internet threats.  

(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.
Identity theft comes in many forms.

A person\92s identity can be 'borrowed' for the purpose of creating fictional credit cards or a person\92s entire identity can be usurped to the point where they can have difficulty proving that they really are who they claim to be.

Up to 18% of identity theft victims take as long as four years to realize that their identity has been stolen.

There are many ways to protect your personal identity and many steps you can take to prevent your identity from being stolen:

*Never give out unnecessary personal information
*Never provide bank details or social security numbers over the Internet
*Always remain aware of who is standing behind you when you type in your personal credit codes at ATM machines and at supermarket checkout swipe machines.