๐ŸŒŒ
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • โ“What is HGPE?
      • โš–๏ธWho is this for?
      • ๐Ÿง™โ€โ™‚๏ธPrivacy Engineering
      • ๐ŸŽจCreative Privacy
      • ๐Ÿ”ฎGenerative AI
      • ๐Ÿง‘โ€๐Ÿ’ปAbout the Author
  • ๐Ÿง™โ€โ™‚๏ธThe Ethical AI Governance Playbook 2025 Edition
    • ๐Ÿค–Chapter 1 : AI Literacy
    • ๐ŸŒChapter 2 : AI Governance in the 21st Century
    • โŒ›Chapter 3 - Getting Started with AI Act Compliance
    • ๐Ÿš€Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • ๐ŸŽ“Privacy Engineering Field Guide Season 1
    • โ“Decoding the Digital World: Exploring Everyday Technology
    • ๐Ÿ‘๏ธIntroduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • โšกChapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • ๐Ÿ›ฐ๏ธChapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • ๐Ÿ–ฅ๏ธChapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • โš›๏ธChapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • ๐Ÿ“ณChapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธPrivacy Engineering Field Guide Season 2
    • โ“Introduction to Privacy Engineering for Non-Techs
      • ๐ŸŽญChapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • ๐Ÿ“–HGPE Story and Lore
    • ๐ŸชฆChapter 1 : The Prologue
    • โ˜„๏ธChapter 2 : Battle for Earth
    • ๐Ÿฆ Chapter 3 : A Nightmare To Remember
    • ๐Ÿง™โ€โ™‚๏ธChapter 4 : The Academy
    • ๐ŸŒƒChapter 5: The Approaching Darkness
    • โš”๏ธChapter 6 : The Invasion
    • ๐ŸฐChapter 7 : The Fall of the Academy
    • ๐Ÿ›ฉ๏ธChapter 8 : The Escape
    • ๐ŸชChapter 9 : The Moon Cave
    • ๐Ÿฆ‡Chapter 10: Queen of Darkness
  • ๐Ÿ“บVideos, Audio Book and Soundtracks
    • ๐ŸŽงReading Episodes
    • ๐ŸŽนSoundtracks
  • ๐Ÿ‘พHGPE Privacy Games and Challenges
    • ๐ŸŽฎData Privacy Day'23 / Privacy Treasure Hunt Game
    • ๐ŸงฉPrivacy Quest
  • ๐Ÿ“ฌSubscribe Now!
Powered by GitBook
On this page
  • What is a virus?
  • How does it work?
  • What is antivirus?
  • ๐Ÿ“˜ Comic Book Issue #3 - Want to read the plot and immerse yourself in the story even more?

Was this helpful?

  1. Privacy Engineering Field Guide Season 1
  2. Chapter 1 : How Computers Work?

Computer Virus

A computer virus is a program written by someone who wants to do something bad to your computer when it runs.

PreviousBugs and ErrorsNextInternet of Things (IoT)

Last updated 2 years ago

Was this helpful?

What is a virus?

A computer virus is like a digital plague that can infect your computer and spread havoc in your digital life. It's like a tiny program that is designed to sneak into your system and replicate itself, just like a virus in the biological world.

Once it's inside, it can do all sorts of nasty things, such as corrupting your files, stealing your personal information, or hijacking your computer to launch attacks on other systems.

It's a sneaky and insidious enemy that can hide in plain sight and strike when you least expect it.

Computer viruses can come from many sources, such as emails, websites, or downloads. They can exploit vulnerabilities in your operating system or applications, or trick you into running them by disguising themselves as harmless files.

How does it work?

A computer virus is a program written by someone who wants to do something bad to your computer when it runs.

The motivation of people who write virus programs ranges from being geniuses who likes technical challenges to a desire to watch the world burn.

A virus program has to be placed in your RAM, and your computer has to jump to the virus program and run it.

When it runs, it locates a file that is already on your hard disk, like some part of the operating system. After the virus program locates this file, it copies the virus program to the end of this file and inserts a jump instruction that causes the virus program to be run instead.

It is not only a new virus or worm but it's a new era of malware.

Here is a code snippet from the actual Stuxnet reverse compiled code which is used to delete the entries that seem like Stuxnet files on infected machines.

if (Length !=12) return 0;
if (StrCheck(L".TMP, &Filename[Length -4],4) == 0)return 0;
if(StrCheck(L"WTR", Filename,4) == return 0;
for(i =4;i < 8; i++){

 chr = Filename[i];
 if (chr < '0'; chr > '9' return 0;
 Mod = (chr - 0x30 + Mod) % 10;
};
if (mod == 0) return 1;
return 0; 

What is antivirus?

An antivirus program is like a digital guardian that can protect your computer from the nasty bugs and viruses that lurk in the digital world.

First, the antivirus program scans your computer's files and memory for any signs of infection. It looks for patterns and behaviors that match known viruses or suspicious activities, such as unauthorized access or code injection.

If it finds something, it alerts you and gives you options to quarantine or remove the offending files. It can also clean up your system by removing temporary files or fixing registry errors.

But that's not all. The antivirus program also has a real-time protection feature that can monitor your computer's activity and block any malicious actions. It can prevent unauthorized access, stop malware from spreading, and warn you if you're about to visit a dangerous website or download a suspicious file.

It's like having a watchful eye that can keep you safe from the dangers of the digital wilds.

๐Ÿ“˜ Comic Book Issue #3 - Want to read the plot and immerse yourself in the story even more?

๐Ÿ“ฌ Please don't forget to subscribe to not miss the new releases and please tell me what you think in the comments. See you next week!

Stuxnet is the first and only known time a ., an alternative to a cyber warfare bombing raid. No other virus has done anything like it.

๐Ÿฆ  Chapter 3: A Nightmare to Remember --> Jump on the , as it is written and hosted on the Gitbook platform.

โœ… is available to the privacy engineering materials. You can still witness the story of our protagonist Red, and her journey to find her brother through environmental storytelling.

cyber attack achieved a military goal
story from here
Early Access
๐ŸŽ“
โšก
The mutations and rituals of the Dark Entity are difficult to comprehend. However, we know that Dark Entity requires a physical vessel, a powerful enough gene to act as a proxy to its source of power. Lilith, is the vessel of the Dark Entity, her physical embodiment of darkness that wreaks havoc around the galaxy. - Anatomy of a Cyborg, Book by Doctor Talia 2234 Anno Domini
Page cover image