A virus attaches itself to another piece of programming code in memory, or a file. A virus infects a system when the orignal program or programming code executes and unintentionally runs the virus' programming code. A virus replicates itself by attaching itself to other programs when it's code is executed.

     Not all viruses do catastrophic damage to a computer system. Many viruses simulate a system failure, displays misinformation when the system starts, play music randomly, or produce random messages. Viruses that are malicious can and do cause considerable damage in the form of lost data and altered program code.

     There is one other type of virus in circulation, the most malicious of all virus, the one everyone is worried about, the one that is simply a rumor; the rumor virus is also the most popular. Some people get more satisfaction from exploiting people than their computers. Exploiting people's fascination with computer viruses, these hoax emails turn into chain letters.

There are five major virus classes:
     Because a virus is a program or a segment of malicious program code, it can only infect another program for two reasons: first, the code would not blend into the scenery of a to-do list or Word document, second, since a to-do list is data, not program code, it is not executed, it is simply data. For a virus to be a 'true' virus, it must replicate its code in a way that is a true replication; replication requires that the replica also be executable, which means it must attach to an executable program (EXE or COM).

     As virus detection software becomes more sophisticated, so have the viruses. Most antivirus detection schemes recognize a predefined pattern unique to individual virii, a viruses fingerprint in effect, this is called a viruses signature. Modern viruses now incorporate a scheme to defeat this signature detection by imploying a method know as cloaking. Some of the cloaking techniques used by virii are as follows:
     Except for inoculators, which only look for the damage caused and not the virus itself, most antivirus scanners use an updatable database of virii profiles or signatures for reference. These virii signature databases are updatable via the internet and should be update frequently. The internet is a great resources for updating these databases, it is also a double-edged sword because a world wide network (internet) is the perfect distribution medium for new and unfingerprinted virii to travel.