{"id":4655,"date":"2018-06-14T21:53:39","date_gmt":"2018-06-14T16:23:39","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=4655"},"modified":"2022-01-19T17:04:56","modified_gmt":"2022-01-19T11:34:56","slug":"how-does-computer-virus-scan-works","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/","title":{"rendered":"What Is An Antivirus Software How It Works And Detects?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3063 aligncenter\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/10\/vulnerability-scanning.jpg\" alt=\"Virus Scan\" width=\"650\" height=\"300\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/10\/vulnerability-scanning.jpg 650w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/10\/vulnerability-scanning-300x138.jpg 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/10\/vulnerability-scanning-225x104.jpg 225w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>The malicious software arrives in different ways, often disguised in the form of software codes, scripts, active content, and other software that seems legitimate. The malware comes in two main <a href=\"https:\/\/www.formbot.com\/form-builder\/online-form-builder.php\" rel=\"noopener\" target=\"_blank\">forms<\/a>, and they are the viruses and worms.<\/p>\n<p><strong>Viruses<\/strong><br \/>\nNearly all viruses are assigned to an apparently harmless executable file but when that file is opened, bad things happen. A malicious program may exist on a computer but will not become active until a user opens the infected file\/program.<\/p>\n<p><strong>Worms<\/strong><br \/>\n<a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/\" title=\"Worms\" rel=\"noopener\" target=\"_blank\">Worms<\/a> are an independent program that replicates themselves and infects multiple computers on a network. Depending on the type, a worm may be able to disseminate the damage, for e.g., a network worm usually utilizes the computer network to spread and in the event, slows down the network traffic. Hackers prefer worms over viruses to carry out their illegal activities.<\/p>\n<p>Viruses and worms demand different <em>virus protection<\/em> mechanisms due to their differing qualities. Typically, a <strong>virus scanner<\/strong> examines the files in a computer for the signatures of known viruses.<\/p>\n<p>The unique pattern which occurs in all copy of a virus is called as the signature. This patterns are recognized by computer security professionals and are later given to security Websites. The updated patterns are downloaded by Virus scanners to keep their internal pattern files up-to-date.<\/p>\n<p>Three types of practical difficulties are required to be attended in this scheme!<\/p>\n<p>Firstly, if the patterns are wrongly identified then they can appear in uninfected files. For instance, a pattern bearing just the word &#8220;Sound&#8221; wouldn\u2019t be pretty helpful. The technicians need to find patterns that are different from the viruses.<\/p>\n<p>Secondly, the complexity is purposefully created by the virus writers who safeguard their viruses from being detected, therefore, they engage in secretive techniques. For instance, most viruses get saved on the computers in encrypted form, therefore changing the encryption key as they move from system to system makes the encrypted patterns appear different in every victim&#8217;s computer. Latest <a href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/best-free-online-virus-scanners-2018\/\" target=\"_blank\" rel=\"noopener\">virus scanners<\/a> can knock this method both by placing their patterns to explore for the part of the program that decrypts the virus or by duplicating the decryption operation before performing the matching.<\/p>\n<p>Thirdly, the complexity is designed to affect the performance of a computer. Apparently, a virus is attached to a seemingly good executable file and may exist on without spreading until a user opens the infected program. There are thousands of host programs on a computer and scanning all the programs every time will take a long time to finish the virus scanner process. Therefore, virus scanners normally restrict themselves to a modest list of potential hosts. For instance, all externally connecting devices and removable disks are normally scanned whenever they are inserted.<\/p>\n<p>Due to the logical reason worms are independent programs, they are slightly easier to detect. They remain in a file of their own somewhere and the challenge is to construct the file in such a way that the system will automatically eliminate it. The restrictions set limits on such properties as to find the file in its original form. The scanner will check the known places and then implement the similar pattern-matching techniques that were used for viruses.<\/p>\n<p>Today, scanners are rightly directed to hunt malware. Mostly, they arrive in an email to the victims&#8217; machine, so a virus scanner can be set up to verify the legitimacy of the incoming emails. When a worm is detected, without any delay it can be removed from the message. It is equally important to remove the worm from the outgoing email from the infected computer.<\/p>\n<p>The cleanup process is pretty straightforward. For instance, if a software manufacturer gave an infected file, it should be succeeded with a clean copy. In the case of personal files which cannot be replaced, the infected portion can be overwritten with the good files.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>The best way to protect your system or other devices from viruses and worms is to keep your operating system clean and up-to-date by downloading regular security patches and updates.<\/p>\n<p>If you experience any of the above-mentioned signs, your computer is definitely infected with virus or worm. Be sure to install a<a href=\"https:\/\/antivirus.comodo.com\/free-antivirus.php\" target=\"_blank\" rel=\"noopener\"> virus protection<\/a> software like the Comodo Antivirus to get rid of the virus or worm and prevent future attacks.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<h3>Related Resources:<\/h3>\n<p><a href=\"https:\/\/webinspector.com\/website-malware-scanner\/\" target=\"_blank\" rel=\"noopener\">Website Malware Scanner<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The malicious software arrives in different ways, often disguised in the form of software codes, scripts, active content, and other software that seems legitimate. The malware comes in two main forms, and they are the viruses and worms. Viruses Nearly all viruses are assigned to an apparently harmless executable file but when that file is [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":3063,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[90,144,181],"class_list":["post-4655","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety","tag-virus-protection","tag-virus-scan","tag-virus-scanner"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Does A Computer Virus Scan Works | Comodo Antivirus<\/title>\n<meta name=\"description\" content=\"Virus scanners are rightly directed to hunt malware. When a virus or worm is detected, without any delay it is removed effectively. Read more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Does A Computer Virus Scan Works | Comodo Antivirus\" \/>\n<meta property=\"og:description\" content=\"Virus scanners are rightly directed to hunt malware. When a virus or worm is detected, without any delay it is removed effectively. Read more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-14T16:23:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-19T11:34:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/10\/vulnerability-scanning.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/\",\"name\":\"How Does A Computer Virus Scan Works | Comodo Antivirus\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/10\/vulnerability-scanning.jpg\",\"datePublished\":\"2018-06-14T16:23:39+00:00\",\"dateModified\":\"2022-01-19T11:34:56+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Virus scanners are rightly directed to hunt malware. When a virus or worm is detected, without any delay it is removed effectively. Read more.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/10\/vulnerability-scanning.jpg\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/10\/vulnerability-scanning.jpg\",\"width\":650,\"height\":300,\"caption\":\"Virus Scan\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is An Antivirus Software How It Works And Detects?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Does A Computer Virus Scan Works | Comodo Antivirus","description":"Virus scanners are rightly directed to hunt malware. When a virus or worm is detected, without any delay it is removed effectively. Read more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/","og_locale":"en_US","og_type":"article","og_title":"How Does A Computer Virus Scan Works | Comodo Antivirus","og_description":"Virus scanners are rightly directed to hunt malware. When a virus or worm is detected, without any delay it is removed effectively. Read more.","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2018-06-14T16:23:39+00:00","article_modified_time":"2022-01-19T11:34:56+00:00","og_image":[{"width":650,"height":300,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/10\/vulnerability-scanning.jpg","type":"image\/jpeg"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/","name":"How Does A Computer Virus Scan Works | Comodo Antivirus","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/10\/vulnerability-scanning.jpg","datePublished":"2018-06-14T16:23:39+00:00","dateModified":"2022-01-19T11:34:56+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Virus scanners are rightly directed to hunt malware. When a virus or worm is detected, without any delay it is removed effectively. Read more.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/10\/vulnerability-scanning.jpg","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/10\/vulnerability-scanning.jpg","width":650,"height":300,"caption":"Virus Scan"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/how-does-computer-virus-scan-works\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is An Antivirus Software How It Works And Detects?"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/4655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=4655"}],"version-history":[{"count":12,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/4655\/revisions"}],"predecessor-version":[{"id":16982,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/4655\/revisions\/16982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/3063"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=4655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=4655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=4655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}