A computer virus can be developed maliciously by anyone wanting to cause harm to systems or computers. They are hidden pieces of code that ride to other programs or applications and once activated, they can spread like wildfire. Viruses are typically found on documents or programs that were downloaded from the internet or transmitted via email. Many countries consider it to be illegal to develop and spread a computer virus.
In the world of computer virus, there are varieties that can infect the system in various ways. Some depend on a host program to begin their work however, others are completely independent and are able to attack multiple systems without the need of a host. A computer virus that relies on a host program to infect computers is typically considered to be a worm, but those that don’t make use of the method used to infect through other programs are deemed to be viruses.
Certain viruses infect systems immediately upon arrival, while others are dormant and only activate when the user executes the code. The first computer virus was created in 1974, and it performed similar to a biological virus by rapidly multiplying itself and damaging the system. One example of a destructive virus is Stuxnet virus that was specifically created to destroy computerized centrifuges used to enrich the uranium.
It isn’t for the weak-hearted to try this method. However it can be an enjoyable and exciting way to test your proficiency in computer programming languages and systems. If you are willing to invest the time and effort there are a lot of resources that can help you create an infection.