Computer viruses have become an international problem that plagues computer users of every type and everywhere. Legally speaking, it is classified as a severe cybercrime. The term ‘virus’ is derived from the Latin root word virus, meaning ‘poison’. In biological terms, viruses are known for injecting themselves into a larger body, reproducing themselves, and spreading throughout the entire organism being invaded by the virus to cause untold damage.Similarly, a computer virus enters an unprotected system and carries out a similar mission as the biological virus. In order to adequately protect yourself from viral attacks, you must begin by knowing:What are computer viruses, what they are made of and how they spread?A virus is a computer program created to infect other programs with copies of itself. The virus has the ability to clone itself in its constant search for a new host environment. The virus may have the single mission of replicating itself or it may be written or designed to intentionally damage other programs, alter data, self-destruct and leaving no trace of itself behind.Virus programs are often small, comprising of only a few lines of programming code that can often be hidden in a healthy software, thus rendering it very difficult to detect. Potentially, these infections can attack any type of computer from the smallest laptop model to the largest of mainframes. Experience to date indicates that most of the virus attacks have occurred in “personal” computers.An important question to ask is, how viruses spread, in other words, how does a virus spread throughout a computer system? A virus is spread when infected programs are run. The viral code is then executed, and the virus spreads. A virus can also spread when a computer is booted from an infected disk or when an infected program is run. The infection can come from any form of writable storage such as a hard disk, floppy disk, tape, or memory. Or “viruses can enter computer systems from an external software source, often hidden in a seemingly innocent program, like Trojan Horse”.One important type of virus is the memory-resident virus. These viruses remain in memory after the code is executed and the host program is terminated. By doing so, once the infected program is run, the virus can spread to any program in the system during the work session.However, if a virus keeps spreading itself throughout a system, it becomes easier to detect. As the virus spreads, it uses up more memory and processing time, which may draw the user’s attention. To combat this problem many viruses, contain a “signature.” The signature marks the program as already being infected and thus prevents the virus from infecting the same program over and over again. There are a few different ways to make a signature.A signature can be a character sequence of bytes at a known offset on disk or memory. It may also be a special system call available only when the virus is active in memory. A final way is to have a special feature of the directory entry.Many viruses spread because of public ignorance. In any case, organisations should try to protect their systems as best they can by, not installing black-market copies of programs and not connecting their systems to illegal bulletin boards. If common sense precautions are adhered to, the chance of viral infection is greatly reduced. The use of anti-viral software can help mitigate the problem and should be considered as one of the weapons in the fight against viruses.In law, computer viruses are treated as a severe sensitive cybercrime. The Cybercrimes Laws provide for tough penalties due to the serious bad effects of such crimes. At all times, effective cybersecurity measures are to be in place to combat such serious crimes.In addition to promulgation of up-dated qualified legislations to combat such crimes and deter the offenders. One of the difficulties here arise from the fact that not all investigators are qualified to face this cybersecurity crime. There is great need for special forensic investigators who can absorb the facts and comprehend the issues that lead to deter such technical unclassical crimes. The war against all types of cyber criminals is very tough and requires high ability of sober competition and sustainability. Beware.Dr AbdelGadir Warsama Ghalib is a legal counsel. Email: [email protected]