yes a virus can destroy hard wear and there is nothing you could do about it. I'm currently doing a project on viruses like literally right now heres some of my info.
WHAT IS A COMPUTER VIRUS
Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer function. A virus might alter or delete information/data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is necessary that you never open e-mail attachments unless you know who it's from and you are expecting it.Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.Viruses also spread through downloads on the Internet. They can be hidden in illegal software or other files or programs you might download.
PATHS TO VIRUS INFECTION
Email attachments, downloaded programs, shared documents on disks, and network shares (intentional or otherwise) can be paths for computer viruses. Also pop-ups and faulty web sites can guide your computer to catching a virus.
TIPS TO PROTECT YOURSELF AGAINST VIRUSES
1. A good antivirus software package and awareness are the best defenses against the threat of a computer virus
2. Do not open any files attached to an email unless you know what it is, even if it appears to come from a good friend or someone you know. Some viruses can multiply themselves and spread through email. Better be safe than sorry and confirm that they really sent it.
3. Do not open any files attached to an email if the subject line is questionable or unexpected. If the need to do so is there always save the file to your hard drive before doing so.
4. Delete chain emails and junk email. Do not forward or reply to any of them. These types of email are considered spam, which is unwanted, interfering mail that clogs up the network.
5. Do not download any files from an unknown, suspicious, or untrustworthy source.
6. Exercise caution when downloading files from the Internet. Ensure that the source is a valid and trustworthy one. Verify that an anti-virus program checks the files on the download site. If you're uncertain, don't download the file at all or download the file to a floppy and test it with your own anti-virus software.
7. Update your virus definitions regularly. Over 500 viruses are discovered each month. While your virus protection software is scheduled to update your virus definitions automatically, occasionally you may need or want to update your virus definitions manually.
8. When in doubt, always err on the side of caution and do not open, download, or execute any files or email attachments.
COMMON VIRUSES AND THEIR CHARACTERICTICS
Macro Viruses: Macro Viruses use commands (macros) implanted in other software to infect and spread to other files viewed by that software. E.g. Word and Excel have macros and macro viruses can spread by taking advantage of these commands.
Worms : Worms multiply themselves and use communications such as email to spread. They can look at your email address book and send themselves to users in your address book.
File Viruses: File viruses attach themselves to other software. When the software is run, the virus first loads itself into memory so that in can further infect other files or begin damaging the computer.
Trojan Horses: Trojan Horses are programs that claim to perform a particular function but in fact do something different. E.g. they could infect your computer with a virus or erase your files.
Backdoor Trojans: Backdoor Trojans are programs that allow other computer users to remotely control your computer using a local area network (LAN) or the Internet.
Boot Sector Viruses: Boot Sector Viruses are an older type of virus and not so common. They used to infect a computer's startup program so that the virus would become active as soon as the computer started up.
Adware: Is to internet browsing as spam is to email Adware can profile your online surfing and online shopping habits and or placing annoying pop-up advertisements, installing additional IE menu helper bars. Often Adware revolves around targeted advertising based upon the web sites you frequent and you may not even be aware that the pop-ups are not coming from the actual web site visited itself but from the Adware software running locally on your machine. Quite often these applications are installed secretly or by purposely misleading users to install software that is not required.
Spyware: Is potentially a higher threat than Adware as it often collects user details, such as software installed and often sensitive information such as passwords and even credit card details which are then sent to via the internet to a central collection point. Spyware is often installed covertly or by accident using pop-up windows with active-x controls which report that they are doing something benign at the same time as secretly installing this nasty software.
Page Hijackers: Are applications that send links to specific web pages, such as a request to go to a search engine for example, and instead redirect the web browser to a designated address, related to the first link but often containing advertising and adware. While not as high a threat as spyware, it is often a sign that your computer has some spyware or adware components installed on it which will damage its operation.
THINGS TO DO TO CURE A VIRUS
Some anti virus softwares are capable of destroying viruses that have already infected the computer. As long as the virus is not programmed to destroy the anti virus system, it should be able to.
Another way to cure the computer is to delete then reformat everything on your computer to make absolute sure that the virus is gone. Make sure you save everything important on storage device before formatting your computer. Confirm that you scanned your files prior to saving them to make sure that none of those files are causing the virus or have been infected. If they are, and you have them on a storage device and put them back on your computer you will have to reformat your computer all over again.