Virus transmission have targeted various types of media or host.
Binary (eg in the exe files as COM and MS DOS, Microsoft Windows portable executable files in executable files and files in Linux Elf) Hard disk partition boot record volume and record Hard disk master boot record (MBR) General purpose sequence files (such as batch files in MS-Dos and Microsoft Windows, VBScript as files, and shell script files on Unix platforms).
Applications (such as Telix scripts specific script files) Specific files to automatically implement script system (like Windows Autorun.inf file you need to automatically run software stored on memory USB storage devices). Makroj can include documents (such as Microsoft Word documents, spreadsheets as, Microsoft Excel, AmiPro documents, files and Microsoft Access databases) Cross-site scripting vulnerabilities in Web applications (XSS Worm View) Arbitrary computer files. One exploited buffer overflow, format string, caste or a program that reads a file and error status of operations within the trigger execution of code can be hidden. Most errors such as these show a bit more security features can be used in architectures with hard-down and / or address space layout randomization. PDF, and HTML, you can link to malicious code. PDF can also be infected with malicious code.
Operating systems use the file extension (Microsoft Windows like) to identify Extension Partnership Program can be hidden from users by default. This is a file that is a different type of building makes it seems possible for the user. For example, an executable file can be made "picture.png.exe" is called, the user only sees "picture.png" and therefore assumes that this is an image file and safest is likely.
Another method using data from the existing operating system files CRC16/CRC32 parts of the virus code is generated. Very small initial bytes of code (tens) can be opened and a large enough virus. This acts as a biological prion "is consistent with, but is based weak signature detection. The attack has not yet seen 'wild'.
No comments:
Post a Comment