Malicious computer viruses written intentionally to enter a computer without user permission or knowledge of a type of software has the ability to replicate, which is still unfolding with. Some viruses replicate more, but others severe harm or adversely effect program and system performance can cause. Do not write a virus harmless and left on a system. The most common types of viruses are listed below:
Resident Virus
Virus in this type of RAM is a permanent residence. From there you overcome all the functions performed by the system can inhibit: files and programs that are open, stop corruption, copy, rename, etc.
Randex, CMJ, and MrKlunky Meve: Examples.
Direct Action Virus
The main purpose of the virus to replicate and to take action when run. When a specific condition is met, the virus infected files directory or folder and goes into action and directory paths are specified in the autoexec.bat file. The batch file in the root directory of your hard drive has always been and is certain action when the computer starts.
Overwriting virus
This type of virus is the fact that the files it infects, partially or totally useless once they have been infected so that the information contained in the feature eliminates.
The only way to overwrite the infected file is clean and completely destroyed by a virus file, thus losing the original content.
Way, Trj.Reboot, Trivial.88.D: Examples of the virus.
Boot virus
This type of virus to a floppy or hard disk boot sector affects. This is a disc where the information on disk is stored with a program is an important part of the boot (start) disk to the computer allows.
Best to prevent boot viruses to ensure that the disks are write protected floppy disk in the drive with an unknown computer is not starting.
Polyboot.B, AntiEXE: Examples of boot viruses include.
Macro viruses
Macro virus files that some applications or programs that contain macros are created using infected. These mini-programs that automate a series of operations as a single action has to be taken out one by one, saving the user from having to go.
Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.
Directory Viruses
Virus directory paths that indicate the location of a file change. A program, an unknown virus program running has been infected with the virus, the original file and the program has shifted from the virus (O expansion. EXE COM) with a walk.
Once infected it becomes impossible to locate the original files.
Polymorphic virus
Polymorphic viruses encrypt or encode them differently (using different algorithms and encryption keys) every time it infects a system.
The anti-virus it is impossible to find them using string or signature searches (because they are different in each encryption) makes for a great number of them and also to make copies of itself allows.
Elkern, Marburg, Satan Bug, and Tuareg: Examples.
File infectious
This type of virus program or executable files (an exe extension file extension O .. com) infected. When these programs to run, directly or indirectly, the virus is activated, the harmful effects that's built to perform scheduled. The majority of existing viruses belong to this category, and can be categorized based on functions.
Companion virus
Company virus file infector viruses like resident or direct action types can be considered. They are known as companion viruses because once they system they already have the other files with "Enter". In other words, in order to carry out their infection routines, companion viruses expected in memory until a program (resident viruses) or copies of themselves (direct action by the virus can run tasks immediately.)
Stator, and Terrax.1069 Asimov.1539: Some examples include
Fat Virus
File Allocation Table or add information to the fat part of the disc and is an important part of normal operation.
This type of virus attack, especially dangerous disk where important files by preventing access to certain parts may be. Loss of individual files or entire directory information may be lost.
Worms
A worm is a program very similar to a virus, but the ability to replicate itself, and can have negative effects on the system and most importantly they are out and removed by antivirus.
Bugs are a few examples: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.
Trojan or Trojan horses
Another unpleasant breed of malicious code, Trojan or Trojan horses, viruses, unlike the other files infected or not reproduce by self-replicate like worms are.
Logic bomb
Not considered viruses because they are not repeated. They also program itself, but rather hidden sections are not other programs.
The objective to destroy computer data once certain conditions are met. Logic bombs go undetected until launched, and the results can be devastating.
Resident Virus
Virus in this type of RAM is a permanent residence. From there you overcome all the functions performed by the system can inhibit: files and programs that are open, stop corruption, copy, rename, etc.
Randex, CMJ, and MrKlunky Meve: Examples.
Direct Action Virus
The main purpose of the virus to replicate and to take action when run. When a specific condition is met, the virus infected files directory or folder and goes into action and directory paths are specified in the autoexec.bat file. The batch file in the root directory of your hard drive has always been and is certain action when the computer starts.
Overwriting virus
This type of virus is the fact that the files it infects, partially or totally useless once they have been infected so that the information contained in the feature eliminates.
The only way to overwrite the infected file is clean and completely destroyed by a virus file, thus losing the original content.
Way, Trj.Reboot, Trivial.88.D: Examples of the virus.
Boot virus
This type of virus to a floppy or hard disk boot sector affects. This is a disc where the information on disk is stored with a program is an important part of the boot (start) disk to the computer allows.
Best to prevent boot viruses to ensure that the disks are write protected floppy disk in the drive with an unknown computer is not starting.
Polyboot.B, AntiEXE: Examples of boot viruses include.
Macro viruses
Macro virus files that some applications or programs that contain macros are created using infected. These mini-programs that automate a series of operations as a single action has to be taken out one by one, saving the user from having to go.
Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.
Directory Viruses
Virus directory paths that indicate the location of a file change. A program, an unknown virus program running has been infected with the virus, the original file and the program has shifted from the virus (O expansion. EXE COM) with a walk.
Once infected it becomes impossible to locate the original files.
Polymorphic virus
Polymorphic viruses encrypt or encode them differently (using different algorithms and encryption keys) every time it infects a system.
The anti-virus it is impossible to find them using string or signature searches (because they are different in each encryption) makes for a great number of them and also to make copies of itself allows.
Elkern, Marburg, Satan Bug, and Tuareg: Examples.
File infectious
This type of virus program or executable files (an exe extension file extension O .. com) infected. When these programs to run, directly or indirectly, the virus is activated, the harmful effects that's built to perform scheduled. The majority of existing viruses belong to this category, and can be categorized based on functions.
Companion virus
Company virus file infector viruses like resident or direct action types can be considered. They are known as companion viruses because once they system they already have the other files with "Enter". In other words, in order to carry out their infection routines, companion viruses expected in memory until a program (resident viruses) or copies of themselves (direct action by the virus can run tasks immediately.)
Stator, and Terrax.1069 Asimov.1539: Some examples include
Fat Virus
File Allocation Table or add information to the fat part of the disc and is an important part of normal operation.
This type of virus attack, especially dangerous disk where important files by preventing access to certain parts may be. Loss of individual files or entire directory information may be lost.
Worms
A worm is a program very similar to a virus, but the ability to replicate itself, and can have negative effects on the system and most importantly they are out and removed by antivirus.
Bugs are a few examples: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.
Trojan or Trojan horses
Another unpleasant breed of malicious code, Trojan or Trojan horses, viruses, unlike the other files infected or not reproduce by self-replicate like worms are.
Logic bomb
Not considered viruses because they are not repeated. They also program itself, but rather hidden sections are not other programs.
The objective to destroy computer data once certain conditions are met. Logic bombs go undetected until launched, and the results can be devastating.
No comments:
Post a Comment