Types of Viruses
These contaminate executable PC program files like those with extensions such as.COM, .BIN, .OVL, .EXE, .DRV (driver) as well as .SYS (device driver). All of these programs are being loaded in memory throughout execution, captivating the virus with them. The virus turns to be active in memory, creating copies of it and infecting files on the disk.
Examples: Cascade, Sunday
These infect the master boot records of hard disks or floppy disk boot records. They restore the boot record program (that is accountable for loading the operating system in the memory) duplicating it away on the disk or even overwriting it. Boot viruses were loaded into memory if the PC tries to examine the disk as it is booting.
Examples: Michelangelo, Disk Killer, Form, and Stone virus
A hybrid of Program and Boot viruses. These infect program files and once the infected program is performed, these viruses dirty the boot record. Once you boot the PC next time the virus from the boot trace loads in the memory and then begins infecting other files on the disk.
Examples: Flip, Tequila, and Invader
This is a new kind of PC virus that infects the macros in a template or document. As you open a spreadsheet document or word processing, the macro virus is triggered and it taints the Normal template (Normal.dot)-a universal use file that saves default document formatting surroundings. Each document you open refers to Normal template, as well as thus gets infected by the macro virus. Because this virus connects itself to documents, the infection could extend if such documents are released on other PCs.
Examples: Nuclear, DMV, Word Concept.
These viruses employ sure techniques to shun detection. They might either readdress the disk head to understand writing another sector as an alternative of the one into which they dwell otherwise they might change the reading of the contaminated file’s size showing the directory catalog. As the Whale virus added 9216 bytes to a contaminated file; afterward the viruses deduct identical number of bytes (9216) from the size shown in the directory.
Examples: Whale, Frodo, Joshi,
Java controls and ActiveX would almost immediately be the scourge of computing. Mostly citizens don’t know how to manage there web browser to disable or enable the a variety of function like playing video or sound and thus, by default, go a nice large hole in the safety through allowing applets free to run into there machine. There have been lots of commotion after this plus through the amount of authority that JAVA imparts, stuff from the security angle seems a bit gloom.
It is a kind of virus that could encrypt its code in a dissimilar way so that it comes out in a different way in every infection. These viruses are more not easy to identify.
Examples: Virus 101, Involuntary, Evil, Proud, Stimulate, Phoenix, Cascade
These are just a small number of broad categories. There have lots of more specialized types. However allow us not to go into that. Here, we learn to guard our self, not to write a theory on computer virus specification.
How to protect your PC
Types of Viruses
Malware: A General Overview
A Quick Analysis of a PC Virus
Protecting Your PC from Spyware
Preventing Macro Viruses
Write a comment
- Required fields are marked with *.
Free Antivirus Software
- Free Antivirus Software
- Free Online Virus Scan
- Free Trojan Removers
- Free Adware/Spyware Removers
- Free Antivirus for Android
- Free Antivirus for Mobile
- Free Firewall
- Free Rootkit Removers
- Free Spam Filters
- Free Advanced Spam Filters
- Free HIPS (Host Intrusion Protection Software)
- Free Antivirus for MAC
- Free Antivirus for Linux