How many types of computer viruses
There are several types of viruses, which can be based on their origin, equipment, files with the disease, where they are hiding, what kind of damage they cause, type of operating system or platform, etc. Let's look some of them.
This type of virus consistently, he lives in RAM. Because they can overcome and interrupt all system functions. It can destroy files and programs open, closed, copy, rename, etc.
Example: Randex, and CMJ MrKlunky Neve.
The immediate effects of the virus
The main objective of this virus to replicate and to act in the implementation phase. When certain conditions are met, the virus infected files in the directory or folder and run it in the path specified in the AUTOEXEC.BAT file. This batch file is located in the root directory is always difficult, and perform certain operations when the computer starts.
Example: The Vienna virus.
Type of virus
The virus is that it removes the information in the files, infect it makes them partially or totally useless once infected. The only way to clean the infected files overwrite deleted files, losing the original content.
Examples: roads, Trivial.88.D Trj.Reboot.
Boot sector viruses
This virus affects the boot sector or hard disk. This is a fundamental part of the disk, where information is stored on disk with the program can be started (start) a computer disk. The best way to avoid viruses is to ensure that the boot-sector disks are read-only and not your computer boots from the floppy drive into the unknown.
Example: Polyboot.B, AntiExe.
Macro viruses infect files that are created with specific applications or applications that contain macros. These programs to automate the mini-series of operations performed as an action so you have one.
Example: link, Melissa.A the Bablas to O97M/Y2K.
Directory of virus
The directory viruses alter the location of the file. When you run the file extension of the program. EXE or. COM, a virus, a virus, run unconsciously virus program, and the original file and the program moved to the virus. Once infected, it becomes impossible for the original file.
Examples: land 2 viruses.
Polymorphic viruses encrypt or encode themselves in different ways (different algorithms and encryption keys) every time the infected system. It can not "find their antivirus signatures or search using the string (because they are different in each encryption). The virus then creates a large number of copies.
Example: Elkern, Marburg, Satan Bug, and Tuareg.
File infector Virus
This type of virus-infected programs or files executable (EXE or COM extension Baili ..). When you run these programs, directly or indirectly, the virus is activated, produces dangerous is being organized to perform. The majority of existing viruses belong to this category, and can be classified based on the measure.
Example: Cleevix and Cascade.
Virus companies can be considered a type of file infecting viruses types of shares as residents or directly. They are known as companion viruses because once they see the files "that are already active. In other words, in the order sequence of infection, the companion virus waiting for memory" as the program is running (virus dwellings) or act immediately after receiving copies of itself (live virus).
Examples include: stator and Asimov.1539 Terrax.1069
File Allocation Table or FAT is a part of the disc used to store all the information about where the file space, space that can not be used, virus attack etc. FAT FAT in the forum, and damage to important information. This can be especially dangerous because it interferes with some parts of the disk where important files are stored. Damage can cause loss of information on individual files or entire directories.
These viruses can be spread in many ways. This may vary depending on the measure, if the operating system installed, and the presence of specific files.
Examples: Invader, turned and Tequila
The web Script virus
The site contains a lot of complex code to create powerful and interactive content. This code is often used for undesirable behavior.
WormsThe virus is a program that is very similar to the virus, the ability to replicate and cause adverse effects on the system. But it can be detected and eliminated by antivirus software.
Examples of worms are: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.
Trojan or Trojan horse
Trojan, Trojan horse or other nasty breed of malicious code, which unlike viruses do not reproduce by infecting other files, as well as local self-government similar to the worms. In fact, this is a program masquerading as tools or application.
They are not like viruses because they are not repeated. They also function as separate programs, but camouflaged parts of other programs. They can only be implemented when certain conditions are met. Their goal is to destroy data on your computer when certain conditions are met. Logic bombs go undetected until launched, and the result can be devastating.
For further information due computer and software management, please visit the G8 Summit Computer Development.
Written by The Committe Of Cygnet editorial team.