Three categories of computer viruses


















MyDoom was spreading rapidly at the time and Jaschan, a newbie coder, wanted to see what would happen if his bug could spread faster than MyDoom. Things quickly escalated from there. Sasser was so effective it actually ground one third of the post offices in Taiwan to a halt, shut down branches of a Finnish bank, and forced rail and transatlantic flights to be cancelled.

Quite a lot, as it so happens. So in the early to mid-noughties, Anna Kournikova was one of the most searched terms on the internet.

People were just very into tennis. The mayor of the town came forward and said the city should be proud to have produced such a talented young man and offered him a job as a techie once he was finished his education. While most of the malware on this list strictly hit computers, Slammer was created with broader ambitions. Slammer is the kind of virus that makes it into films, as only a few minutes after infecting its first victim, it was doubling itself every few seconds.

Slammer, quite aptly, caused a huge panic as it had effectively managed to crash the internet in 15 quick minutes. Stuxnet is easily the scariest virus on the list as it was built by government engineers in the US with the intention of obstructing nukes from being built in Iran. Stuxnet spread by a USB thumb drive and targeted software controlling a facility in Iran that held uranium. Stuxnet is the first real venture into cyberwar and it definitely asks the question as to what will come next.

So there you have it: while viruses and malware might seem like a myth drummed up by tech companies, they are a very real threat that have caused billions in damage. Sort: Most Recent Reviews. Please sign in to your account to enter additional information for monitoring purposes. No one can prevent all cybercrime or identity theft.

LifeLock identity theft protection is not available in all countries. All rights reserved. Firefox is a trademark of Mozilla Foundation.

App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3. Other names may be trademarks of their respective owners.

It is also called a Parasitic virus because it leaves no file intact but also leaves the host functional. Boot sector Virus: It infects the boot sector of the system, executing every time system is booted and before the operating system is loaded. It infects other bootable media like floppy disks. These are also known as memory viruses as they do not infect the file systems.

Macro Virus: Unlike most viruses which are written in a low-level language like C or assembly language , these are written in a high-level language like Visual Basic.

These viruses are triggered when a program capable of executing a macro is run. For example, the macro viruses can be contained in spreadsheet files. Source code Virus: It looks for source code and modifies it to include virus and to help spread it. Polymorphic Virus: A virus signature is a pattern that can identify a virus a series of bytes that make up virus code. So in order to avoid detection by antivirus a polymorphic virus changes each time it is installed.

The functionality of the virus remains the same but its signature is changed. Encrypted Virus: In order to avoid detection by antivirus, this type of virus exists in encrypted form. It carries a decryption algorithm along with it. So the virus first decrypts and then executes. Stealth Virus: It is a very tricky virus as it changes the code that can be used to detect it. Hence, the detection of viruses becomes very difficult.

For example, it can change the read system call such that whenever the user asks to read a code modified by a virus, the original form of code is shown rather than infected code.

Tunneling Virus: This virus attempts to bypass detection by antivirus scanner by installing itself in the interrupt handler chain. Interception programs, which remain in the background of an operating system and catch viruses, become disabled during the course of a tunneling virus. Similar viruses install themselves in device drivers. Multipartite Virus: This type of virus is able to infect multiple parts of a system including the boot sector, memory, and files.

Then go to the other user system with this file and also harm other files of that system. To avoid macro viruses you must use high antivirus or always open your windows antivirus. Also must be disable micro in your computer. Overwrite virus is the dangerous virus in this list of viruses. Once the virus infected the file and content in your system then no chance of recovery that content or file.

This virus also spread in speed. The only option is to avoid this virus. You can delete all infected files or content. Or always up to date with your windows antivirus. Antivirus itself detects a virus or infected content and deletes it. Direct action virus is different from other types of viruses. When the victim opens the infected files it will be active. During this, it can harm other files on the computer. It is locate in the root directory.

This virus can be diagnose and remove. Files were also restored after affected. But this virus automatic deletes infected files from the system. To avoid this type of virus it must run the powerful antivirus in a computer. Trojan horses are the most powerful and dangerous type of virus. Once it can enter its victim computer system.

All information locked. Only the person who has this virus key can open the files. Hackers use this type of virus in most of their attacks. Because this virus is helpful to gain access to the victim system. Use this data as they like. To avoid this type of dangerous virus , do not click on any link on the internet. Not open the mails that sent by unknowns. As the name shows, the memory-resident virus infects the main memory. Main memory means it infects the RAM. So when the computer system is starting, the virus also starts working.

To understand more, the operating system itself helps this virus to run in the system. All the programs run on computers infected with this virus. Because this virus infects the main part of the computer, memory. All files of the computer are corrupt because of this. To avoid this , you must have powerful antivirus that can detect it and remove it. The multi-part virus attack on the boot sector of the operating system.

The boot sector is the most important part of OS. Using boot, this virus can spread the whole system. It can affect all files and programs. Only one method to remove this virus from the computer is to format the whole computer. In the last of these computer virus types, lists are boot sector virus. This virus is dangerous because its direct attacks computer storage.

It stored in a location of storage. The go-to is the main memory. As the user restarts the machine. The boot sector virus is the oldest virus. In the start, it spread using the floppy disk. But now, it spread using external drives like USB. So to avoid this.

Make sure during restart the computer no external drives attach with the computer. After the explanation of every type of virus.



0コメント

  • 1000 / 1000