Quantcast
Channel: Computer And Technology Blogs » antivirus
Viewing all articles
Browse latest Browse all 10

Virus

$
0
0

Definition Of Virus

Everyone fears that the receiver of a computer virus, but not every spirit study them. There are researchers who spend a lot of time to be determined for different types of computer viruses and related security risks, as they are programmed as they happen and how they spread.

But even if you do not know a lot of care, basic knowledge about security risks useful. It is sometimes difficult to know how the risk addressed before you will know their consequences must. With a computer, but sometimes the result is complete loss of your data or identity theft – so it is best to find out sooner rather than later.

  • Boot sector virus
    The term “boot sector” is a generic name that appears originally from MS-DOS, but is now widespread information is used by each operating system on the boat. In modern computers, this is usually called “Master Boot Record” and it is the first sector in a partitioned memory. Boot sector viruses became popular to start by using floppy disks. A computer The widespread use of the Internet and the death of the floppy is made a more effective way of virus transmission.
  • Browser hijackers
    This type of virus that can spread in many ways, including voluntary download, effectively hijacked browser-specific functions, typically in the form again, the user automatically at specific locations. It is usually assumed that these tactics designed to increase web advertising revenue. There are many such viruses, and they usually have “search” include somewhere in their description. Cool Web Search perhaps the most famous example, but others are almost as common.
  • Direct action virus
    This type of virus, unlike most, only comes into action when the file is executed, carried out with the virus. The payload is delivered and then the virus is mainly sleep – it takes no other action unless an infected file is executed again. Most viruses do not use the direct action propagation method simply because it is not productive, but viruses of this type have done damage in the past. The Vienna virus, which briefly threatened computers in 1988, is an example of a direct action virus.
  • File infector virus
    Perhaps the most common form of the virus, the file infector root starts in a host file and then its operation when the file is executed. The virus infects the file overwrite fully, or leave only parts need to be replaced, from the file, or they can not be replaced, but re-write the file so that the virus is, instead of the program according to the user. Although not considered “file virus” definition to all viruses in all files in general – for example, the virus can not refer to the macro virus file below. Instead, the definition of the rule is only supposed to viruses as an executable file format. Exe, as their host.
  • Macro virus
    A variety of programs, including Microsoft Office applications such as Excel, support for macros – specific actions in the document with a specific macro programming programmed. Unfortunately, it’s possible that a virus is hidden in a seemingly innocuous document. Macro viruses very strong in relation to the payload. The most famous macro virus is probably Mellisa, a Word document, probably the passwords to pornographic websites. The virus also link to Microsoft Word, Outlook, exploited to make copies of itself.
  • Multipartite virus
    While some viruses are spread like a method for delivering a single charge, want multi-part viruses everything. A virus of this kind can spread in different ways, and various actions on an infected computer depending on variables such as the operating system or the existence of certain files.
  • Polymorphic virus
    Another jack-of-all-trades, the Polymorphic virus actually mutates over time or used after each presentation of a modification to the code to deliver his load. Alternatively or in addition, a polymorphic virus with an encryption algorithm that automatically aligns itself when certain conditions are met, to monitor. The purpose of this is to avoid deception. Antivirus programs often used by virus-specific code. Obscures or you can change the code of a virus to avoid detection.
  • Resident virus
    This broad virus definition applies to all viruses, the stakes in the system’s memory. There may be a number of measures and run independent of the file that was originally infected. A native virus can be a direct challenge virus, which is not even in the memory of the system and, therefore, only when an infected file is executed, compared.
  • Web Scripting Virus
    Many websites run complex code to provide interesting content. Playing Videos in your browser, for example, requires the implementation of a specific code language that provides both the video itself and the player interface. Of course, this code can be used, which makes it possible to infect a virus or actions on a computer with a computer through a website. Although malicious sites sometimes deliberately infected code to be made, there are many such cases of the virus, because the code is inserted in a website without knowledge of the webmaster.

Viewing all articles
Browse latest Browse all 10

Trending Articles