Types of viruses :-
The different types of viruses areas follows-
1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of thehard disk or the floppy drive.The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard diskor overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus,any non-write-prote cted disk accessed by this system will become infected.
Examples of boot- sector viruses are Michelangelo andStoned.
2) File or Program Viruses :- Some files/ programs, when executed, load the virus in the memory and perform predefined functions to infectthe system. They infect program files with extensionslike .EXE, .COM, .BIN,.DRV and.SYS .
Some common file viruses areSunday, Cascade.
3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, filesat the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, andwhen the virus attachesto the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.
Ghostball was the first multipartite virus, discoveredby Fridrik Skulason in October 1989.
Other examples are Invader,Flip, etc.
4) Stealth Viruses :- These viruses are stealthy in nature means it uses variousmethods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus programaclean image of the file or bootsector.
5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code knownas the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.
6) Macro Viruses :- A macro virus is a computer virus that"infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when theapplication is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus.Well-know n examples are Concept Virus and Melissa Worm.
Categories
- 000 frnds (1)
- 12 UNKNOWN programming language (1)
- Alibaba (1)
- Amazon (1)
- Amd (1)
- Android (7)
- Apple (5)
- Bank (1)
- Bing Maps Preview is Microsoft's answer to Google Earth (1)
- Blackberry (3)
- Breaking News (1)
- Breathalyzer Could Detect Drugs (1)
- Business (2)
- Computer (2)
- Database Leaked (1)
- defacing websites (1)
- ebay (1)
- facebook (3)
- First smart phone for blind people (1)
- Game news (2)
- getting 5 (1)
- Gigabytes (1)
- Google (5)
- Google+ (1)
- Hack (3)
- Hacker can control aircraft system with Android Smartphone (1)
- hacker news (3)
- Hacking Concept (1)
- hacking with smart phone (2)
- How to disable/delete your victim's Antivirus? (1)
- How to sent message on fb if anyone is blocked? (1)
- HP (1)
- Imortant news (1)
- instagram (1)
- Intel (1)
- internet (3)
- iOS (1)
- iphone (1)
- iPhone history (1)
- IT (1)
- Lenovo (1)
- Mac (1)
- Microsoft (11)
- Microsoft Surface 2 A Competitive Offering (1)
- Microsoft's Windows 8.1: When will users get the final bits? (1)
- military (1)
- Mobile (4)
- Modern-style Firefox for Windows 8 pushed back to March (1)
- motorcycle (1)
- New LED Streetlight Design Cuts Light Pollution (1)
- Nokia (1)
- Nokia Asha (1)
- Nvidia (1)
- One Windows Store Is The Key (1)
- Paint your TV on your own style (1)
- Paint' a TV Remote onto Your Coffee Table (1)
- pc facts (2)
- Robot (1)
- Samsung (3)
- Samsung Galaxy S3 hack (1)
- Samsung Galaxy S3 Lock screen bypass vulnerability (1)
- Smartphone (1)
- Smartphone security (1)
- Space (5)
- The 100 Best Android Apps of 2013 (1)
- The first 1 GB hard (1)
- Thinkpad (1)
- This is a list of SQL dorks can use to help you find (1)
- Top 10 PC Games Chart (1)
- Turkish Ajan Hacker Group (1)
- twitter (3)
- Ubuntu forums hacked (1)
- UFC Fight Night: HENDERSON VS. THATCH (1)
- UFC Fight Night: Rockhold vs Bisping (1)
- Video formats (1)
- Windows (5)
- World cup 2014 (1)
- World's Biggest DDoS attack (1)
- Xbox (1)
Text Widget
Tuesday, January 22, 2013
Subscribe to:
Post Comments (Atom)
Popular Posts
-
SQL injection vulnerable websites using google search. Simply goto google and type trainers.php?id= article.php?ID= play_old.php...
-
> Using GOOGLE Hi guys, been a while since I posted something cool related tohacking.Today I am going to show you how to access unsecured...
-
stealing $14 million from a bank It can be easier than most people think. The alleged thieves who made headlines last week for their...
-
Satellite It sounds like the opener to a sci-fi B-movie plot: Scientists find an old, dead satellite from the 1970′s orbiting Earth...
-
Video Formats and their Abbreviation A knowledge for u all Video Formats with abbreviation AAF – mostly intended to hold edit dec...
-
A Security Researcher Hugo Teso at Hack In The Box security conference has demonstrated that it is possible for a hacker to take control o...
-
UFC FIGHT NIGHT BROOMFIELD UFC Fight Night: HENDERSON VS. THATCH Main Event Time Event: UFC Fight Night: HENDERSON VS. THATCH ...
-
1 Bit = Binary Digit 8 Bits = 1 Byte 1024 Bytes = 1 Kilobyte 1024 Kilobytes = 1 Megabyte 1024 Megabytes = 1 Gigabyte 1024 Gigaby...
-
How to Create Quality Content in 7 Steps Your audience wants quality content. Avoid getting lost in the details and stay on the proven p...
-
The U.S. National Security Agency (NSA) may be hiding highly-sophisticated hacking payloads in the firmware of consumer hard drives ove...
0 comments:
Post a Comment