Jahan Zaible Ghari

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 9 August 2013

Types of viruses

Posted on 10:16 by Unknown




1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.

Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .

Some common file viruses are Sunday, Cascade.

3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.

Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.

4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.

5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.

6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.
-->
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Tricks | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 8 shortcuts: Keyboard Shortcuts-1
    List of Windows 8 Shortcuts Have you tried Microsoft’s latest Operating system Windows 8 yet? If you already tried, then you’ll find a huge ...
  • Facebook Auto Liker Without Access Token
    AUTO LIKER SITE http://fb-auto-posts-liker.blogspot.com/ Friends.... Now u can use the World's 1st Facebook Auto-Liker Without Access To...
  • Six Tips for protecting Wireless Networks-Wi-Fi
                                                                                                             With the growing presence of the te...
  • Windows Defender Free Download
    Windows Defender is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and ...
  • How to Hack My Space Hacking
    MySpace being one of the world’s largest social networks, has become today a favorite place for many to maintain secret relationships and ex...
  • Free Router Simulator Softwares
    If you are going to take a networking exam like CCNA, CCNP… it is better to practice with real routers. But when the budget is not big enoug...
  • WINDOWS MEDIA PLAYER FIREFOX PLUGIN 1.0.0.8 Free Download
    WINDOWS MEDIA PLAYER FIREFOX PLUGIN 1.0.0.8                                   Microsoft Corporation - 311KB (Freeware) Windows Media Player ...
  • Hacking Gmail account using GX cookie
    Introduction Hacking web application was always curious for the script kiddies. And hacking free web email account is every geek first attem...
  • Windows 7 Ultimate Highly Compressed in 10 Mb Only Free Download
    Win dows 7 Ultimate is the most versatile and powerful edition of Windows 7. It is including the ability to run many Windows XP productivity...
  • Total PDF Converter 2.1.233 + Key Free Download
    Total PDF Converter 2.1.233 + Key Total PDF Converter converts PDF files to HTML, DOC (Word), text, Excel, PostScript, CSV or image files (e...

Categories

  • Android
  • AntiVirus
  • Audio and video Players
  • Auto Cad
  • C/C++
  • CCNA
  • Converters
  • Facebook Auto Liker
  • Hacking
  • Inpage
  • Locks
  • Media players
  • MS Office
  • Nokia
  • photo Editors
  • Recovery
  • Recovery.
  • Sites Unblocker
  • Social Network
  • Softwares
  • Tricks
  • Typing Tutors
  • Ufone
  • UniversalDrivers
  • Video Editings
  • Visual Studio
  • Wifi
  • Windows

Blog Archive

  • ▼  2013 (166)
    • ►  October (1)
    • ▼  August (31)
      • Visual Studio 2013 Preview: Code Map Debugger Inte...
      • SKYPE VOICE CHANGER(AUDIO/VIDEO CHAT SUPPORTED)
      • BEST WINDOWS 8 ACTIVATOR FOR ACTIVATING VERSIONS O...
      • MS OFFICE 2013 DOWNLOAD | MS OFFICE 2013 FULL WITH...
      • µTORRENT 3.2.3.28705 FINAL FREE DOWNLOAD
      • INTERNET DOWNLOAD MANAGER IDM 7.1 WITH LIFETIME VA...
      • AVAST INTERNET SECURITY V7.0.1426 INCL LICENSE KEY...
      • Hack WiFi With WiFi Hacker 1.2 On Android Mobiles
      • WIFI HACK TOOL FOR ANDROID MOBILES 100% WORKING FR...
      • Commview Wifi Hacker v6.0.581 Full version For PC ...
      • Hack wifi/WEP/WPA2 password using aircrack-ng
      • How to Crack Wifi Or Wireless Password
      • Intranet & Internet
      • DOWNLOAD AND RESUME SUPPORTED 3G PROXY SUPPORT YOU...
      • Abstract Backgrounds Black wallpaper for personali...
      • Computer Acronyms
      • HOW TO CONNECT ANDROID INTERNET TO LINUX/BACKTRACK...
      • Windows 8 shortcuts: Keyboard Shortcuts-1
      • How to hack remote COMPUTER using IP address
      • Types of viruses
      • 70 Hacking eBook Collection
      • Hack Facebook Account With Keylogger
      • Make A Virus That Disable Mouse
      • 70 Hacking eBook Collection
      • Complete Hackers Guide
      • How To Became A Great hacker
      • The Reality Of Hacking Facebook, Gmail, Yahoo Acco...
      • TRICK TO INSTALL FACEBOOK HOME ON ANY ANDROID POWE...
      • Killer Tips To Increase traffic on your Blog
      • Trace someone in Facebook Account
      • HOW TO HIDE ALL OPENED TABS IN YOUR BROWSE WITH ON...
    • ►  July (45)
    • ►  May (3)
    • ►  April (3)
    • ►  February (13)
    • ►  January (70)
Powered by Blogger.

About Me

Unknown
View my complete profile