Friday, March 1, 2019
Common Types of Viruses Essay
trojan horse Horses A Trojan Horse are calculator computer computer viruses that hide inside non- practicable files such as compressed or record files and executable files and try to avoid detection by anti-virus computer programmes such as Norton or McAfee. Trojan Horses usually appear to be useful figurer files/programs such as computer game or data library. renowned Trojan Horse Programso Back OrificeLatest Trojan Horses Newso Trojan.Pgpcoder unique sensitive kind of threat constitute itself on vulnerable computer after substance abuser visit a certain website. Polymorphic VirusesA polymorphic virus is an encrypted virus that hides itself from anti-virus money box encrypted (scrambled) data and then decrypted itself to be able to spread trough the computer. The matter that makes it hard for anti-virus bundle package to detect polymorphic viruses is that the virus generates an entirely new decryption routine apiece time it infects a new executable file making the vi rus signature different in from each one signature. Stealth VirusesA stealth virus hides the modifications made to file and strike records by modifying and forging the result of calls to function, therefore programs believe they are schooling the original file and not the modified file. A good anti-virus software will probably detect stealth virus due to the situation that a stealth virus attempts to hide itself in memory when anti-virus software is launched. Slow VirusesA Slow virus is a difficult virus to detect due to the fact it only modifies and infects files when they are been modified and copied. so the original file will not be infected by the actual copied file. A good way to protect yourself against slow viruses is by using an integrity checker orshell. retroactiveactive VirusesA Retro virus attacks the anti-virus software designed to delete it. The retro virus usually attempts to attack the anti-virus data files such as the virus signature computer memory which di sable the ability of the anti-virus software to detect and delete viruses. Otherwise the retro virus attempts to alter the operation of the anti-virus software. Multipartite VirusesA multipartite virus attempts to attack and infect both the boot sector and executable files at the same time. Armored VirusesAn Armored virus attempts to protect itself from anti-virus software by trying to make anti-virus software believe it is located somewhere else. wherefore the Armored virus has made itself more difficult to0 trace, disassemble and understand. assistant VirusesA Companion virus creates a companion file for each executable file the virus infects. Therefore a companion virus may save itself as scandisk.com and every time a user executes scandisk.exe, the computer will load scandisk.com and therefore infects the system. bacteriophage VirusesA Phage virus is a very destructive virus that re-writes an executable program with its own code, rather than just attaching itself to a file. T herefore a Page virus will usually attempt to delete or destroy every program it infects. Revisiting VirusesA Revisiting virus is a rick virus and attempts to copy itself within the computers memory and then copy itself to other linked computer using TCP/IP protocols. The Morris worm virus in the late 1980s was the first major virus threat to hit the Internet.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment