Tuesday, January 8, 2019
Common Types of Viruses Essay
trojan Horses A trojan Horse argon calculator computer computer computer computer computer viruses that hide inside non-executable turn ons such as compressed or enrolment commits and executable files and try to avoid identifyion by anti-virus programs such as Norton or McAfee. Trojan Horses usually appear to be useful computer files/programs such as computer game or info library.Famous Trojan Horse Programso Back OrificeLatest Trojan Horses Newso Trojan.Pgpcoder unique upstart kind of bane Install itself on vulnerable computer after exploiter visit a certain website. polymorphous VirusesA polymorphous virus is an encrypted virus that hides itself from anti-virus trough encrypted (scrambled) data and because decrypted itself to be able to spread trough the computer. The involvement that makes it hard for anti-virus parcel program to detect polymorphic viruses is that the virus generates an entirely new decryption routine each time it infects a new executabl e file making the virus key signature different in each signature. Stealth VirusesA theft virus hides the modifications made to file and gripe records by modifying and forging the result of calls to function, thusly programs believe they are reading the certain file and not the modified file. A dear anti-virus package exit credibly detect stealth virus callable to the fact that a stealth virus attempts to hide itself in memory when anti-virus software program is launched. Slow VirusesA Slow virus is a difficult virus to detect due to the fact it only modifies and infects files when they are been modified and copied. thus the original file will not be septic by the actual copied file. A good way to protect yourself against slow viruses is by using an integrity checker orshell. Retro VirusesA Retro virus round outs the anti-virus software designed to delete it. The ex post facto virus usually attempts to attack the anti-virus data files such as the virus signature store wh ich disable the ability of the anti-virus software to detect and delete viruses. Otherwise the retroactive virus attempts to alter the operation of the anti-virus software. many-sided VirusesA multipartite virus attempts to attack and infect both the boot welkin and executable files at the same time. panoplied VirusesAn Ar more(prenominal)d virus attempts to protect itself from anti-virus software by trying to make anti-virus software believe it is located somewhere else. thus the Armored virus has made itself more difficult to0 trace, disassemble and understand. Companion VirusesA Companion virus creates a gent file for each executable file the virus infects. Therefore a fellow virus may save itself as scandisk.com and every time a substance abuser executes scandisk.exe, the computer will load scandisk.com and thus infects the system. Phage VirusesA Phage virus is a very destructive virus that re-writes an executable program with its consume code, rather than just attachin g itself to a file. Therefore a Page virus will usually attempt to delete or destroy every program it infects. Revisiting VirusesA Revisiting virus is a distort virus and attempts to copy itself within the computers memory and then copy itself to another linked computer using TCP/IP protocols. The Morris worm virus in the late 1980s was the first major virus threat to hit the Internet.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment