Agosto. 2017
 << < > >>


¿Quién está en línea?

Miembro: 0
Visitante: 1

rss Sindicación



The 9 Kinds Of Computer System Viruses To Watch Out For & Just What They Do

The widespread usage of the Internet and the death of the floppy has made other means of virus transmission more effective. 2. Browser Hijacker This type of virus, which can spread itself in numerous ways including voluntary download, effectively hijacks certain browser functions, usually in the form of re-directing the user automatically to particular sites. Its usually assumed that this tactic is designed to increase revenue from web advertisements. There are a lot of such viruses, and they usually have search included somewhere in their description. CoolWebSearch may be the most well known example, but others are nearly as common. 3. Direct Action Virus This type of virus, unlike most, only comes into action when the file containing the virus is executed. The payload is delivered and then the virus essentially becomes dormant it takes no other action unless an infected file is executed again. Most viruses do not use the direct action method of reproduction simply because it is not prolific, but viruses of this type have done damage in the past. The Vienna virus , which briefly threatened computers in 1988, is one such example of a direct action virus. 4. File Infector Virus Perhaps the most common type of virus, the file infector takes root in a host file and then begins its operation when the file is executed. The virus may completely overwrite the file that it infects, or may only replace parts of the file, or may not replace anything but instead re-write the file so that the virus is executed rather than the program the user intended. Although called a file virus the definition doesnt apply to all viruses in all files generally for example, the macro virus below is not referred to by the file virus. Instead, the definition is usually meant to refer only to viruses which use an executable file format, such as .exe, as their host. 5. Macro Virus A wide variety of programs, including productivity applications like Microsoft Excel, provide support for Macros special actions programmed into the document using a specific macro programming language. Unfortunately, this makes it possible for a virus to be hidden inside a seemingly benign document. Macro viruses very widely in terms of payload. The most well known macro virus is probably Melissa , a Word document supposedly containing the passwords to pornographic websites. The virus also exploited Words link to Microsoft Outlook in order to automatically email copies of itself. 6. Multipartite Virus While some viruses are happy to spread via one method or deliver a single payload, Multipartite viruses want it all. A virus of this type may spread in multiple ways, and it may take different actions on an infected computer depending on variables, such as the operating system installed or the existence of certain files. 7. Polymorphic Virus Another jack-of-all-trades, the Polymorphic virus actually mutates over time or after every execution, changing the code used to deliver its payload. Alternatively, or in addition, a Polymorphic virus may guard itself with an encryption algorithm that automatically alters itself when certain conditions are met. The goal of this trickery is evasion. Antivirus programs often find viruses by the specific code used. Obscuring or changing the code of a virus can help it avoid detection. 8. Resident Virus This broad virus definition applies to any virus that inserts itself into a systems memory. It then may take any number of actions and run independently of the file that was originally infected. A resident virus can be compared to a direct payload virus, which does not insert itself into the systems memory and therefore only takes action when an infected file is executed. 9. Web Scripting Virus Many websites execute complex code in order to provide interesting content. Displaying online video in your browser, for example, requires the execution of a specific code language that provides both the video itself and the player interface.
For the original version including any supplementary images or video, visit

Admin · 42 vistas · Escribir un comentario

Vínculo permanente hacia el artículo completo


Este artículo no tiene Comentario por el momento .....

Escribir un comentario

Estatuto de los nuevos comentarios: Publicado

Se mostrará tu URL

Por favor introduce el código contenido en las imágenes.

Texto del comentario

   (Salvar el nombre, el mail y la URL en los cookies)