SlideShare a Scribd company logo
1 of 9
Types Of Viruses
Not all computer viruses behave, replicate, or infect the same way. There are several different
categories of viruses and malware. Below I list and discuss some of the most common types of computer
viruses.

Trojan Horse:
A trojan horse program has the appearance of having a useful and desired function. While it may
advertise its activity after launching, this information is not apparent to the user beforehand. Secretly
the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but
causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone
or carried by another program and may arrive in the form of a joke program or software of some sort.
The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including
data destruction or compromising a system by providing a means for another computer to gain access,
thus bypassing normal access controls.

Worms:
A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one
disk drive to another, or by copying itself using email or another transport mechanism. The worm may
do damage and compromise the security of the computer. It may arrive via exploitation of a system
vulnerability or by clicking on an infected e-mail.

Bootsector Virus:
A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup.
These are normally spread by floppy disks.

Macro Virus:
Macro viruses are viruses that use another application's macro programming language to distribute
themselves. They infect documents such as MS Word or MS Excel and are typically spread
to other similar documents.

Memory Resident Viruses:
Memory Resident Viruses reside in a computers volitale memory (RAM). They are
initiated from a virus which runs on the computer and they stay in memory after it's
initiating program closes. ppppppppppp

Rootkit Virus:
A rootkit virus is an undetectable virus which attempts to allow someone to gain control
of a computer system. The term rootkit comes from the linux administrator root user.
These viruses are usually installed by trojans and are normally disguised as operating
system files.

Polymorphic Viruses:
A polymorphic virus not only replicates itself by creating multiple files of itself, but it also
changes it's digital signature every time it replicates. This makes it difficult for less
sophisticated antivirus software to detect.

Logic Bombs/Time Bombs:
These are viruses which are programmed to initiate at a specific date or when a specific
event occurs. Some examples are a virus which deletes your photos on Halloween, or a
virus which deletes a database table if a certain employee gets fired.
Computer virus
From Wikipedia, the free encyclopedia
See also: Malware

A computer virus is a computer program that can replicate itself[1] and spread from one computer to
another. The term "virus" is also commonly, but erroneously, used to refer to other types ofmalware,
including but not limited to adware and spyware programs that do not have a reproductive ability.

Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest
adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused
with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to
spread itself automatically to other computers through networks, while a Trojan horse is a program that
appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a
computer system's data or performance. Some viruses and other malware have symptoms noticeable to
the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some
viruses do nothing beyond reproducing themselves.
Script Viruses - Types and Habitats

Script viruses (sometimes called macro viruses) generally travel embedded in email and office
automation documents, although they can be found in web pages as well.

Old fashioned program viruses are usually implemented in executable system code, whereas script
viruses are usually written in a powerful high-level language that is compiled and run on the fly.
They often have sophisticated functionality and direct interfaces to high level applications such as
word processing, spreadsheet, email, and web programs, and can wreak considerable havoc. Since
they first surfaced in office automation programs, they are sometimes also called "macro" viruses.
Script viruses can also propagate through IRC protocols.

On Microsoft computers, turning on your script checking virus protection is essential. However,
keep in mind that there may be an associated performance hit for some applications. Many
applications on Windows are written in Visual Basic, and real-time script virus checking can double
the time it takes for their usual functions to run. If you find that ordinary functions take an
inordinate length of time to complete, you can try temporarily turning this feature off in your anti-
virus checker -- but don't forget to turn it back on afterwards!

Active threats. The following types of script viruses are currently the most active and dangerous,
on the Windows platform:

        Visual Basic is a flexible and powerful programming environment for Microsoft Windows,
        Office, and Internetapplications. Script viruses written in Visual Basic can run throughout
        the Microsoft architecture, giving them considerable reach and power, and making them
        the primary virus threat today.

        The first widespread Visual Basic script virus was Melissa, which brought down several of
        the large international corporations for several days in March 1999. Melissa traveled in a
        Microsoft Word document and ran when the document was opened, then opened the
        associated Microsoft Outlook email program, read the user's email address book, and then
        sent email copies of itself to the first fifty names it found. It spread very quickly.

        The Melissa virus architecture was quickly followed by many similar variants programmed
        by hackers around the world, including the ground breaking KAK, the first Visual Basic
        script virus that triggered as soon as an email was opened. KAK was then followed
        by BubbleBoy, which triggered if an email was even viewed in the preview pane. A steady
        stream of Visual Basic script viruses continue to circulate to this day. There are even
        automated, point and click programs like VBS Love Generator to help hackers produce
        additional variants. Script viruses which use email to send themselves to others are also a
        form of worm.

        The term "macro virus" is used less often, and generally refers to a virus in an office
automation application macro, most commonly a Visual Basic macro in a Microsoft Word or
        Excel document. Macro viruses can cross system boundaries from Windows to Macintosh
        computers with MS Office documents. Current versions of Microsoft Office contain strong
        anti-macro protections to guard against known attacks.

        ActiveX is one of Microsoft's distributed application technologies that enable web pages to
        download programs on the fly with the full power of any executable running on your
        machine. This makes ActiveX modules especially efficient and powerful, but also a security
        risk since they can create, change, and delete files, add system programming code, or
        take any other action your user account is allowed on your computer.

        To help mitigate the risk, Microsoft provides a network architecture of encrypted security
        certificates for ActiveX modules. This network gives you the option of refusing the
        download of unsigned ActiveX modules from unknown authors, and at least disclosing the
        signed identity of those modules that you do accept in case they later cause problems.
        However, this approach is not universally accepted by the general user and professional
        security communities, and is sometimes called "trust me now, try to catch me later". Users
        running Internet Explorer on Windows machines should make sure that their browser
        security settings are set to "disable" for unsigned ActiveX applets, and to "prompt" for
        signed applets.

Hypothetical threats. The following script viruses are largely theoretical, but illustrate that they
can turn up wherever there is scripting code:

        Java is a standard cross platform development environment, and is often used to download
        scripts to add functionality like a clock or chat room interface to a web page. Java was
        written with a strong security model which protects your computer's data and resources,
        and it has so far proved remarkably resistant to script virus infection. You can turn Java off
        in your browser if you want to be extra careful, but it will disable some useful functionality
        on some web pages.

        JavaScript is the standard web programming language. JavaScript also has a well-defined
        security model that protects data and resources, and the few JavaScript viruses that have
        been discovered have been mainly theoretical in nature. You can turn JavaScript off in
        your browser settings if you want to be extra careful, but it will disable functionality on
        many web pages.

        MIME. The first script virus that triggered as soon as an email was opened was a MIME
        virus that applied to older versions of Netscape Mail, Microsoft Outlook, and Eudora Mail.
        In a variation on an old hacker technique, the attached MIME file was given a very long
        name that triggered a bug which allowed the end of the name to be run as a series of
        instructions, which could then be written to run the virus. However, a fix for the bug was
        quickly developed for each vulnerable email program, and MIME viruses have so far
        remained hypothetical.

        Others. Several other scripting environments have also had viruses, including Corel Draw,
        Hypertext Preprocessor, Windows Help, Windows installation files, and Windows registry
        files. Anywhere there is a script interpreter there is an opportunity for a script virus to run.

Resources. The following sites provide more information on script and macro viruses:

        Disabling Windows Scripting Host

        Microsoft Macro Viruses

        Yahoo -- Macro Viruses.
Computer Virus Symptoms and Solutions



If your computer is infected with a malicious computer virus, it may begin to show a series of Computer
Virus symptoms that indicate that a virus is present. Computer viruses can be very harmful and damaging to
your computer system, root files, and various program files. A computer virus can also increase the risk of
hacker threats and attacks, and open the door to even more unauthorized downloads and software
installations. Once you diagnose the computer virus symptoms, then computer viruses can be counterattacked
with the appropriate antivirus software and suite packages, but this needs to be installed well before the virus
has infected the system.


Many computer viruses are designed to self-replicate and self-install over a very short period of time. They
come encoded with specific instructions to destroy and advance through its host computer, and can affect a
multitude of programs and applications very quickly. Recognizing the symptoms of a computer virus can help
to successfully remove it from the infected computer as quickly as possible; the sooner this is completed, the
easier it will be to recover any documents or programs that may be damaged, and prevent the virus from
further spreading.


Backing up computer files on a regular basis is just one preventative measure in protecting the data on your
computer. Installing a powerful antivirus program is the next step, as this can indicate the presence of a
malicious computer virus before it has a chance to spread. Still, recognizing the symptoms of a virus is fairly
simple when you know what to look for.


A computer virus may have installed itself on your computer through a Trojan, a security breach, unauthorized
access on your computer, or an e-mail attachment that also included malicious code. After a virus begins to
spread, many program files can become unstable and display warnings. The operating system may not launch
properly, and the computer user may need to reboot and restart the computer frequently to ensure all
programs are starting and working fine. Critical files may get deleted automatically, and this can happen
periodically or all at once. Error messages will become prevalent; it may become difficult to save documents,
and the computer may be running slower than usual. If a system or network is infected severely, it may even
black out or not even launch the startup process.


Some other symptoms of a computer virus involve the computer hardware itself. CD-ROM drive trays may
open and close by themselves, without the user directing the function. Programs may launch at their own, and
unusual sounds may play randomly. Some e-mail messages may not be sent or received properly, and e-mail
attachments may disappear. If the computer is freezing consistently, or files and folders seem to disappear or
will not open, these are clear signs that an area of the hard drive is “malfunctioning” (actually is not, but is
affected by a virus). The computer may also display a series of pop-up ads and strange messages upon
startup; this is a clear indicator that adware programs have been installed, and these are very difficult to
remove manually.


In addition, disk space can become overloaded and cause frequent computer crashes. Viruses can duplicate
large-sized programs to the point that the computer cannot handle the files. This will reduce the chances of
even installing an antivirus program successfully, so early detection is key to detecting and removing the
dangerous virus.


Lately, computer viruses have been created so they can change some of the core system files (Microsoft
Windows) so that web sites of most of antivirus software companies become inaccessible. Your Internet
browser will either switch to some other web site or simply show “not found”. What is happening is that you
are being prevented from finding a way of getting antivirus software cleaning your system.


Finally, the best way of recognizing computer virus symptoms and preventing computer viruses and other
Internet based threats to invade your computer is to have the latest, up to date computer security software,
which can be a basic version of antivirus program or some of the all-in-one software suites.




What is a computer virus?
Computer viruses are small software programs that are designed to spread from one computer to another and to
interfere with computer operation.

What do computer viruses do?
Through the course of using the Internet and your computer, you may have come in to contact with computer
viruses. Many computer viruses are stopped before they can start, but there is still an ever growing concern as to
what do computer viruses do and the list of common computer virus symptoms. A computer virus might corrupt
or delete data on your computer, use your email program to spread itself to other computers, or even erase
everything on your hard disk.

Computer viruses are often spread by attachments in email messages or instant messaging messages. That is why
it is essential that you never open email attachments unless you know who it's from and you are expecting it.

Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.

Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other
files or programs you might download.

To help avoid computer viruses, it's essential that you keep your computer current with the latest
updates and antivirus tools, stay informed about recent threats, run your computer as a standard user (not as
administrator), and that you follow a few basic ruleswhen you surf the Internet, download files, and open
attachments.

Once a virus is on your computer, its type or the method it used to get there is not as important as removing it
and preventing further infection.



Definition: "antivirus" is protective software designed to defend your computer against malicious
software. Malicious software, or "malware" includes: viruses, Trojans, keyloggers, hijackers,
dialers, and other code that vandalizes or steals your computer contents. In order to be an
effective defense, your antivirus software needs to run in the background at all times, and should
be kept updated so it recognizes new versions of malicious software.


                                     Types Of Antivirus
A computer virus is a computer program that can copy itself and infect a computer without the
knowledge or permission of the owner. A virus can only be spread from one computer to another
through some form of executable codes. Viruses can be sent over a network, the Internet, floppy
disk, CD, or USB drive. Viruses can increase changes of spreading to other computers by infecting
files on a network system that is accessed by other computers.




The term computer virus is used to include all types or malware such as computer viruses, trojan
horses, most rootkits, spyware, dshonest adware, crimeware, and other malicious unwanted
software. Since most computers are now connected to the Internet and local networks it is increasing
the chance for spreading malicious virus codes. Since February 2009 there are over 287,524 and
growing computer viruses.

Symptoms

Computer viruses are among the most known problem that is affecting online users. The dangers of
viruses have gotten a lot of attention over the year, and without simple attention they will continue to
spread. Computer viruses cause a number of symptoms such as:




                                                Computer programs taking longer to load than normal.

        The computer is slower than normal.
        Computer stops responding or freezes frequently.
        Computer crashes and restarts every few minutes.
        The computer does not run as usual.
        Applications on the computer do not work correctly.
        Disks or disk drives are inaccessible.
        Printing items is difficult.
        Error messages appear rapidly.
        Distorted menus and dialog boxes.
        Double extensions on attachments that you have already opened (jpg,vbs,gif, exe, and etc).
        Antivirus programs get disabled for no reason, and cannot be restarted.
        Antivirus programs will not start, and new programs cannot be installed.
        Strange sounds plays from the speakers unexpectedly.
        Programs disappear from the computer.
These symptoms are common signs of computer virus infection, and they are also warning signs that
you may be getting a computer virus. When you suspect that you are getting a computer virus there
are many ways to take care of it. Before you can get a virus it is best to prevent them from getting into
your computer by having a anti virus software.

AntiVirus Software
Antivirus software is used to prevent, detect, and remove malware and other computer viruses. Anti
virus software systems detections involve searching for known malicious patterns in executable code.
it is possible for a user to be infected with new viruses that have no sign or symptoms or existence.
To counter this problem of zero day threats, anti virus systems can be used to detect these viruses
when you don't even know that they are there.




There are many different types of anti virus software that have been developed over the years.
Original products were just scanners that would search through the hard disk looking for viruses. As
viruses have become more common and difficult, the more anti virus software is being made to keep
up with current virus issues. There are many different types of general virus scanners that are used
on PCs today:

Conventional Disk Scanner

This is the stand virus check program. It can be ran upon the users request, and it scans the contents
of the disks, directories or files that the users wants, for any boot sectors or files that contain viruses
that it recognizes. These are usually ran manually by the user as a preventive maintenance activity or
when they thing a virus is suspected. The user can schedule automatic scanning through the use of a
program scheduler.

Memory Resident Scanners

An anti virus software that now come with a special program that sits in the background while your
using your computer and it automatically scans for viruses based on different triggers. These
programs can automatically scan as they run or scan floppy disks when you command a shutdown of
your system. This scanner offers increased protection and more chances of catching a virus before it
does damage to your computer.

Behavior Based Detection

Some products offer an option where they will sit in memory and look for virus like behavior and
suspicious activity. Behavior based detection is looking for the types of actions taken on files or boot
sectors that might be performed by viruses trying to spread. This type of antivirus software will look for
a trap, and will generically catch viruses red handed.

Start up Scanners
This type of antivirus scanner is designed to be run every time the PC is booted up. It preforms a
quick scan of the disks boot sectors and critical system files. the idea is to catch these viruses before
the PC boots up reducing the chance of it to spread.

Inoculation

Instead of scanning for viruses this type of antivirus software looks for changes that the viruses make
to files and boot sectors. With a clean system the software will get a snap shot of information in each
boot sector about its content and size. Periodically it will re examine these files to see if anything has
changed.




Top Anti Virus Software

        The Shield Deluxe 2009 Antivirus & Antispyware
        Webroot Antivirus with Antispyware 6.0
        BitDefender Antivirus 2009
        CA Anti-Virus Plus 2009
        McAfee VirusScan Plus 2009
        Norton Antivirus 2009
        ESET NOD 32 3.0

More Related Content

What's hot

Assignment of virus
Assignment of virusAssignment of virus
Assignment of virusHuma Tariq
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..Sid1256
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & MalwareT.J. Schiel
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from virusesar-rifke.com
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 

What's hot (20)

Virus
Virus  Virus
Virus
 
Assignment of virus
Assignment of virusAssignment of virus
Assignment of virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Virus
VirusVirus
Virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
Computer virus Computer virus
Computer virus
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Iloveyou virus
Iloveyou virusIloveyou virus
Iloveyou virus
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 

Viewers also liked

Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirusVishwarajYadav
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime'sMar Soriano
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaChinnu Shimna
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 

Viewers also liked (20)

Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Malware
MalwareMalware
Malware
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Crime and punishment
Crime and punishmentCrime and punishment
Crime and punishment
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Security threats
Security threatsSecurity threats
Security threats
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 

Similar to Types of viruses (20)

Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Virus
VirusVirus
Virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
As computer virus
As computer virusAs computer virus
As computer virus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 

Recently uploaded

5* Hotel Call Girls In Goa 7028418221 Call Girls In North Goa Escort Services
5* Hotel Call Girls In Goa 7028418221 Call Girls In North Goa Escort Services5* Hotel Call Girls In Goa 7028418221 Call Girls In North Goa Escort Services
5* Hotel Call Girls In Goa 7028418221 Call Girls In North Goa Escort ServicesApsara Of India
 
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一lvtagr7
 
Kolkata Call Girls Service +918240919228 - Kolkatanightgirls.com
Kolkata Call Girls Service +918240919228 - Kolkatanightgirls.comKolkata Call Girls Service +918240919228 - Kolkatanightgirls.com
Kolkata Call Girls Service +918240919228 - Kolkatanightgirls.comKolkata Call Girls
 
LE IMPOSSIBRU QUIZ (Based on Splapp-me-do)
LE IMPOSSIBRU QUIZ (Based on Splapp-me-do)LE IMPOSSIBRU QUIZ (Based on Splapp-me-do)
LE IMPOSSIBRU QUIZ (Based on Splapp-me-do)bertfelixtorre
 
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts Service
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts ServiceVIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts Service
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts ServiceApsara Of India
 
8377087607 Full Enjoy @24/7 Call Girls in Patel Nagar Delhi NCR
8377087607 Full Enjoy @24/7 Call Girls in Patel Nagar Delhi NCR8377087607 Full Enjoy @24/7 Call Girls in Patel Nagar Delhi NCR
8377087607 Full Enjoy @24/7 Call Girls in Patel Nagar Delhi NCRdollysharma2066
 
Taken Pilot Episode Story pitch Document
Taken Pilot Episode Story pitch DocumentTaken Pilot Episode Story pitch Document
Taken Pilot Episode Story pitch Documentf4ssvxpz62
 
Call Girls Near The Corus Hotel New Delhi 9873777170
Call Girls Near The Corus Hotel New Delhi 9873777170Call Girls Near The Corus Hotel New Delhi 9873777170
Call Girls Near The Corus Hotel New Delhi 9873777170Sonam Pathan
 
Call Girls CG Road 7397865700 Independent Call Girls
Call Girls CG Road 7397865700  Independent Call GirlsCall Girls CG Road 7397865700  Independent Call Girls
Call Girls CG Road 7397865700 Independent Call Girlsssuser7cb4ff
 
Fun Call Girls In Goa 7028418221 Call Girl Service In Panaji Escorts
Fun Call Girls In Goa 7028418221 Call Girl Service In Panaji EscortsFun Call Girls In Goa 7028418221 Call Girl Service In Panaji Escorts
Fun Call Girls In Goa 7028418221 Call Girl Service In Panaji EscortsApsara Of India
 
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...Amil baba
 
Russian Call Girls juhu MUMBAI 7397865700
Russian Call Girls juhu MUMBAI 7397865700Russian Call Girls juhu MUMBAI 7397865700
Russian Call Girls juhu MUMBAI 7397865700Call Girls Mumbai
 
Call Girls Ellis Bridge 7397865700 Independent Call Girls
Call Girls Ellis Bridge 7397865700 Independent Call GirlsCall Girls Ellis Bridge 7397865700 Independent Call Girls
Call Girls Ellis Bridge 7397865700 Independent Call Girlsssuser7cb4ff
 
Call Girls Prahlad Nagar 9920738301 Ridhima Hire Me Full Night
Call Girls Prahlad Nagar 9920738301 Ridhima Hire Me Full NightCall Girls Prahlad Nagar 9920738301 Ridhima Hire Me Full Night
Call Girls Prahlad Nagar 9920738301 Ridhima Hire Me Full Nightssuser7cb4ff
 
Call Girls Sanand 7397865700 Ridhima Hire Me Full Night
Call Girls Sanand 7397865700 Ridhima Hire Me Full NightCall Girls Sanand 7397865700 Ridhima Hire Me Full Night
Call Girls Sanand 7397865700 Ridhima Hire Me Full Nightssuser7cb4ff
 
North Avenue Call Girls Services, Hire Now for Full Fun
North Avenue Call Girls Services, Hire Now for Full FunNorth Avenue Call Girls Services, Hire Now for Full Fun
North Avenue Call Girls Services, Hire Now for Full FunKomal Khan
 
fmovies-Movies hold a special place in the hearts
fmovies-Movies hold a special place in the heartsfmovies-Movies hold a special place in the hearts
fmovies-Movies hold a special place in the heartsa18205752
 
1681275559_haunting-adeline and hunting.pdf
1681275559_haunting-adeline and hunting.pdf1681275559_haunting-adeline and hunting.pdf
1681275559_haunting-adeline and hunting.pdfTanjirokamado769606
 
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcE
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcEViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcE
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcEApsara Of India
 

Recently uploaded (20)

5* Hotel Call Girls In Goa 7028418221 Call Girls In North Goa Escort Services
5* Hotel Call Girls In Goa 7028418221 Call Girls In North Goa Escort Services5* Hotel Call Girls In Goa 7028418221 Call Girls In North Goa Escort Services
5* Hotel Call Girls In Goa 7028418221 Call Girls In North Goa Escort Services
 
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一
 
Kolkata Call Girls Service +918240919228 - Kolkatanightgirls.com
Kolkata Call Girls Service +918240919228 - Kolkatanightgirls.comKolkata Call Girls Service +918240919228 - Kolkatanightgirls.com
Kolkata Call Girls Service +918240919228 - Kolkatanightgirls.com
 
LE IMPOSSIBRU QUIZ (Based on Splapp-me-do)
LE IMPOSSIBRU QUIZ (Based on Splapp-me-do)LE IMPOSSIBRU QUIZ (Based on Splapp-me-do)
LE IMPOSSIBRU QUIZ (Based on Splapp-me-do)
 
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts Service
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts ServiceVIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts Service
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts Service
 
8377087607 Full Enjoy @24/7 Call Girls in Patel Nagar Delhi NCR
8377087607 Full Enjoy @24/7 Call Girls in Patel Nagar Delhi NCR8377087607 Full Enjoy @24/7 Call Girls in Patel Nagar Delhi NCR
8377087607 Full Enjoy @24/7 Call Girls in Patel Nagar Delhi NCR
 
Taken Pilot Episode Story pitch Document
Taken Pilot Episode Story pitch DocumentTaken Pilot Episode Story pitch Document
Taken Pilot Episode Story pitch Document
 
Call Girls Near The Corus Hotel New Delhi 9873777170
Call Girls Near The Corus Hotel New Delhi 9873777170Call Girls Near The Corus Hotel New Delhi 9873777170
Call Girls Near The Corus Hotel New Delhi 9873777170
 
Call Girls Koti 7001305949 all area service COD available Any Time
Call Girls Koti 7001305949 all area service COD available Any TimeCall Girls Koti 7001305949 all area service COD available Any Time
Call Girls Koti 7001305949 all area service COD available Any Time
 
Call Girls CG Road 7397865700 Independent Call Girls
Call Girls CG Road 7397865700  Independent Call GirlsCall Girls CG Road 7397865700  Independent Call Girls
Call Girls CG Road 7397865700 Independent Call Girls
 
Fun Call Girls In Goa 7028418221 Call Girl Service In Panaji Escorts
Fun Call Girls In Goa 7028418221 Call Girl Service In Panaji EscortsFun Call Girls In Goa 7028418221 Call Girl Service In Panaji Escorts
Fun Call Girls In Goa 7028418221 Call Girl Service In Panaji Escorts
 
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
 
Russian Call Girls juhu MUMBAI 7397865700
Russian Call Girls juhu MUMBAI 7397865700Russian Call Girls juhu MUMBAI 7397865700
Russian Call Girls juhu MUMBAI 7397865700
 
Call Girls Ellis Bridge 7397865700 Independent Call Girls
Call Girls Ellis Bridge 7397865700 Independent Call GirlsCall Girls Ellis Bridge 7397865700 Independent Call Girls
Call Girls Ellis Bridge 7397865700 Independent Call Girls
 
Call Girls Prahlad Nagar 9920738301 Ridhima Hire Me Full Night
Call Girls Prahlad Nagar 9920738301 Ridhima Hire Me Full NightCall Girls Prahlad Nagar 9920738301 Ridhima Hire Me Full Night
Call Girls Prahlad Nagar 9920738301 Ridhima Hire Me Full Night
 
Call Girls Sanand 7397865700 Ridhima Hire Me Full Night
Call Girls Sanand 7397865700 Ridhima Hire Me Full NightCall Girls Sanand 7397865700 Ridhima Hire Me Full Night
Call Girls Sanand 7397865700 Ridhima Hire Me Full Night
 
North Avenue Call Girls Services, Hire Now for Full Fun
North Avenue Call Girls Services, Hire Now for Full FunNorth Avenue Call Girls Services, Hire Now for Full Fun
North Avenue Call Girls Services, Hire Now for Full Fun
 
fmovies-Movies hold a special place in the hearts
fmovies-Movies hold a special place in the heartsfmovies-Movies hold a special place in the hearts
fmovies-Movies hold a special place in the hearts
 
1681275559_haunting-adeline and hunting.pdf
1681275559_haunting-adeline and hunting.pdf1681275559_haunting-adeline and hunting.pdf
1681275559_haunting-adeline and hunting.pdf
 
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcE
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcEViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcE
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcE
 

Types of viruses

  • 1. Types Of Viruses Not all computer viruses behave, replicate, or infect the same way. There are several different categories of viruses and malware. Below I list and discuss some of the most common types of computer viruses. Trojan Horse: A trojan horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls. Worms: A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail. Bootsector Virus: A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup. These are normally spread by floppy disks. Macro Virus: Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents. Memory Resident Viruses: Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes. ppppppppppp Rootkit Virus: A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term rootkit comes from the linux administrator root user. These viruses are usually installed by trojans and are normally disguised as operating system files. Polymorphic Viruses: A polymorphic virus not only replicates itself by creating multiple files of itself, but it also changes it's digital signature every time it replicates. This makes it difficult for less sophisticated antivirus software to detect. Logic Bombs/Time Bombs: These are viruses which are programmed to initiate at a specific date or when a specific event occurs. Some examples are a virus which deletes your photos on Halloween, or a virus which deletes a database table if a certain employee gets fired.
  • 2. Computer virus From Wikipedia, the free encyclopedia See also: Malware A computer virus is a computer program that can replicate itself[1] and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types ofmalware, including but not limited to adware and spyware programs that do not have a reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.
  • 3. Script Viruses - Types and Habitats Script viruses (sometimes called macro viruses) generally travel embedded in email and office automation documents, although they can be found in web pages as well. Old fashioned program viruses are usually implemented in executable system code, whereas script viruses are usually written in a powerful high-level language that is compiled and run on the fly. They often have sophisticated functionality and direct interfaces to high level applications such as word processing, spreadsheet, email, and web programs, and can wreak considerable havoc. Since they first surfaced in office automation programs, they are sometimes also called "macro" viruses. Script viruses can also propagate through IRC protocols. On Microsoft computers, turning on your script checking virus protection is essential. However, keep in mind that there may be an associated performance hit for some applications. Many applications on Windows are written in Visual Basic, and real-time script virus checking can double the time it takes for their usual functions to run. If you find that ordinary functions take an inordinate length of time to complete, you can try temporarily turning this feature off in your anti- virus checker -- but don't forget to turn it back on afterwards! Active threats. The following types of script viruses are currently the most active and dangerous, on the Windows platform: Visual Basic is a flexible and powerful programming environment for Microsoft Windows, Office, and Internetapplications. Script viruses written in Visual Basic can run throughout the Microsoft architecture, giving them considerable reach and power, and making them the primary virus threat today. The first widespread Visual Basic script virus was Melissa, which brought down several of the large international corporations for several days in March 1999. Melissa traveled in a Microsoft Word document and ran when the document was opened, then opened the associated Microsoft Outlook email program, read the user's email address book, and then sent email copies of itself to the first fifty names it found. It spread very quickly. The Melissa virus architecture was quickly followed by many similar variants programmed by hackers around the world, including the ground breaking KAK, the first Visual Basic script virus that triggered as soon as an email was opened. KAK was then followed by BubbleBoy, which triggered if an email was even viewed in the preview pane. A steady stream of Visual Basic script viruses continue to circulate to this day. There are even automated, point and click programs like VBS Love Generator to help hackers produce additional variants. Script viruses which use email to send themselves to others are also a form of worm. The term "macro virus" is used less often, and generally refers to a virus in an office
  • 4. automation application macro, most commonly a Visual Basic macro in a Microsoft Word or Excel document. Macro viruses can cross system boundaries from Windows to Macintosh computers with MS Office documents. Current versions of Microsoft Office contain strong anti-macro protections to guard against known attacks. ActiveX is one of Microsoft's distributed application technologies that enable web pages to download programs on the fly with the full power of any executable running on your machine. This makes ActiveX modules especially efficient and powerful, but also a security risk since they can create, change, and delete files, add system programming code, or take any other action your user account is allowed on your computer. To help mitigate the risk, Microsoft provides a network architecture of encrypted security certificates for ActiveX modules. This network gives you the option of refusing the download of unsigned ActiveX modules from unknown authors, and at least disclosing the signed identity of those modules that you do accept in case they later cause problems. However, this approach is not universally accepted by the general user and professional security communities, and is sometimes called "trust me now, try to catch me later". Users running Internet Explorer on Windows machines should make sure that their browser security settings are set to "disable" for unsigned ActiveX applets, and to "prompt" for signed applets. Hypothetical threats. The following script viruses are largely theoretical, but illustrate that they can turn up wherever there is scripting code: Java is a standard cross platform development environment, and is often used to download scripts to add functionality like a clock or chat room interface to a web page. Java was written with a strong security model which protects your computer's data and resources, and it has so far proved remarkably resistant to script virus infection. You can turn Java off in your browser if you want to be extra careful, but it will disable some useful functionality on some web pages. JavaScript is the standard web programming language. JavaScript also has a well-defined security model that protects data and resources, and the few JavaScript viruses that have been discovered have been mainly theoretical in nature. You can turn JavaScript off in your browser settings if you want to be extra careful, but it will disable functionality on many web pages. MIME. The first script virus that triggered as soon as an email was opened was a MIME virus that applied to older versions of Netscape Mail, Microsoft Outlook, and Eudora Mail. In a variation on an old hacker technique, the attached MIME file was given a very long name that triggered a bug which allowed the end of the name to be run as a series of instructions, which could then be written to run the virus. However, a fix for the bug was quickly developed for each vulnerable email program, and MIME viruses have so far remained hypothetical. Others. Several other scripting environments have also had viruses, including Corel Draw, Hypertext Preprocessor, Windows Help, Windows installation files, and Windows registry files. Anywhere there is a script interpreter there is an opportunity for a script virus to run. Resources. The following sites provide more information on script and macro viruses: Disabling Windows Scripting Host Microsoft Macro Viruses Yahoo -- Macro Viruses.
  • 5. Computer Virus Symptoms and Solutions If your computer is infected with a malicious computer virus, it may begin to show a series of Computer Virus symptoms that indicate that a virus is present. Computer viruses can be very harmful and damaging to your computer system, root files, and various program files. A computer virus can also increase the risk of hacker threats and attacks, and open the door to even more unauthorized downloads and software installations. Once you diagnose the computer virus symptoms, then computer viruses can be counterattacked with the appropriate antivirus software and suite packages, but this needs to be installed well before the virus has infected the system. Many computer viruses are designed to self-replicate and self-install over a very short period of time. They come encoded with specific instructions to destroy and advance through its host computer, and can affect a multitude of programs and applications very quickly. Recognizing the symptoms of a computer virus can help to successfully remove it from the infected computer as quickly as possible; the sooner this is completed, the easier it will be to recover any documents or programs that may be damaged, and prevent the virus from further spreading. Backing up computer files on a regular basis is just one preventative measure in protecting the data on your computer. Installing a powerful antivirus program is the next step, as this can indicate the presence of a malicious computer virus before it has a chance to spread. Still, recognizing the symptoms of a virus is fairly simple when you know what to look for. A computer virus may have installed itself on your computer through a Trojan, a security breach, unauthorized access on your computer, or an e-mail attachment that also included malicious code. After a virus begins to spread, many program files can become unstable and display warnings. The operating system may not launch properly, and the computer user may need to reboot and restart the computer frequently to ensure all programs are starting and working fine. Critical files may get deleted automatically, and this can happen periodically or all at once. Error messages will become prevalent; it may become difficult to save documents, and the computer may be running slower than usual. If a system or network is infected severely, it may even black out or not even launch the startup process. Some other symptoms of a computer virus involve the computer hardware itself. CD-ROM drive trays may open and close by themselves, without the user directing the function. Programs may launch at their own, and unusual sounds may play randomly. Some e-mail messages may not be sent or received properly, and e-mail attachments may disappear. If the computer is freezing consistently, or files and folders seem to disappear or will not open, these are clear signs that an area of the hard drive is “malfunctioning” (actually is not, but is affected by a virus). The computer may also display a series of pop-up ads and strange messages upon startup; this is a clear indicator that adware programs have been installed, and these are very difficult to remove manually. In addition, disk space can become overloaded and cause frequent computer crashes. Viruses can duplicate large-sized programs to the point that the computer cannot handle the files. This will reduce the chances of even installing an antivirus program successfully, so early detection is key to detecting and removing the dangerous virus. Lately, computer viruses have been created so they can change some of the core system files (Microsoft Windows) so that web sites of most of antivirus software companies become inaccessible. Your Internet
  • 6. browser will either switch to some other web site or simply show “not found”. What is happening is that you are being prevented from finding a way of getting antivirus software cleaning your system. Finally, the best way of recognizing computer virus symptoms and preventing computer viruses and other Internet based threats to invade your computer is to have the latest, up to date computer security software, which can be a basic version of antivirus program or some of the all-in-one software suites. What is a computer virus? Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. What do computer viruses do? Through the course of using the Internet and your computer, you may have come in to contact with computer viruses. Many computer viruses are stopped before they can start, but there is still an ever growing concern as to what do computer viruses do and the list of common computer virus symptoms. A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk. Computer viruses are often spread by attachments in email messages or instant messaging messages. That is why it is essential that you never open email attachments unless you know who it's from and you are expecting it. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. To help avoid computer viruses, it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, run your computer as a standard user (not as administrator), and that you follow a few basic ruleswhen you surf the Internet, download files, and open attachments. Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious software, or "malware" includes: viruses, Trojans, keyloggers, hijackers, dialers, and other code that vandalizes or steals your computer contents. In order to be an effective defense, your antivirus software needs to run in the background at all times, and should be kept updated so it recognizes new versions of malicious software. Types Of Antivirus
  • 7. A computer virus is a computer program that can copy itself and infect a computer without the knowledge or permission of the owner. A virus can only be spread from one computer to another through some form of executable codes. Viruses can be sent over a network, the Internet, floppy disk, CD, or USB drive. Viruses can increase changes of spreading to other computers by infecting files on a network system that is accessed by other computers. The term computer virus is used to include all types or malware such as computer viruses, trojan horses, most rootkits, spyware, dshonest adware, crimeware, and other malicious unwanted software. Since most computers are now connected to the Internet and local networks it is increasing the chance for spreading malicious virus codes. Since February 2009 there are over 287,524 and growing computer viruses. Symptoms Computer viruses are among the most known problem that is affecting online users. The dangers of viruses have gotten a lot of attention over the year, and without simple attention they will continue to spread. Computer viruses cause a number of symptoms such as: Computer programs taking longer to load than normal. The computer is slower than normal. Computer stops responding or freezes frequently. Computer crashes and restarts every few minutes. The computer does not run as usual. Applications on the computer do not work correctly. Disks or disk drives are inaccessible. Printing items is difficult. Error messages appear rapidly. Distorted menus and dialog boxes. Double extensions on attachments that you have already opened (jpg,vbs,gif, exe, and etc). Antivirus programs get disabled for no reason, and cannot be restarted. Antivirus programs will not start, and new programs cannot be installed. Strange sounds plays from the speakers unexpectedly. Programs disappear from the computer.
  • 8. These symptoms are common signs of computer virus infection, and they are also warning signs that you may be getting a computer virus. When you suspect that you are getting a computer virus there are many ways to take care of it. Before you can get a virus it is best to prevent them from getting into your computer by having a anti virus software. AntiVirus Software Antivirus software is used to prevent, detect, and remove malware and other computer viruses. Anti virus software systems detections involve searching for known malicious patterns in executable code. it is possible for a user to be infected with new viruses that have no sign or symptoms or existence. To counter this problem of zero day threats, anti virus systems can be used to detect these viruses when you don't even know that they are there. There are many different types of anti virus software that have been developed over the years. Original products were just scanners that would search through the hard disk looking for viruses. As viruses have become more common and difficult, the more anti virus software is being made to keep up with current virus issues. There are many different types of general virus scanners that are used on PCs today: Conventional Disk Scanner This is the stand virus check program. It can be ran upon the users request, and it scans the contents of the disks, directories or files that the users wants, for any boot sectors or files that contain viruses that it recognizes. These are usually ran manually by the user as a preventive maintenance activity or when they thing a virus is suspected. The user can schedule automatic scanning through the use of a program scheduler. Memory Resident Scanners An anti virus software that now come with a special program that sits in the background while your using your computer and it automatically scans for viruses based on different triggers. These programs can automatically scan as they run or scan floppy disks when you command a shutdown of your system. This scanner offers increased protection and more chances of catching a virus before it does damage to your computer. Behavior Based Detection Some products offer an option where they will sit in memory and look for virus like behavior and suspicious activity. Behavior based detection is looking for the types of actions taken on files or boot sectors that might be performed by viruses trying to spread. This type of antivirus software will look for a trap, and will generically catch viruses red handed. Start up Scanners
  • 9. This type of antivirus scanner is designed to be run every time the PC is booted up. It preforms a quick scan of the disks boot sectors and critical system files. the idea is to catch these viruses before the PC boots up reducing the chance of it to spread. Inoculation Instead of scanning for viruses this type of antivirus software looks for changes that the viruses make to files and boot sectors. With a clean system the software will get a snap shot of information in each boot sector about its content and size. Periodically it will re examine these files to see if anything has changed. Top Anti Virus Software The Shield Deluxe 2009 Antivirus & Antispyware Webroot Antivirus with Antispyware 6.0 BitDefender Antivirus 2009 CA Anti-Virus Plus 2009 McAfee VirusScan Plus 2009 Norton Antivirus 2009 ESET NOD 32 3.0