SlideShare a Scribd company logo
10 types of virus
There are manytypesof viruses,some cause harmlessbutsome cause devastating.Theyare classified
intodifferencecategoriesincludingBootSectorViruses,CompanionViruses,EncryptedViruses,Logic
BombViruses,Macro Viruses, Multipartite Viruses,NonresidentViruses,PolymorphicViruses,Resident
VirusesandStealthViruses.Youcansee the explanationof eachtype of virusesinfollowing:
1. Boot SectorViruses
Thistype of viruseshasabilitytohide inbootsector.The viruseswill loadintomemorywhenthere is
bootingsystem andtryingtoread fromhard disk.Bootsector virusesare more spreadsince oldtime
whenfloppydiskwaspopular.Butnowwe hardlyseenthemsince manyof themonlycanspread
throughfloppydisk.
2. CompanionViruses
CompanionVirusesisanotherkindof viruses.Whenusercomputerinfectbythissortof viruses,itwill
create anothertype file fromanexistingfile insame directory(suchas creatingfile.comfromfile.exe in
the same folder),some companionvirusescreate file.exefromanyfolder.
3. EncryptedViruses
Thistype of virusesconsistsof encryptedmaliciouscode,decryptedmodule.The virusesuse encrypted
code technique whichmake antivirussoftwarehardlytodetectthem.The antivirusprogramusuallycan
detectthistype of viruseswhentheytryspreadbydecryptedthemselves.
4. Logic Bomb Viruses
Logic BombVirusesorsometime knowasTime Bombissmall piece of maliciouscode orprogramwhich
have abilitytoinsertitself tootherprogramsorsystemandperformspecific actionwhenthe conditions
are met(mostLogic Bombdevelopersuse date asconditions).The LogicBombdoesnothinguntil pre-
programmeddate isreached.LogicBomb can performanymaliciousthingsbasedonpre-programmed
withinitsuchas deletingfile ordisplayingunwantedmessage orlockprogramand so on.
5. Macro Viruses
WhentalkingaboutMacro Viruses,we refertoviruseswhichinfectmacroof otherapplicationssuchas
MicrosoftWord, MicrosoftExcel.The virusesare writteninamacro language and use itto distribute
themselves.Macroviruseswill runautomaticallywhenuseropendocument.Usuallythistype of virus
cause harmlesstoyour computer,butinsteadtheyare annoyingbyautomaticallyinsertingundesired
textsor symbols.
Example of Macro Virus:WM.Concept,itwas introducedin1995 the firstmacro virusthat spread
throughMicrosoftWord. Andanotherpopularone isMelissathatis firstfoundin1999, italsocan
spreadthrough MS Word,Excel and Outlook.
6. Multipartite Viruses
Multipartite Virusesistype of viruseswhichinfectusercomputeronbothpartboot sectorand
executable filesandprogramsat the same time,withthiscondition,the virusesspreadfasterthanboot
sectoror file infectoralone.
Example:Ghostball,the firstmultipartite virus.
7. NonresidentViruses
Thistype of virusesissimilartoResidentVirusesbyusingreplicationof module.Besidesthat,
NonresidentVirusesrole asfindermodule whichcaninfecttofiles whenitfoundone (itwill selectone
or more filestoinfecteachtime the module isexecuted).
8. PolymorphicViruses
PolymorphicVirusissimilartoencryptedviruses;itcaninfectfileswithanencryptedcopyof itself.The
virusesuse difference technique toreplicate themselves.Some polymorphicvirusesare hardlytodetect
by antivirussoftware usingvirussignaturebased,becauseitdonotremainany identical after
replication.
Example:Pseudonym,1260
9. ResidentViruses
ResidentVirusesorknownasMemoryResidentVirusesismaliciousmodule.The virusescanreplicate
module and installingmaliciouscode intocomputermemory(RAM).The virusesare commonlyclassified
intotwo maincategories:FastInfectorsandSlow Infectors.
10. StealthViruses
StealthVirusesissome sortof viruseswhichtrytotrick anti-virussoftwarebyinterceptingitsrequests
to the operatingsystem.Ithasabilitytohide itself fromsome antivirussoftware programs.Therefore,
some antivirusprogramcannotdetect them.
Please dontforgettoleave acomments..thanksandhave fun

More Related Content

Viewers also liked

Popular Computer Virus and Their Types
Popular Computer Virus and Their TypesPopular Computer Virus and Their Types
Popular Computer Virus and Their Types
Yippee Technology LLC
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of viruses
Ajay Sharma
 
Different types of attacks
Different types of attacksDifferent types of attacks
Different types of attacks
Rohan Bharadwaj
 
Computer virus
Computer virusComputer virus
Computer virus
Utchi
 
Virus slides
Virus slidesVirus slides
Virus slides
rahul kundu
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Er. Rahul Jain
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Eric Vanderburg
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
Hansa Nidushan
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
sumit dimri
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
srivijaymanickam
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
SecurityTube.Net
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
Network Security
Network SecurityNetwork Security
Network Security
Raymond Jose
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
babak danyal
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
wargames12
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 

Viewers also liked (20)

Popular Computer Virus and Their Types
Popular Computer Virus and Their TypesPopular Computer Virus and Their Types
Popular Computer Virus and Their Types
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of viruses
 
Different types of attacks
Different types of attacksDifferent types of attacks
Different types of attacks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus slides
Virus slidesVirus slides
Virus slides
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Network security
Network security Network security
Network security
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 

Similar to 10 types of virus

Virus
VirusVirus
Virus
Protik Roy
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
Prem Kumar Bonam
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
Sadaf Walliyani
 
Computer virus
Computer virusComputer virus
Computer virus
dineshrwt911
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
Md.Tanvir Ul Haque
 
Computer viruses
Computer virusesComputer viruses
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
Protik Roy
 
Virus
VirusVirus
Virus
dddaou
 
Virus
VirusVirus
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
Muhammad Ramzan
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
Dara Corporates
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
Tasif Tanzim
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
Xʎz ʞsɥ
 
Viruses notes
Viruses notesViruses notes
Viruses notes
Dara Corporates
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
Khaleel Assadi
 
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental HazardsComputer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
Selim Reza Bappy
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti viruses
Mohit Jaiswal
 
Virus
VirusVirus
Computer virus
Computer virusComputer virus
Computer virus
Muhammad Umar Farooq
 

Similar to 10 types of virus (20)

Virus
VirusVirus
Virus
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental HazardsComputer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti viruses
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

Recently uploaded

Netter's Atlas of Human Anatomy 7.ed.pdf
Netter's Atlas of Human Anatomy 7.ed.pdfNetter's Atlas of Human Anatomy 7.ed.pdf
Netter's Atlas of Human Anatomy 7.ed.pdf
BrissaOrtiz3
 
Complementary feeding in infant IAP PROTOCOLS
Complementary feeding in infant IAP PROTOCOLSComplementary feeding in infant IAP PROTOCOLS
Complementary feeding in infant IAP PROTOCOLS
chiranthgowda16
 
Abortion PG Seminar Power point presentation
Abortion PG Seminar Power point presentationAbortion PG Seminar Power point presentation
Abortion PG Seminar Power point presentation
AksshayaRajanbabu
 
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdfCHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
rishi2789
 
Adhd Medication Shortage Uk - trinexpharmacy.com
Adhd Medication Shortage Uk - trinexpharmacy.comAdhd Medication Shortage Uk - trinexpharmacy.com
Adhd Medication Shortage Uk - trinexpharmacy.com
reignlana06
 
CHEMOTHERAPY_RDP_CHAPTER 2 _LEPROSY.pdf1
CHEMOTHERAPY_RDP_CHAPTER 2 _LEPROSY.pdf1CHEMOTHERAPY_RDP_CHAPTER 2 _LEPROSY.pdf1
CHEMOTHERAPY_RDP_CHAPTER 2 _LEPROSY.pdf1
rishi2789
 
CBL Seminar 2024_Preliminary Program.pdf
CBL Seminar 2024_Preliminary Program.pdfCBL Seminar 2024_Preliminary Program.pdf
CBL Seminar 2024_Preliminary Program.pdf
suvadeepdas911
 
CHEMOTHERAPY_RDP_CHAPTER 1_ANTI TB DRUGS.pdf
CHEMOTHERAPY_RDP_CHAPTER 1_ANTI TB DRUGS.pdfCHEMOTHERAPY_RDP_CHAPTER 1_ANTI TB DRUGS.pdf
CHEMOTHERAPY_RDP_CHAPTER 1_ANTI TB DRUGS.pdf
rishi2789
 
Journal Article Review on Rasamanikya
Journal Article Review on RasamanikyaJournal Article Review on Rasamanikya
Journal Article Review on Rasamanikya
Dr. Jyothirmai Paindla
 
Ketone bodies and metabolism-biochemistry
Ketone bodies and metabolism-biochemistryKetone bodies and metabolism-biochemistry
Ketone bodies and metabolism-biochemistry
Dhayanithi C
 
Integrating Ayurveda into Parkinson’s Management: A Holistic Approach
Integrating Ayurveda into Parkinson’s Management: A Holistic ApproachIntegrating Ayurveda into Parkinson’s Management: A Holistic Approach
Integrating Ayurveda into Parkinson’s Management: A Holistic Approach
Ayurveda ForAll
 
Muscles of Mastication by Dr. Rabia Inam Gandapore.pptx
Muscles of Mastication by Dr. Rabia Inam Gandapore.pptxMuscles of Mastication by Dr. Rabia Inam Gandapore.pptx
Muscles of Mastication by Dr. Rabia Inam Gandapore.pptx
Dr. Rabia Inam Gandapore
 
Hemodialysis: Chapter 5, Dialyzers Overview - Dr.Gawad
Hemodialysis: Chapter 5, Dialyzers Overview - Dr.GawadHemodialysis: Chapter 5, Dialyzers Overview - Dr.Gawad
Hemodialysis: Chapter 5, Dialyzers Overview - Dr.Gawad
NephroTube - Dr.Gawad
 
Hemodialysis: Chapter 4, Dialysate Circuit - Dr.Gawad
Hemodialysis: Chapter 4, Dialysate Circuit - Dr.GawadHemodialysis: Chapter 4, Dialysate Circuit - Dr.Gawad
Hemodialysis: Chapter 4, Dialysate Circuit - Dr.Gawad
NephroTube - Dr.Gawad
 
Ear and its clinical correlations By Dr. Rabia Inam Gandapore.pptx
Ear and its clinical correlations By Dr. Rabia Inam Gandapore.pptxEar and its clinical correlations By Dr. Rabia Inam Gandapore.pptx
Ear and its clinical correlations By Dr. Rabia Inam Gandapore.pptx
Dr. Rabia Inam Gandapore
 
Chapter 11 Nutrition and Chronic Diseases.pptx
Chapter 11 Nutrition and Chronic Diseases.pptxChapter 11 Nutrition and Chronic Diseases.pptx
Chapter 11 Nutrition and Chronic Diseases.pptx
Earlene McNair
 
Outbreak management including quarantine, isolation, contact.pptx
Outbreak management including quarantine, isolation, contact.pptxOutbreak management including quarantine, isolation, contact.pptx
Outbreak management including quarantine, isolation, contact.pptx
Pratik328635
 
The Nervous and Chemical Regulation of Respiration
The Nervous and Chemical Regulation of RespirationThe Nervous and Chemical Regulation of Respiration
The Nervous and Chemical Regulation of Respiration
MedicoseAcademics
 
Physical demands in sports - WCSPT Oslo 2024
Physical demands in sports - WCSPT Oslo 2024Physical demands in sports - WCSPT Oslo 2024
Physical demands in sports - WCSPT Oslo 2024
Torstein Dalen-Lorentsen
 
Promoting Wellbeing - Applied Social Psychology - Psychology SuperNotes
Promoting Wellbeing - Applied Social Psychology - Psychology SuperNotesPromoting Wellbeing - Applied Social Psychology - Psychology SuperNotes
Promoting Wellbeing - Applied Social Psychology - Psychology SuperNotes
PsychoTech Services
 

Recently uploaded (20)

Netter's Atlas of Human Anatomy 7.ed.pdf
Netter's Atlas of Human Anatomy 7.ed.pdfNetter's Atlas of Human Anatomy 7.ed.pdf
Netter's Atlas of Human Anatomy 7.ed.pdf
 
Complementary feeding in infant IAP PROTOCOLS
Complementary feeding in infant IAP PROTOCOLSComplementary feeding in infant IAP PROTOCOLS
Complementary feeding in infant IAP PROTOCOLS
 
Abortion PG Seminar Power point presentation
Abortion PG Seminar Power point presentationAbortion PG Seminar Power point presentation
Abortion PG Seminar Power point presentation
 
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdfCHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
 
Adhd Medication Shortage Uk - trinexpharmacy.com
Adhd Medication Shortage Uk - trinexpharmacy.comAdhd Medication Shortage Uk - trinexpharmacy.com
Adhd Medication Shortage Uk - trinexpharmacy.com
 
CHEMOTHERAPY_RDP_CHAPTER 2 _LEPROSY.pdf1
CHEMOTHERAPY_RDP_CHAPTER 2 _LEPROSY.pdf1CHEMOTHERAPY_RDP_CHAPTER 2 _LEPROSY.pdf1
CHEMOTHERAPY_RDP_CHAPTER 2 _LEPROSY.pdf1
 
CBL Seminar 2024_Preliminary Program.pdf
CBL Seminar 2024_Preliminary Program.pdfCBL Seminar 2024_Preliminary Program.pdf
CBL Seminar 2024_Preliminary Program.pdf
 
CHEMOTHERAPY_RDP_CHAPTER 1_ANTI TB DRUGS.pdf
CHEMOTHERAPY_RDP_CHAPTER 1_ANTI TB DRUGS.pdfCHEMOTHERAPY_RDP_CHAPTER 1_ANTI TB DRUGS.pdf
CHEMOTHERAPY_RDP_CHAPTER 1_ANTI TB DRUGS.pdf
 
Journal Article Review on Rasamanikya
Journal Article Review on RasamanikyaJournal Article Review on Rasamanikya
Journal Article Review on Rasamanikya
 
Ketone bodies and metabolism-biochemistry
Ketone bodies and metabolism-biochemistryKetone bodies and metabolism-biochemistry
Ketone bodies and metabolism-biochemistry
 
Integrating Ayurveda into Parkinson’s Management: A Holistic Approach
Integrating Ayurveda into Parkinson’s Management: A Holistic ApproachIntegrating Ayurveda into Parkinson’s Management: A Holistic Approach
Integrating Ayurveda into Parkinson’s Management: A Holistic Approach
 
Muscles of Mastication by Dr. Rabia Inam Gandapore.pptx
Muscles of Mastication by Dr. Rabia Inam Gandapore.pptxMuscles of Mastication by Dr. Rabia Inam Gandapore.pptx
Muscles of Mastication by Dr. Rabia Inam Gandapore.pptx
 
Hemodialysis: Chapter 5, Dialyzers Overview - Dr.Gawad
Hemodialysis: Chapter 5, Dialyzers Overview - Dr.GawadHemodialysis: Chapter 5, Dialyzers Overview - Dr.Gawad
Hemodialysis: Chapter 5, Dialyzers Overview - Dr.Gawad
 
Hemodialysis: Chapter 4, Dialysate Circuit - Dr.Gawad
Hemodialysis: Chapter 4, Dialysate Circuit - Dr.GawadHemodialysis: Chapter 4, Dialysate Circuit - Dr.Gawad
Hemodialysis: Chapter 4, Dialysate Circuit - Dr.Gawad
 
Ear and its clinical correlations By Dr. Rabia Inam Gandapore.pptx
Ear and its clinical correlations By Dr. Rabia Inam Gandapore.pptxEar and its clinical correlations By Dr. Rabia Inam Gandapore.pptx
Ear and its clinical correlations By Dr. Rabia Inam Gandapore.pptx
 
Chapter 11 Nutrition and Chronic Diseases.pptx
Chapter 11 Nutrition and Chronic Diseases.pptxChapter 11 Nutrition and Chronic Diseases.pptx
Chapter 11 Nutrition and Chronic Diseases.pptx
 
Outbreak management including quarantine, isolation, contact.pptx
Outbreak management including quarantine, isolation, contact.pptxOutbreak management including quarantine, isolation, contact.pptx
Outbreak management including quarantine, isolation, contact.pptx
 
The Nervous and Chemical Regulation of Respiration
The Nervous and Chemical Regulation of RespirationThe Nervous and Chemical Regulation of Respiration
The Nervous and Chemical Regulation of Respiration
 
Physical demands in sports - WCSPT Oslo 2024
Physical demands in sports - WCSPT Oslo 2024Physical demands in sports - WCSPT Oslo 2024
Physical demands in sports - WCSPT Oslo 2024
 
Promoting Wellbeing - Applied Social Psychology - Psychology SuperNotes
Promoting Wellbeing - Applied Social Psychology - Psychology SuperNotesPromoting Wellbeing - Applied Social Psychology - Psychology SuperNotes
Promoting Wellbeing - Applied Social Psychology - Psychology SuperNotes
 

10 types of virus

  • 1. 10 types of virus There are manytypesof viruses,some cause harmlessbutsome cause devastating.Theyare classified intodifferencecategoriesincludingBootSectorViruses,CompanionViruses,EncryptedViruses,Logic BombViruses,Macro Viruses, Multipartite Viruses,NonresidentViruses,PolymorphicViruses,Resident VirusesandStealthViruses.Youcansee the explanationof eachtype of virusesinfollowing: 1. Boot SectorViruses Thistype of viruseshasabilitytohide inbootsector.The viruseswill loadintomemorywhenthere is bootingsystem andtryingtoread fromhard disk.Bootsector virusesare more spreadsince oldtime whenfloppydiskwaspopular.Butnowwe hardlyseenthemsince manyof themonlycanspread throughfloppydisk. 2. CompanionViruses CompanionVirusesisanotherkindof viruses.Whenusercomputerinfectbythissortof viruses,itwill create anothertype file fromanexistingfile insame directory(suchas creatingfile.comfromfile.exe in the same folder),some companionvirusescreate file.exefromanyfolder. 3. EncryptedViruses Thistype of virusesconsistsof encryptedmaliciouscode,decryptedmodule.The virusesuse encrypted code technique whichmake antivirussoftwarehardlytodetectthem.The antivirusprogramusuallycan detectthistype of viruseswhentheytryspreadbydecryptedthemselves. 4. Logic Bomb Viruses Logic BombVirusesorsometime knowasTime Bombissmall piece of maliciouscode orprogramwhich have abilitytoinsertitself tootherprogramsorsystemandperformspecific actionwhenthe conditions are met(mostLogic Bombdevelopersuse date asconditions).The LogicBombdoesnothinguntil pre- programmeddate isreached.LogicBomb can performanymaliciousthingsbasedonpre-programmed withinitsuchas deletingfile ordisplayingunwantedmessage orlockprogramand so on. 5. Macro Viruses WhentalkingaboutMacro Viruses,we refertoviruseswhichinfectmacroof otherapplicationssuchas MicrosoftWord, MicrosoftExcel.The virusesare writteninamacro language and use itto distribute themselves.Macroviruseswill runautomaticallywhenuseropendocument.Usuallythistype of virus cause harmlesstoyour computer,butinsteadtheyare annoyingbyautomaticallyinsertingundesired textsor symbols. Example of Macro Virus:WM.Concept,itwas introducedin1995 the firstmacro virusthat spread throughMicrosoftWord. Andanotherpopularone isMelissathatis firstfoundin1999, italsocan spreadthrough MS Word,Excel and Outlook.
  • 2. 6. Multipartite Viruses Multipartite Virusesistype of viruseswhichinfectusercomputeronbothpartboot sectorand executable filesandprogramsat the same time,withthiscondition,the virusesspreadfasterthanboot sectoror file infectoralone. Example:Ghostball,the firstmultipartite virus. 7. NonresidentViruses Thistype of virusesissimilartoResidentVirusesbyusingreplicationof module.Besidesthat, NonresidentVirusesrole asfindermodule whichcaninfecttofiles whenitfoundone (itwill selectone or more filestoinfecteachtime the module isexecuted). 8. PolymorphicViruses PolymorphicVirusissimilartoencryptedviruses;itcaninfectfileswithanencryptedcopyof itself.The virusesuse difference technique toreplicate themselves.Some polymorphicvirusesare hardlytodetect by antivirussoftware usingvirussignaturebased,becauseitdonotremainany identical after replication. Example:Pseudonym,1260 9. ResidentViruses ResidentVirusesorknownasMemoryResidentVirusesismaliciousmodule.The virusescanreplicate module and installingmaliciouscode intocomputermemory(RAM).The virusesare commonlyclassified intotwo maincategories:FastInfectorsandSlow Infectors. 10. StealthViruses StealthVirusesissome sortof viruseswhichtrytotrick anti-virussoftwarebyinterceptingitsrequests to the operatingsystem.Ithasabilitytohide itself fromsome antivirussoftware programs.Therefore, some antivirusprogramcannotdetect them. Please dontforgettoleave acomments..thanksandhave fun