Your Ad Here

Identify the Types of Viruses Part-1

Filed under: , by: Network World

Viruses are classified depending on how they infect the computer systems on a network and include the following types:

Boot Viruses
These viruses attack the boot record, the master boot record, the File Allocation Table (FAT), and the partition table of a computer hard drive, and are often delivered from an infected diskette accidentally placed in the disk drive when starting a computer.

Joshi and Michelangelo are examples of Boot sector viruses.

File Viruses (Trojan Horses)

These viruses attack program files (files with names ending in .exe, .com, .sys, .drv, .ovl, or .bin) by attaching themselves to an executable file. The virus waits in memory for the user to run another program and use the event as a trigger to infect and replicate.

Trojan horse programs are an example of file viruses. A trojan horse is a destructive program that can come concealed as part of software such as a game or a graphics application.

Trojan horses can contain worm and virus programs and are frequently used for embezzlement. These programs can be programmed to self destruct, leaving no evidence, aside from their damage.

Macro Viruses
These viruses attack programs that run macros. The most common of these are in Microsoft Word documents. A macro virus is a malicious macro that starts when a document or a template file in which it is embedded is opened by an application. The macro virus then copies itself onto other documents.

A well known example of macro virus is the Melissa macro virus. Some of the aliases and variants include Melissa, Melissa.a, and W97M/Melissa.a@mm

0 comments: