Tuesday, May 21, 2019

Common Types of Viruses Essay

Trojan Horses A Trojan Horse are computing device computer computer computer viruses that hide inside non-executable files such as fuddled or document files and executable files and try to avoid detection by anti-virus schedules such as Norton or McAfee. Trojan Horses usually appear to be reusable computer files/programs such as computer game or data library.Famous Trojan Horse Programso Back OrificeLatest Trojan Horses Newso Trojan.Pgpcoder unique new kind of threat Install itself on vulnerable computer after user visit a true website. Polymorphic VirusesA polymorphic virus is an encrypted virus that hides itself from anti-virus trough encrypted (scrambled) data and then decrypted itself to be able to spread trough the computer. The thing that makes it hard for anti-virus parcel to detect polymorphic viruses is that the virus generates an entirely new decryption routine each time it infects a new executable file making the virus signature different in each signature. Stealt h VirusesA stealth virus hides the modifications made to file and boot records by modifying and forging the result of calls to function, hence programs imagine they are reading the original file and not the modified file. A good anti-virus software will probably detect stealth virus due to the fact that a stealth virus attempts to hide itself in memory when anti-virus software is launched. Slow VirusesA Slow virus is a knotty virus to detect due to the fact it only modifies and infects files when they are been modified and copied. Therefore the original file will not be infected by the actual copied file. A good way to protect yourself against slow viruses is by using an integrity checker orshell. Retro VirusesA Retro virus attacks the anti-virus software designed to delete it. The retro virus usually attempts to attack the anti-virus data files such as the virus signature store which disable the big businessman of the anti-virus software to detect and delete viruses. Otherwise the retro virus attempts to alter the operation of the anti-virus software. Multipartite VirusesA multipartite virus attempts to attack and infect both(prenominal) the boot sector and executable files at the same time. Armored VirusesAn Armored virus attempts to protect itself from anti-virus software by trying to make anti-virus software believe it is located somewhere else. Therefore the Armored virus has made itself more difficult to0 trace, disassemble and understand. Companion VirusesA Companion virus creates a confederate file for each executable file the virus infects. Therefore a companion virus may save itself as scandisk.com and every time a user executes scandisk.exe, the computer will load scandisk.com and therefore infects the system. Phage VirusesA Phage virus is a very destructive virus that re-writes an executable program with its own code, rather than just attaching itself to a file. Therefore a Page virus will usually attempt to delete or get down every program it infects. Revisiting VirusesA Revisiting virus is a worm virus and attempts to copy itself within the computers memory and then copy itself to another linked computer using TCP/IP protocols. The Morris worm virus in the late 1980s was the first major virus threat to hit the Internet.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.