This essay Types Of Computer Viruses has a total of 1519 words and 7 pages.
Types Of Computer Viruses
A computer virus is a program that is designed to damage your computer, programs, and files. Like a virus in a living thing, a computer virus can spread if it is not removed. Some viruses are more dangerous than others. One of the most common places for a computer virus to appear is on a file found on the Internet or attached to an E-mail. For example, you may have a virus that just pops a message box on your screen, and then the virus is disabled, or you can have a virus that deletes half of your hard drive.
Computer viruses didnít really exist until the mid 1980s. The first computer viruses were created in university labs to demonstrate how much of a threat the vicious code could be.
There are many kind of viruses that exist today. Some of the most common of Computer Viruses are: File Viruses, Boot Sector/Partition Viruses, Multi-Partite Viruses, Trojan Horses, File Overwriters, Polymorphic viruses, and Stealth Viruses.
A File Virus is the most common kind of virus. These kinds of viruses usually infect .EXE and .COM files, which are the main component of a program or application. A file virus can insert its own code into part of the file, so that when the infected program file is run, the virus is executed first.
Most file viruses are memory resident. Because of this, they can easily attach themselves to other programs that are being run and start to infect that file. A simple virus will overwrite and destroy a host file, immediately letting the user know that there is a problem because the software will not run. Because these viruses are immediately sensed by the computer, they have a less chance to spread. More complex written viruses will cause more damage, spread easier, and are harder to be detected.
Boot sector viruses infect hard drives and floppy disks by putting itself on the boot sector of the disk, which has the code that is run at boot up. Booting up from an infected floppy, allows the virus to jump from the floppy to the hard drive. These viruses are loaded first, and gain control of the system before MS-DOS could be loaded. Since the virus is run before the operating system, it is not MS-DOS-specific and can infect any PC operating system.
These viruses stay in the RAM and infects every disk that is read by the computer until the computer is rebooted. After reboot the virus is removed from memory.
Multi-Partite Viruses are the worse of both file and boot sector viruses. They can infect the host software components. These viruses spread like a file virus, but still insert itself into a boot sector or partition table. Because of this, they are difficult to remove. An example of this type of virus is the Tequila virus.
Trojan Horses are the worst kind of viruses that exist. They contain malicious code that is meant to damage your computer. Unlike other viruses, this virus does not replicate itself. This virus waits until the trigger event. When the trigger event occurs, a message is displayed or files are damaged. Because of the nature of these viruses, there are some researchers that do not classify Trojan Horses as viruses.
File Overwriters are viruses that link themselves to a program, leaving the original code intact and adding themselves over and over to as many files as possible. These viruses are made simply to keep copying itself. While, this virus is copying itself it is taking up more disk space and slowing down performance. Since these viruses often have flaws in them, they can inadvertently damage or destroy data. The worst kind of file overwriters, wait until the trigger event, then start to destroy files.
Most of the viruses that exist today are Polymorphic. Recently a Mutation Engine was released. This software ensures that polymorphic viruses will only proliferate over the next few years. Like the human AIDS virus, polymorphic viruses grows fast to escape detection by anti-virus programs. Special encrypted code within this virus allows the virus to hide from detection.
There are a limited number of kinds of polymorphic viruses. Because of this, they are easier to notice. An example of this would be the Whale Virus , which
Topics Related to Types Of Computer Viruses
Computer viruses, Comparison of computer viruses, Virus, Antivirus software, Macro virus, Malware, Brain, Multipartite virus, Macro and security
Essays Related to Types Of Computer Viruses
Genetic Engineering, history and futureGenetic Engineering, history and future Altering the Face of Science Science is a creature that continues to evolve at a much higher rate than the beings that gave it birth. The transformation time from tree-shrew, to ape, to human far exceeds the time from analytical engine, to calculator, to computer. But science, in the past, has always remained distant. It has allowed for advances in production, transportation, and even entertainment, but never in history will science be able to so deeply af
The Effects of HIV Mutations on the Immune SystemThe Effects of HIV Mutations on the Immune System Science C.J. Stimson INTRODUCTION The topic of this paper is the human immunodeficiency virus, HIV, and whether or not mutations undergone by the virus allow it to survive in the immune system. The cost of treating all persons with AIDS in 1993 in the United States was $7.8 billion, and it is estimated that 20,000 new cases of AIDS are reported every 3 months to the CDC. This question dealing with how HIV survives in the immune system is of criti
Types Of Computer VirusesTypes Of ComputerViruses A computer virus is a program that is designed to damage your computer, programs, and files. Like a virus in a living thing, a computer virus can spread if it is not removed. Some viruses are more dangerous than others. One of the most common places for a computer virus to appear is on a file found on the Internet or attached to an E-mail. For example, you may have a virus that just pops a message box on your screen, and then the virus is disabled, or you can have a vir
HotlineHotline The Hotline Connect software suite enables Server communities on personal computers worldwide that combined, comprise the Hotline Network. Hotline Communications cannot, and does not, monitor, track or control the activity or content on Hotline Servers outside the Hotline Network, and as such, does not guarantee the accuracy, integrity or quality of such activity or content. Hotline Communications does, however, extend the following Usage Policy to all users, including those users on Ser
Genetic EngineeringGenetic Engineering Genetic Engineering: A leap in to the future or a leap towards destruction? Introduction Science is a creature that continues to evolve at a much higher rate than the beings that gave it birth. The transformation time from tree-shrew, to ape, to human far exceeds the time from an analytical engine, to a calculator, to a computer. However, science, in the past, has always remained distant. It has allowed for advances in production, transportation, and even entertainment, but n
Tom Clancy's geniusTom Clancy\'s genius English Tom Clancy\'s genius The Cold War and post Cold War eras have brought with them many interesting aspects. New technologies initially meant for mass destruction filter down into the civilian world, making current lives easier. One example of this is the anti-lock braking systems of todayís cars. Originally designed to slow fighter-planes on landing without skidding, these systems make it safer for parents to take their children on vacation. One less noted advancement
Computer Crimes on the InternetComputer Crimes on the Internet Alex O\'Ree English 101, period 2 Ms. Dougherty April 9.1997 Computer Crimes on the Internet Thesis: Emerging with the Internet, a group of elite cyber-surfers have turned into today\'s computer hackers. I. Software piracy is a major crime on the Net. A. $7.5 billion of American Software is stolen each year. II. Industrial Espionage is gaining access to remote sites illegally. A. Stealing of information from corporate sites is extremely illegal. B. Password Sniff
Hacker's HellHacker\'s Hell To deal with hackers who break through office systems through the Internet it is important for information managers to understand their enemy well. If they have sound background knowledge about hackers, they might be prepared to deal with them in a much more effective method. Hackers are very educated often mostly university or high school students who try to break through systems for which they have no authorization. They deal poorly with people, have few friends and less relatio
Controlling The InternetControlling The Internet Controlling the Internet Censorship plays a role in everything that is portrayed on the Internet. However, due to the size and its rapid growth, it has become almost impossible to control. In respect to censorship in the Internet, we will be examining the issues of pornography, privacy, security, and the Napster debate. In 1989, the World Wide Web was developed. This new technology enabled Internet users to exchange information on a global scale. With no restrictions on