Computer Virus is
harmful program which enter in computer without user's permission or
knowledge. It has the ability to replicate itself, thus continuing to
spread. Virus affect the program and performance of system.
Today there are various types of Viruses available, let us have a look on few of them.
Memory resident
Virus
These
Virus fix themselves in computer memory and get activated whenever
the OS runs and infects all the files that are then opened. This
types of Virus hide in the RAM. It gets control over the system
memory and allocate memory blocks through which it runs own code when
the function is executed.
Protection-
Install an antivirus program.
Direct Action
Viruses
The main purpose of this Virus is to replicate and take
action when it is excuted. When a specific condition is met, this virus will start to spread infection in Files, Directory or
Folder that
are
specified in the AUTOEXEC.BAT ( AUTOEXEC.BAT is a system file) file
path. The Virus keep changing their location to a new file whenever
the code executed, but are generally found in the hard drive's root
directory.
Protection-
Install an antivirus scanner. However this virus has minimal effect
on computer's performance.
Overwrite Virus
This kind of Virus deletes the information contained in
the files that it infects, corrupt them partially or totally useless
once they have been infected. The virus replace the files content
however, it does not change the file size.
Protection-
Install
the best antivirus program for your computers, If Virus enter in to
your computer
The
only way to clean a file to delete the file completely.
Boot
Sector Virus
This type of Virus affect the boot sector of a hard
drive. This is crucial part of the disk, in which booting information
stored which helps to boot computer system. It hides in the memory
until dos accesses the floppy disc or CD/DVD disc, and whichever boot
data is accessed Virus infects it.
Protection-
The
best way of avoiding boot sector Viruses is to ensure that Floppy
Discs or CD/DVD Discs are write protected. Also never start your
computer with unknown Floppy or CD/DVD.
Macro
Virus
Macro Virus infect files that are created certain
applications or programs that contain macros, like .doc, .Xls , .pps,
.mdb etc. These mini programs make it possible to automate series of
operations so that they are performed as a single action thereby
saving the user from having to carry them out one by one. These hide
in a document that are shared Via e-mail or networks.
Protection-
The
best technical of protection is t avoid opening e-mails from unknown
senders. Also disabling Macros can help you.
Directory
Viruses
Directory Viruses infect the directory of your computer
by changing the path that indicates the location of file by changing
the path that indicates the location of file. When you execute a
program file with an extension .EXE or .COM that has been infected by
a virus, you are unknowingly running the virus program, while the
original file already moved by virus.
Protection-
You
can reinstall all the files from the backup that are infected after
formatting the disk.
Polymorphic
Virus
This type of viruses encrypt or encode themselves in a
different way every time they infect a system. This makes impossible
for antivirus program to identify them using string or signature
searches. The virus then goes on to create large number of copies.
Protection-
Install a high-end antivirus as the normal ones are incapable of
detecting this type of Virus. For purchasing antivirus, Kindly
contact Solution For Tech (WWW.SolutionForTech.Com).
FAT
Virus
The file allocation table (FAT) is the part of disk used
to store all the information about the locations of files, available
space, usable space, etc. FAT virus attacks the FAT section and may
damage crucial information. Damage caused can result in loss of
information from individual files or even entire directories.
Protection-
Locate
all the files that are actually needed on the hard drive, and then
delete the ones that are not needed. They may be files created by
virus.
Multipartite
Virus-
These viruses spread in multiple ways possible. It may
vary in its action depending upon the operating system installed and
the presence of certain files. In the initial phase these viruses
tried to hide the memory like resident viruses, then they infect the
hard drive.
Protection-
you
need to clean the boot sector and also the disk to get rid of the
virus, an the reload all the data in it.
Web
Scripting Viruses
Many web pages includes complex code in order to create
an interesting and attractive content. This code is often exploited
to bring about undesirable actions. The main source of this virus
are the web browsers or infected web pages.
Protection-
Install the Microsoft application that is default feature in
Windows7 and Windows Vista. Scan the computer with this application.
Worms
A worm is a program very similar to virus, it has the
ability to self replicate and can lead to negative effects on to your
computer. But they can be detected and eliminated by an antivirus
program. These generally spread through e-mails o networks. They do
not infect files and damage them, but they replicate so fast that the
entire network may collapse.
Protection-
Installed
an updated version of antivirus program.
Trojans
Another unsavory breed malicious code are Trojan or
Trojan horses, which unlike viruses, do not reproduce by infecting
other files, nor do they self replicate like worms. In fact it is a
program which disguises it self as a useful program or application.
This viruses copy files into your computer that can damage your data,
and even delete it.
Protection-
Installed an antivirus which suggested by qualified technician.
The Most Hateful
Computer Viruses of Year 2011- 2012
There were various types of
Viruses, which came in Year 2012 but here we discuss most hateful
viruses. It's starting from
Stuxnet, Ram nit, Webmoner and several other type of viruses. Below
it the brief about all that Viruses.
Stuxnet
This Virus effect is quite real,
It create large junk files that continues to Excellently. Due to this
Hard drive disk free space it too low and you are getting “Low disk
space alert message”.
Ram
nit
This is one of the most dangerous virus that have successfully replaced the role of Sality (One family of viruses called Sality) in year 2011 in the computer and infects excutable files (A file format that the computer can directly execute). In addition Ram nit other Viruses spread in year 2011 that is Webmoner and Font agent.
Webmoner
Webmoner
is a Virus that has similarities with Ram nit its creates 4 files,
but instead target the Virus file has the file extension Sys Mso.Sys.
That virus Steal a sensitive information and attempts to send
gathered information to a remote machine.
Kolab
Facebook chat is quite excited because it has metamorphic abilities. Any malware that spread through FB chat, despite having the same size and name. Various harmful effects can be noticed while Kolab capture your system. Some of the common harmful effects includes:
* Several pop ups and warning messages.
Kolab
Facebook chat is quite excited because it has metamorphic abilities. Any malware that spread through FB chat, despite having the same size and name. Various harmful effects can be noticed while Kolab capture your system. Some of the common harmful effects includes:
* Several pop ups and warning messages.
* Record tracking of internet
browsing history.
It
spread in year 2012, it's the most powerful computer virus in a
history. Flame can spread to other systems over a LAN or via USB
stick. It can record audio, screen shots, key board activity and
network traffic. The program also record skype conversation and can
turned infected computer into a Bluetooth device which attempt to
download contact information nearby bluetooth enabled devices.
Belgian Computer
Crime Virus
This Virus worked by locking
down your computer and falsely claiming to be the police department.
Then asked to pay 100 euros or pounds to unlock your data. It claims
that your IP address is suspectd of visiting child pornography
websites, and will only unlock after payment of a fine. It spread in
year 2012. This kind of viruses also known as ransom-ware.
Google redirect Virus
Google redirect Virus is a back door Trojan. It's central function of redirecting you to unrelated websites from Google, that why its name is Google redirect Virus. It have many different secondary functions downloading other malicious programs, creating a back door in your PC security and creating advertisements.
Google redirect Virus
Google redirect Virus is a back door Trojan. It's central function of redirecting you to unrelated websites from Google, that why its name is Google redirect Virus. It have many different secondary functions downloading other malicious programs, creating a back door in your PC security and creating advertisements.
Shamoon
It discovered in year 2012 that
attacks computer running the Microsoft Windows. Shamoon is capable of
spreading to other computers on the network, through shared hard
drives.Once a system is infected, the virus continues to compile a
list of files from specific locations on the system, erase and then
send information about these files attacker. Finally the virus will
over write the master boot record of the system to prevent it from
booting.
Nine ball/ Gumblar/
DNS Changer
A trojan that can affect
personal computers, network devices and computers on a network. It
used to redirect users to fake websites in attempt to generate fraud
as revenue, sell fake services or to steal personal financial
information. That kind of virus found in year 2012.
Alureon/TDL/TDSS
Alureon/TDL/TDSS
This was used as a major part of
DNS changer infection. Alureon is a rootkit type trojan virus. It
attempts to gain administrative access to victim's computer system so
that it may disable security features and further infect the system.
Zeus and Spy Eye
This is the most prevalent
banking fraud virus and malware. It usually installs when user clicks
on emailed phishing scam email that then direct them to website
infected with an exploit kit. So never enter your Bank info in mail which you receive from unknown Person , before doing so kindly confirm with your bank.
Blackhole
Blackhole
This is in the family of malware
and computer viruses known as exploit kits. As the name implies this
virus will scan and probe the victim computer for security holes in
applications, software, browsers and add-ons. Once the security
successfully breached and a hole is created it will proceed with
rootkit to take over the machine.
Fake AV
One of the viruses are quite
famous since 2 year ago also didn't want to lose this year. It's a
virus that uses fake security application methods to trick computer
users with notifications and messages that the computer has been
infected with virus and asking computer users to activate the fake
antivirus is a way to pay online.
Slugin
It is a file infector that
inserts part of its virus code at the entry point of the file. It
also copies the rest of its code and the original entry point code to
the end of file. It infects .EXE and .DLL files.
First time support is Free, please call Solution For Tech Ltd
www.solutionfortech.com
UK: 0-800-098-8477
US: 1-800-984-8741
AUS: +61 2 8091 2346
Latest Viruses
Disk Antivirus Professional
Disk Antivirus Professional is a dangerous new rogue antivirus
program, which is used to get money from you. You can get it from pretty
much everywhere, including spam e-mail attachments, p2p connections and
malicious links in various websites. Once you get it, it will reedit
your registry and make sure it starts together with your computer. From
then on, it will proceed to hide from your antivirus and appear as a
legitimate program. It will constantly flood you with fake warnings of
threats, which are supposed to scare you. In order to clear them, you
will be asked to buy its official version, although this is a complete
lie. For this reason, you should find and remove this threat
immediately.Disk Antivirus Professional
First time support is Free, please call Solution For Tech Ltd
www.solutionfortech.com
UK: 0-800-098-8477
US: 1-800-984-8741
AUS: +61 2 8091 2346
No comments:
Post a Comment