The term malware describes viruses, worms, Trojan horse, attack applets and attack scripts. These virulent programs represent the most common threat to your information.
A virus is a parasitic program that infarcts another legitimate program which is sometimes called host. This virus infect the host programs and the virus modifies the host to store a copy of the virus in the system.. Many viruses are programmed to do harm once they infect the victim’s system.
Types of Viruses:
Depending on your source of information different types of viruses may be described in different ways. Some of the viruses are given below.
1. Bimodal, Bipartite Viruses: This type of virus can infect both files and the boot sector of a disk.
2. Boot Sector Virus: This type of virus is one of the most hostile types of virus. A boot sector virus infects the boot sector of a hard disk or floppy disk.
3. Cluster Virus: This type of virus makes changes to a disk file system. If any program is run from the infected disk the program causes the virus to run as well..
4. E-Mail Virus: This type of virus can be transmitted via email messages sent across private networks or the internet. Some e-mail virus is transmitted as an infected attachment- a document file or program that is attached to the message. This type of virus is run when the victim opens the file that is attached to the message.
5. File infecting Viruses: This type of virus infects program files on a disk (Such as .exe or .com files). When an infected program is launched the virus’s code is also executed.
6. Macro Viruses: A macro virus is designed to infect a specific type of document file such as Microsoft Word or Excel files. These documents can include macros which are small programs that execute commands.
7. Polymorphic or self changing viruses: These viruses can change itself each time they are copied making them difficult to isolate.
8. Trojan Horses: A Trojan Horse is a malicious program that appears to be friendly. Some Trojan Horses appear to be games. Because Trojan Horses do not make duplicates of themselves on the victim’s disk they are not technically viruses. Trojan Horses are often used by hackers to create a “Back Door” to an infected system as described earlier.
9. Worms: A worm is a program whose purpose is to duplicate itself. An effective worm will fill entire disks with copies of itself and will take up as much space as possible in the host system’s memory. Many worms are designed to spread to other computers. An entire LAN or corporate email system can become totally clogged with copies of a worm, rendering it useless. Worms are commonly spread over the internet relay Chat channels.
Comments
Post a Comment