Skip to main content

What is Malware and Viruses?

malware, what is malware, what is viruses, malware and virus,
The term malware describes viruses, worms, Trojan horse, attack applets and attack scripts. These virulent programs represent the most common threat to your information.
A virus is a parasitic program that infarcts another legitimate program which is sometimes called host. This virus infect the host programs and the virus modifies the host to store a copy of the virus in the system.. Many viruses are programmed to do harm once they infect the victim’s system.

Types of Viruses:
Depending on your source of information different types of viruses may be described in different ways. Some of the viruses are given below.

1. Bimodal, Bipartite Viruses: This type of virus can infect both files and the boot sector of a disk.

2. Boot Sector Virus: This type of virus is one of the most hostile types of virus. A boot sector virus infects the boot sector of a hard disk or floppy disk.

3. Cluster Virus: This type of virus makes changes to a disk file system. If any program is run from the infected disk the program causes the virus to run as well..

4. E-Mail Virus: This type of virus can be transmitted via email messages sent across private networks or the internet. Some e-mail virus is transmitted as an infected attachment- a document file or program that is attached to the message. This type of virus is run when the victim opens the file that is attached to the message.

5. File infecting Viruses: This type of virus infects program files on a disk (Such as .exe or .com files). When an infected program is launched the virus’s code is also executed.

6. Macro Viruses: A macro virus is designed to infect a specific type of document file such as Microsoft Word or Excel files. These documents can include macros which are small programs that execute commands. 

7. Polymorphic or self changing viruses: These viruses can change itself each time they are copied making them difficult to isolate.

8. Trojan Horses: A Trojan Horse is a malicious program that appears to be friendly. Some Trojan Horses appear to be games. Because Trojan Horses do not make duplicates of themselves on the victim’s disk they are not technically viruses. Trojan Horses are often used by hackers to create a “Back Door” to an infected system as described earlier.

9. Worms: A worm is a program whose purpose is to duplicate itself. An effective worm will fill entire disks with copies of itself and will take up as much space as possible in the host system’s memory. Many worms are designed to spread to other computers. An entire LAN or corporate email system can become totally clogged with copies of a worm, rendering it useless. Worms are commonly spread over the internet relay Chat channels.

Comments

Popular posts from this blog

How Many Type of Keys on a Keyboard?

Friends you know a keyboard is the most important part of a computer. It consists of different sets of keys that help us to enter information into the computer. Today we will discuss about keyboard and its keys types and use. A standard keyboard has 104 keys. Types of Keys in a Keyboard: Alphabet Keys Number Keys Special Keys Function Keys Navigation Keys 1. Alphabet Keys:   26 alphabet keys are present on a keyboard from A to Z. these keys are not present in the alphabetical order. These keys are used to type words, sentences or paragraphs. 2. Number Keys:   These keys are used for typing numbers. These keys are present above the top row of the alphabet keys and also present on the right side of the keyboard. 3. Special Keys:   Keyboard has more special keys such as Space bar Key, caps lock key, backspace key, shift key, enter key, symbol keys and tab key etc. 4. Function Keys:   12 function keys are present on a keyboard. They keys are

Advantage and Disadvantage of Computer Generations

All computer generations have some advantage and disadvantage today we explain some computer generation advantages and disadvantages. First Generation Computers (1946-1959) The computers produced during the period 1946-1959 with the them technology are regarded as the first generation computer. These computers were manufactured with the vacuum tubes. These tubes were used in the arithmetic and logical operations.  Advantages: They were capable of making arithmetic and logical operations. They used the electronic values in place of the key punch machines or the unit record machines.  Disadvantages: They were too big in size, very slow, low level of accuracy and reliability. They consumed lot of electricity, generated a lot of heat and break down frequently. Second Generation Computers (1959-1965) The computer produced during the period 1959-65 with technology is known as second generation computers. These computers use

What is Vacuum Tube

A vacuum tube is, reasonable enough, a sealed glass tube containing a vacuum in which are present several electronic elements: the cathode, anode, grid, and filament. When the cathode and anode are heated by the filament, and a voltage is applied across them, current flows between the cathode and anode. If a grid is inserted between them, the flow can be controlled by changing the grid between a positive and negative voltage.  The grid voltage can be quite small, and the plate voltages can be quite high, thus providing an amplifying capability. More importantly for computers, switching the grid voltage causes the tube to act as a switch with respect to the plates. Thus, we have an electronically controlled switch that is much faster than a relay. A type of vacuum tube also served as a popular storage mechanism, the Cathode Ray Tube (CRT). Other memory devices used during the period include mercury or glass delay lines, and magnetic core memory. Vacuum tubes, however, are large,