yazik.info Physics Types Of Computer Virus Pdf

TYPES OF COMPUTER VIRUS PDF

Thursday, September 12, 2019


A computer virus is a type of malicious software / program. A Virus code when executed, replicates itself by modifying other computer programs. The types of computer virus, or malware, are many. Some aren't dangerous. But some can be truly deadly to your security and bank account. Here are seven. Computer Virus and Its Types - Download as Word Doc .doc /.docx), PDF File . pdf), Text File .txt) or read online.


Types Of Computer Virus Pdf

Author:ZACHARY HAGEMEIER
Language:English, Spanish, Dutch
Country:Korea South
Genre:Art
Pages:714
Published (Last):03.04.2015
ISBN:236-7-62465-995-4
ePub File Size:25.49 MB
PDF File Size:13.64 MB
Distribution:Free* [*Register to download]
Downloads:24596
Uploaded by: RAMONITA

A computer virus is a type of malicious software that, when executed, replicates itself by .. COM files), data files (such as Microsoft Word documents or PDF files) , or in the boot sector of the host's hard drive (or some combination of all of these) . PDF | Computer viruses have been around since the mid s. Various kinds of anti-virus software have been developed which detect. Keywords: policy, mechanism, trust, computer virus, Trojan horse, infection, Computer viruses are related to other types of programs such as Trojan horses.

Macro viruses: As the name suggests, the macro viruses particularly target macro language commands in applications like Microsoft Word. The same is implied on other programs too.

In MS Word, the macros are keystrokes that are embedded in the documents or saved sequences for commands. The macro viruses are designed to add their malicious code to the genuine macro sequences in a Word file.

However, as the years went by, Microsoft Word witnessed disabling of macros by default in more recent versions. Thus, the cybercriminals started to use social engineering schemes to target users.

In the process, they trick the user and enable macros to launch the virus. Since macro viruses are making a come back in the recent years, Microsoft quickly retaliated by adding a new feature in Office The feature enables security managers to selectively enable macro use.

As a matter of fact, it can be enabled for trusted workflows and blocked if required across the organization. As the name says it all, the virus after attacking the computer starts overwriting files with its own code.

Not to be taken lightly, these viruses are more capable of targeting specific files or applications or systematically overwrite all files on an infected device. On the flipside, the overwrite virus is capable of installing a new code in the files or applications which programs them to spread the virus to additional files, applications, and systems.

Polymorphic Viruses: More and more cybercriminals are depending on the polymorphic virus. It is a malware type which has the ability to change or mutate its underlying code without changing its basic functions or features.

This helps the virus on a computer or network to evade detection from many antimalware and threat detection products. Since virus removal programs depend on identifying signatures of malware, these viruses are carefully designed to escape detection and identification.

When a security software detects a polymorphic virus, the virus modifies itself thereby, it is no longer detectable using the previous signature. Resident Viruses: The Resident virus implants itself in the memory of a computer.

Basically, the original virus program is not required to infect new files or applications. Even when the original virus is deleted, the version stored in memory can be activated. This happens when the computer OS loads certain applications or functions. Rootkit Viruses: The rootkit virus is a malware type which secretly installs an illegal rootkit on an infected system.

This opens the door for attackers and gives them full control of the system. The attacker will be able to fundamentally modify or disable functions and programs. Like other sophisticated viruses, the rootkit virus is also created to bypass antivirus software. The latest versions of major antivirus and antimalware programs include rootkit scanning.

The Boot-record Infectors infect executable code found in specific system areas on a disk. Boot viruses are no more common these days as the latest devices rely less on physical storage media. Use a professional, email service such as Runbox.

Subscription services provide higher levels of security and support. Make sure that your Runbox virus filter is activated. Use the Webmail interface at www.

Screen your email first, and delete suspicious-looking and unwanted messages before downloading the legitimate email to your local email client.

Make sure your computer has updated anti-virus software running locally. Automatic updates are essential for effective virus protection. Combined with server-side scanning, you now have two layers of security. Disable message preview in your email client, especially on Windows platforms. Otherwise, malicious programs attached to incoming messages may execute automatically and infect your computer.

Table of Contents

Ignore or delete messages with attachments appearing to be sent from official Runbox email addresses. Runbox rarely sends email to our users, aside from replies to inquiries and payment reminders.

We practically never send an email with attachments to users. Take caution when opening graphics and media attachments, as viruses can be disguised as such files.

Maintain several independent email accounts. Also, keep backups of your most important email and files separately. If any valid message headers of a virus-email indicate what server the message was sent from, contact the service in question and file a formal complaint. Do not open any unsolicited executable files, documents, spreadsheets, etc. Avoid downloading executable or documents from the internet, as these are often used to spread viruses.

Never open files with a double file extension, e. This is a typical sign of a virus program. Viruses and spam 7. Virus-makers and spammers often cooperate in devious schemes to send as much spam as possible as efficiently as possible.

The infected computers then send massive amounts of spam, unbeknownst to the computer owner. Such virus-generated email is often forged to appear to be sent from legitimate addresses collected from address books on infected computers. The viruses also use such data, combined with lists of common user names, to send spam to huge numbers of recipients.

If this happens to you, use the trainable spam filter to catch those messages.

Never the neglect to take action on a computer virus residing in your system. There are chances that you might end up losing important files, programs, and folders. In some cases, the virus damages the system hardware too.

Thereby, it becomes mandatory to have an effective anti-virus software installed on your computer to steer clear of all such threats. If you come across any of these above-mentioned signs then there are chances that your computer is infected by a virus or malware. Not to delay, immediately stop all the commands and download an antivirus software. If you are unsure what to do, get the assistance of an authorized computer personnel.

If you are confident enough, start investigating on your own by following the below mentioned step-by-step procedures. Select Safe Mode with Networking and press Enter. Polymorphic Virus — These type of viruses are difficult to identify with a traditional anti-virus program.

This is because the polymorphic viruses alters its signature pattern whenever it replicates. Overwrite Virus — This type of virus deletes all the files that it infects. The only possible mechanism to remove is to delete the infected files and the end-user has to lose all the contents in it. Identifying the overwrite virus is difficult as it spreads through emails. This is called so as they fill up the empty spaces between the code and hence does not cause any damage to the file.

File infectors: Few file infector viruses come attached with program files, such as. Some file infector viruses infect any program for which execution is requested, including.

Consequently, when the particular program is loaded, the virus is also loaded.

Besides these, the other file infector viruses come as a completely included program or script sent in email attachments. Macro viruses: As the name suggests, the macro viruses particularly target macro language commands in applications like Microsoft Word. The same is implied on other programs too.

In MS Word, the macros are keystrokes that are embedded in the documents or saved sequences for commands. The macro viruses are designed to add their malicious code to the genuine macro sequences in a Word file. However, as the years went by, Microsoft Word witnessed disabling of macros by default in more recent versions. Thus, the cybercriminals started to use social engineering schemes to target users. In the process, they trick the user and enable macros to launch the virus.

Since macro viruses are making a come back in the recent years, Microsoft quickly retaliated by adding a new feature in Office The feature enables security managers to selectively enable macro use. As a matter of fact, it can be enabled for trusted workflows and blocked if required across the organization. As the name says it all, the virus after attacking the computer starts overwriting files with its own code.

Not to be taken lightly, these viruses are more capable of targeting specific files or applications or systematically overwrite all files on an infected device. On the flipside, the overwrite virus is capable of installing a new code in the files or applications which programs them to spread the virus to additional files, applications, and systems. Polymorphic Viruses: More and more cybercriminals are depending on the polymorphic virus.

It is a malware type which has the ability to change or mutate its underlying code without changing its basic functions or features. This helps the virus on a computer or network to evade detection from many antimalware and threat detection products.

Since virus removal programs depend on identifying signatures of malware, these viruses are carefully designed to escape detection and identification. When a security software detects a polymorphic virus, the virus modifies itself thereby, it is no longer detectable using the previous signature.

What is a computer virus?

Resident Viruses: The Resident virus implants itself in the memory of a computer. Basically, the original virus program is not required to infect new files or applications. Even when the original virus is deleted, the version stored in memory can be activated.

This happens when the computer OS loads certain applications or functions. Rootkit Viruses: The rootkit virus is a malware type which secretly installs an illegal rootkit on an infected system. This opens the door for attackers and gives them full control of the system. The attacker will be able to fundamentally modify or disable functions and programs.

Like other sophisticated viruses, the rootkit virus is also created to bypass antivirus software. The latest versions of major antivirus and antimalware programs include rootkit scanning. System or Boot-record Infectors: The Boot-record Infectors infect executable code found in specific system areas on a disk. Boot viruses are no more common these days as the latest devices rely less on physical storage media. Use a professional, email service such as Runbox. Subscription services provide higher levels of security and support.

Make sure that your Runbox virus filter is activated. Use the Webmail interface at www. Screen your email first, and delete suspicious-looking and unwanted messages before downloading the legitimate email to your local email client.

Make sure your computer has updated anti-virus software running locally. Automatic updates are essential for effective virus protection. Combined with server-side scanning, you now have two layers of security. Disable message preview in your email client, especially on Windows platforms.

Types of Viruses

Otherwise, malicious programs attached to incoming messages may execute automatically and infect your computer. Ignore or delete messages with attachments appearing to be sent from official Runbox email addresses.

Runbox rarely sends email to our users, aside from replies to inquiries and payment reminders. We practically never send an email with attachments to users.This leaves antivirus software little alternative but to send a "read" request to Windows OS files that handle such requests.

Digital Contagions: Most security software relies on virus signatures, or they employ heuristics. On page one of Dr Solomon's Virus Encyclopaedia , the undesirability of viruses, even those that do nothing but reproduce, is thoroughly explained.

Sams Publishing. Anti-Malware , Antivirus ,.