Beruflich Dokumente
Kultur Dokumente
3. Types of viruses.
Macro Viruses
These viruses infect the files created using some applications or programs
that contain macros such as doc, pps, xls and mdb. They automatically
infect the files with macros and also templates and documents that are
contained in the file. They hide in documents shared through e-mail and
networks.
They usually fix themselves inside the computer memory. They get
activated every time the OS runs and end up infecting other opened files.
They hide in RAM.
Overwrite Viruses
These types of viruses delete any information in a file they infect, leaving
them partially or completely useless once they are infected. Once in the
computer, they replaces all the file content but the file size doesn’t change.
These viruses mainly replicate or take action once they are executed. When
a certain condition is met, the viruses will act by infecting the files in the
directory or the folder specified in the AUTOEXEC.BAT. The viruses are
generally found in the hard disk’s root directory, but they keep on changing
location.
Directory Virus
Also known as cluster virus or file system virus. They infect the computer’s
directory by changing the path indicating file location. They are usually
located in the disk but affect the entire directory.
Multipartite Virus
These type of viruses spread in many different ways. Their actions vary
depending on the OS installed and presence of certain files. They tend to
hide in the computer’s memory but do not infect the hard disk.
FAT Viruses
These lardy viruses attack the file allocation table (FAT) which is the disc
part used to store every information about the available space, location of
files, unusable space etc.
These types of viruses infect files just like the direct action and the resident
types. Once inside the computer, they ‘accompany’ other existing files.
Polymorphic Virus
This program is very similar to a virus and has the ability to self-replicate
leading to negative effects on your computer.
Trojans
Trojans can illegally trace important login details of users online. For
example E-Banking is very common among users, therefore, vulnerability
of tracing your login details whenever your PC is working without any
strong powerful antivirus installed.
Email Virus
This is a virus spread via an email. Such a virus will hide in an email and
when the recipient opens the mail.
Browser Hijacker
Boot Infectors
They include the boot sector plus master boot record types. All the viral
codes can be separate location; however they infect the hard disks or the
floppy.
4. Virus risks.
A. The internet Downloaded programs or documents may be infected.
B. Documents and spreadsheet these can contain macro viruses, which
can infect and make changes to other documents or spreadsheets.
C. Programs that carry a virus can infect your machine as soon as you
run them.
D. Email can include infected attachments. If you double-click on an
infected attachment, you risk infecting your machine.
E. Floppy disks can have a virus in the boot sector. They can also hold
infected programs or documents.
Worms are programs that simply create exact copies of themselves and use
communications between computers to spread.
Keep backups of all your data make sure you have backups of all data
and software, including operating systems. If you are affected by a virus,
you can replace your files and programs with clean copies.
7. Who writes viruses and why.
Virus writers tend to be male, under 25 and single. Their self-esteem is
bound up with the approval of their peer group, or at least of a small
electronic community. Virus-writing exploits, like graffitti art, are a kind of
performance that wins the writer status.