Preview

COMPUTER VIRUS

Satisfactory Essays
Open Document
Open Document
1576 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
COMPUTER VIRUS
COMPUTER VIRUS
AND ITS TYPES

COMPUTER
VIRUS
Computer virus is a software program written with malicious intentions. There are number of computer viruses that can impede the functioning of your computer system.

DETAIL ABOUT
COMPUTER VIRUS

They are replicated by themselves. Viruses are so dangerous and malicious that they can be automatically copied and pasted from memory to memory over and over; the transmitting power is too much quick from network to network that can simply hang smoothly running computer, sometimes damage the important programs of the computer. Viruses are very dangerous program can go on their activities automatically and can do a great loss of the users. TYPES OF COMPUTER VIRUS
Memory Resident Virus
 Direct Action Virus
 Overwrite Viruses
 Boot Sector Virus
 Macro Virus
 Directory virus
 Polyphormic Virus
 Companion Virus
 FAT Virus
 Multipartite Virus
 Web Scripting Virus
 Worms
 File Infector Virus


Memory Resident
These viruses fix themselves in the computer memory and get activated whenever the OS runs and infects all the files that are then opened.
 Hideout: This type of virus hides in the RAM and stays there even after the malicious code is executed. It gets control over the system memory and allocate memory blocks through which it runs its own code, and executes the code when any function is executed.
 Target: It can corrupt files and programs that are opened, closed, copied, renamed, etc.
 Examples: Randex, CMJ, Meve, and MrKlunky
 Protection: Install an antivirus program.


Direct Action Virus


The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that are specified in the AUTOEXEC.BAT file path. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.

FindFirst/FindNext technique is used

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Virus Quiz

    • 602 Words
    • 3 Pages

    A virus may not kill a host cell but may become inactive for a period…

    • 602 Words
    • 3 Pages
    Good Essays
  • Better Essays

    4TH EDITION © 1995,97 ROB ROSENBERGER; ALL RIGHTS RESERVED. INTERNET E-MAIL: us@kumite.com WORLD WIDE WEB: http://www.kumite.com/myths…

    • 8847 Words
    • 36 Pages
    Better Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    Freeman, Lee A., and Andrew Urbaczewski. "Why Do People Hate Spyware?." Communications Of The ACM 48.8 (2005): 50-53. Business Source Elite. Web. 15 June 2013.…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    computer

    • 269 Words
    • 2 Pages

    Technical skills are most important at lower organizational levels while human skills become more important as managers move up the organizational hierarchy.…

    • 269 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Virus

    • 1318 Words
    • 6 Pages

    • Viral genomes can be either DNA or RNA • This genome, once inside a host cell, directs synthesis of new viral proteins, and also replication of new viral genomes • Viral genomes come in all kinds:…

    • 1318 Words
    • 6 Pages
    Better Essays
  • Good Essays

    An Effective Virus

    • 658 Words
    • 3 Pages

    Are you addicted to shopping? According to John de Graaf, David Wann, and Thomas Naylor, just about everyone is. In the article, "The Addictive Virus", the three writers succeed in supporting their claim that Americans are buying too much "stuff" and for the "wrong reasons". The article uses a casual tone and easy language to create an effect that is light and somewhat humorous at times. Along with its mainly easy-to-read content, the article keeps its integrity by including quotes, statistics and some basic truths about the life of a consumer.…

    • 658 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Norwalk Virus

    • 742 Words
    • 3 Pages

    As the summer season is in full gear now a particular virus is looming in the…

    • 742 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Computer

    • 2547 Words
    • 11 Pages

    The past few weeks in my life have really had an impact on me. In such a short period of time, I have become more aware of the different cultures that exist around the world today. We tend to think that our way of life is the only way there is, or at least the only right way. It is very ignorant to think that everyone believes and behaves the same way. People should stop being so self-centered and take notice and interest in cultural diversity. There are numerous different cultures in our country alone.One in particular is the Amish culture, which I would like to familiarize you with. The Amish culture consists of many unique beliefs that makes their ways unlike that of any other culture. They lead a life of simplicity and yet have very harsh ways of doing things. The Amish is perhaps the most diverse culture in the entire United States.…

    • 2547 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Viruses

    • 2559 Words
    • 11 Pages

    Viruses are sub-cellular agents of infection that must utilize the cellular machinery of bacteria, plants or animals in order to reproduce. Composed of a single strand of genetic material (DNA or RNA) encased in a protein capsid, a virus is too small to be seen by standard light microscopy; indeed, most are less than one hundredth the size of a bacterium.…

    • 2559 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Virus

    • 508 Words
    • 3 Pages

    There is no precise definition of what separates the living from the non-living. One definition might be the point at which an entity becomes self-aware. In this sense, someone who has had severe head trauma may be classified as brain dead. In this case, the body and brain are still functioning on a base level and there is definitely metabolic activity in all of the cells that make up the larger organism, but it is presumed that there is no self-awareness so the person is classified as brain dead. On the other end of the spectrum, a different criterion for defining life would be the ability to move a genetic blueprint into future generations, thereby regenerating your likeness. In the second, more simplistic definition, viruses are definitely alive. They are undeniably the most efficient entities on this planet at propagating their genetic information.…

    • 508 Words
    • 3 Pages
    Good Essays
  • Good Essays

    What is virus? A computer virus, according to Webster 's Collegiate Dictionary, is "a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data)". Two categories of viruses, macro viruses and worms, are especially common today. Computer viruses are never naturally occurring; they are always man-made. Once created and released, however, their spread is not directly under human control. One example of a virus is the Anna Kournikova virus, which comes in the form of a picture sent through email.…

    • 1103 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Trojan Virus

    • 1500 Words
    • 6 Pages

    Trojan horse is a program which contained a malicious or harmful code inside data that can control or damage the data, such as erasing data in the hard drive and may change computing system into a killing machine. Trojan virus has become common among hackers and the availability of advertising services that permit authors to violate the user’s privacy. 83 percent of the global malware is Trojan virus according to BitDefender from January to June 2009. This paper would generally talk about:    History of Trojan Horse virus, Types of Trojan Horse Virus, How Trojan virus is used to control a computing system or data.…

    • 1500 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Life Cycle of a Virus

    • 844 Words
    • 4 Pages

    Viruses with damage routines will activate when certain conditions are met, for example, on a certain date or when the infected user performs a particular action. Viruses without damage routines do not activate, instead causing damage by stealing storage space.…

    • 844 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Computer

    • 4560 Words
    • 19 Pages

    That day my aunt told me to assemble his computer . I`m thinking about that because I never handled and never try to assemble a computer but again I try.. that moment I finish to assemble the computer . After the day I realist to what I want in my future that is a computer programmer that is the thing that I also to encounter my fear. That give me a moment to find myself but if it`s difficult to be a programmer…

    • 4560 Words
    • 19 Pages
    Satisfactory Essays

Related Topics