In order to properly protect against viruses, it's helpful to know what they do and how they look. It is known that they want to spread, infect files, ... They provide load.

Viruses: the different types

* Species in a row with short explanation

* Macro Virus

* Virus Software

* Boot Sector Virus

* Trojan horse

* Viruses in general

Species in a row with short explanation

Very dangerous:

* Trojans pose as a good program, but can be damaging.

* Stealth viruses hide the damage, until they are removed, the issue is.

* Boot sector viruses are on a boot disk, when booting with the floppy, the virus is active.

* Software, software viruses infect course, if the program is opened, the virus does that.

* Hybrid viruses use several techniques to attack your computer.

Dangerous:

* Macro viruses infect eg Word and Excel files by scrambling the letters.

* Tunneling viruses use a technique to have to attack the anti-virus program notes.

* Eg sparse infectors are active only Friday the thirteenth, so the attention of the virus to escape.

* Encrypt viruses can encode and decode hiding to infect.

* Retroviruses infect the anti-virus software so it can not boot or the virus itself can not recognize.

* Polymorphic viruses constantly change their shapes to resemble an ordinary file.

Just load:

* Virus hoaxes are false reports and is usually found in chain letters.

* Worms can spread very fast, it constantly tries to copy.

Macro Virus

This virus infects Microsoft Office documents and can easily spread to other documents. Some viruses spread through Outlook Express, the popular e-mail program from Microsoft, without the user being aware of it. In another e-mail programs like Eudora, Netscape Messenger, Mozilla Tunderbird ... viruses can not spread. A macro virus is written in Visual Basic, the scripting language for macros of Microsoft Office. Normal macros are not viruses, but it is possible to make it harmful.

Virus Software

This virus will front a nesting program. If we then start the program, the virus is active first. It then has time to infect other programs. They are very dangerous because the virus is not directly over the program and scan the damage already inflicted before he is discovered. You should be very careful with freeware, some programmers deliberately infect their software.

Boot Sector Virus

Boot sector viruses install themselves on boot disks. If the computer is booted with the floppy, which normally takes the computer and "give the orders" to correctly start. If the boot floppy is infected, the virus-free game. It copies itself to the boot sector of the hard disk. The boot sector of hard disk allow the computer startup and contains information on what should be loaded, the file structure ...

If the virus still has free play, changing the BIOS. Thus, in that only the hard disk may be initiated: you can not boot disk. The virus will only be launched by the operating system and so could not help it. Fortunately there are now virtually no floppies, let alone boot disks, using the virus making it rare. Why opstartcd-ROM is no risk? These should only danger as writable CD-ROM and you would use it in a CD-RW drive. Because the CD-ROM must nevertheless somehow become infected.

Trojan horse

Trojan Horses or Trojans are very dangerous programs: they look like innocent programs, screen savers or updates but if you install them, do what they want. They can modify or delete the file structure and ports * opened. Most Trojan horses do first: they damage files and software, but they did not copy (this is exceptional). There are also backdoor Trojans. They do no damage but are able to open doors *. Then someone manage your computer completely

* What are ports? A computer is connected to other devices through ports. Eg. the Internet, the device is a server. If you surf you are a customer who goes shopping: a client and a server. Usually servers may be viewed by clients.


Like it on Facebook, Tweet it or share this article on other bookmarking websites.

No comments