COMPUTER
VIRUS
A computer virus is a malicious software
program loaded onto a user’s computer without the user’s knowledge and performs
malicious actions. The term 'computer virus' was first formally defined by Fred
Cohen in 1983. Computer viruses never occur naturally. They are always induced
by people. Once created and released, however, their diffusion is not directly
under human control. After entering a computer, a virus attaches itself to
another program in such a way that execution of the host program triggers the
action of the virus simultaneously. It can self-replicate, inserting itself
onto other programs or files, infecting them in the process.
Not all
computer viruses are destructive though. However, most of them perform actions
that are malicious in nature, such as destroying data. Viruses spread when the
software or documents they get attached to are transferred from one computer to
another using a network, a disk, file sharing methods, or through infected
e-mail attachments. Some viruses use different stealth strategies to avoid
their detection from anti-virus software. For example, some can infect files
without increasing their sizes, while others try to evade detection by killing
the tasks associated with the antivirus software before they can be detected.
Some old viruses make sure that the "last modified" date of a host
file stays the same when they infect the file.
Types
of Computer Viruses
1. Boot Sector Virus.
Even
though this virus has now become obsolete, it still pops out in one way or the
other. This virus got attention when floppy disks were used to boot a computer.
In modern computers, this virus could appear on the “Master Boot Record”.
2. Resident Virus.
After
inserting itself directing into the memory of your system, this virus has the
capability to take a number of actions. One of its more troublesome features is
its ability to run away. Leaving behind the file which was originally infected,
this virus has the ability to run on its own.
3. Direct Action Virus.
Similar
to the Vienna virus which shocked computers in 1998, this virus comes into
action after you have executed the file. The load is delivered to your computer
and the virus becomes active. However, this virus has a limitation. It takes no
action unless the file which is infected gets implemented again.
4. Polymorphic Virus.
One
of the factors that epitomize the usefulness of this virus is its ability to
evade. The Antivirus programs that are enabled on our computers detect the
presence of any virus by detecting its code. Polymorphic virus has exploited this limitation beautifully as it changes its
code every time the infected file is executed. Thus, it becomes nearly
impossible for any ordinary antivirus to track it down.
5. File Infector Virus.
Although
the word “file” in its name might suggest otherwise, this virus does not take
the help of files every time. In fact, the file is only the starting point as
the file infector dwarfs the first file after which it re-writes the file.
6. Multipartite Virus.
If
you have read carefully the aforementioned viruses, you might have noticed that
they use two methods for their transmission. Either they use one method or a
single payload is delivered.
However,
this virus wants to claim both. Depending upon the operating system of your
computer or the files that exist on your computer, it might use any of the two
methods to spread.
7. Macro Virus.
Appearing
in the form of a word document which seemingly links the user to pornographic
websites, Melissa is one of the most known Micro Virus. Going one step further,
this virus not only exploits the user but also his/her friends by mailing the
copies of the infected virus document to the contact list.
No comments:
Post a Comment