Index Labels

All about viruses

. . No comments:
What a definition?
  • A virus is a program that replicates by attaching itself to other programs. The infected program must be executed for a virus to run. The program might be an application, a macro, a system file, or the boot sector programs.
  • Adware produces all those unwanted pop-up ads. Adware is secretly installed on your computer when you download and install shareware or freeware, including screen savers, wallpaper, music, cartoons, news, and weather alerts.
  • Spam is junk e-mail that you don’t want, that you didn’t ask for, and that gets in your way.
  • Spyware is software that installs itself on your computer to spy on you, and collects personal information about you that it transmits over the Internet to Web-hosting sites that intend to use your personal data for harm.
  • A worm is a program that copies itself throughout a network or Internet without a host program. A worm creates problems by overloading the network as it replicates. Worms cause damage by their presence rather than by performing a specific damaging act, as a virus does. A worm overload memory or hard drive space by replicating repeatedly.
  • A browser hijacker, also called a home page hijacker, does mischief by changing your home page and other browser settings.
  • A dialer is software installed on your PC that disconnects your phone line from your ISP and dials up an expensive pay-per-minute phone number without your knowledge. The damage a dialer does is the expensive phone bill.
  • A keylogger tracks all your keystrokes, including passwords, chat room sessions, e-mail messages, documents, online purchases, and anything else you type on your PC. All this text is logged to a text file and transmitted over the Internet without your knowledge. A keylooger is a type of spyware.
  • A logic bomb is a dormant code added to software and triggered at a predetermined time or by a predetermined event. For instance, an employee might put code in a program to destroy important files if his name is ever remove from the payroll file.
  • A Trojan horse does not need a host program to work; rather, it substitutes itself for a legitimate program. In most cases, a user launches it thinking she is launching a legitimate program. A Trojan is likely to introduce one or more virus into the system. These Trojan are called downloaders.
  • A virus attacks your system and hides in several different ways. Consider the following:
  • A boot sector virus hides in the boot sector program of a hard drive or floppy disk or in the master boot program in the Master Boot Record.
  • A file virus hides in an executable (.exe, .com,  or .sys) program or in a word-processing document that contain a macro.
  • A multipartite virus is a combination of a boot sector virus and a file virus and can hide in either.
  • A macro is a small program contained in a document that can be automatically executed either when the document is first loaded or later by pressing a key combination.
  • Virus that hide in macros of document files are called macro viruses. Macro viruses are the most common virus spread by email, hiding in macros of attachment document files.
  • A script virus is a virus that hides in a script, which might execute when you click a link on a Web page or in an HTML email message, or when you attempt to open email attachment.

How Virus works:
  • As a virus replicates, it changes its characteristics. This type of virus is called a polymorphic virus.
  • Some viruses can continually transform themselves so they will not be detected by AV software that is looking for a particular characteristic. A virus that uses this technique is called an encrypting virus.
  • The virus create more than one process
  • Entries are often made in obscure places in the registry that allow the software to start
  • One type of malware, called a rootkit, loads itself before the OS boot is complete.



No comments:

Post a Comment

4sharingAZ. Powered by Blogger.

About Metro

Follow us on Facebook