Brain did take advantage of an exploit in the Microsoft OS. Nonetheless, it was not designed to be a virus. In the code, they left their addresses and phone number so they could remedy infected machines. Unfortunately, the floppy disk it came on was stolen so often, they were overwhelmed with fix requests. On the other hand, worms are malicious programs that can breach a system then self-replicate and propagate independently. Worms do not require activation or human intervention.
Typically, viruses are attached to shared or downloaded executable files with a program that runs script. Viruses can also attach to a non-executable file such as an image or Word document. When the host file is accepted into the target system, it runs once the host file is activated. Once activated, the virus can execute malicious code and infect other system files. Worms can enter a system as a downloaded file or through a network connection.
Worms can also run, self-replicate, and propagate without any triggers. Currently, experts have identified three major types of viruses, which can be further divided into subcategories. They include:. Macro viruses — The largest of the three virus types, macro viruses use built-in programming scripts that are found in Excel or Word to automate tasks.
The boot-record infectors affect the code found in a particular system area on a disk. But these viruses are not common these days since it relies on physical storage media. Creeper is not a dangerous virus but its self-replication. Once it affects the system, it creates a pop-up message, like catch me if you can.
Elk Cloner is a boot virus that attacked the Apple system and leaves a poem which is the hacker writes3. The email is disguised as a love letter to anyone in the contact book, and if the user prompts to open it, the virus gets injected into their system. This is popular, which affected fifty million systems in just nine days.
The Code red virus attacked Microsoft servers and caused many server related issues as it degraded all the information technology system. Ninda is a window virus that is injected through multiple methods. It is spread via emails, web browsers, attachments, and different means of portable devices.
Slammer is an extremely rapid-spreading virus affecting billions of systems in a fraction of a second. TheA single bit code that corrupts the entire programlaster is a type of virus which occurs when there is a program error, but the user receives lots of worthless media with a quote, Bill gates Stop Making money.
Welchia is a virus that affects the computer, then deletes itself. Commwarrior is an advanced form of virus which attacked smartphones through text messages. It is a new variety of viruses in the beginning stage, so the security is made firm to prevent the user data. The user has to safeguard his device with a strong firewall and antivirus software to prevent the system from any virus attack. The user should cross-check twice before installing a program, clicking on spam emails, downloading a suspicious file, inserting any hard disk to the system.
Boot Sector Virus These viruses are once common back when computers are booted from floppy disks. Polymorphic Virus This virus has the capability to evade anti-virus programs since it can change codes every time an infected file is performed.
Multipartite Virus A type of virus that is very infectious and can easily spread on your computer system. Protection Against These Types Computer Viruses A virus left untreated can wreak havoc on your device but if detected early, and appropriate measures are done, then the recovery would be quick.
Avoid clicking on suspicious links. Scan email attachments before opening it. Avoid clicking on pop-up advertisements and get a pop-up blocker for your web browser. Install a reliable anti-virus program and always keep it up to date. Get Help from IT Experts! First name:. Last name:. Stealing passwords or data, logging keystrokes, corrupting files, spamming your email contacts, and even taking over your machine are just some of the devastating and irritating things a virus can do.
While some viruses can be playful in intent and effect, others can have profound and damaging effects. This includes erasing data or causing permanent damage to your hard disk.
Worse yet, some viruses are designed with financial gains in mind. In a constantly connected world, you can contract a computer virus in many ways, some more obvious than others. Viruses can be spread through email and text message attachments, Internet file downloads, and social media scam links. Your mobile devices and smartphones can become infected with mobile viruses through shady app downloads. Viruses can hide disguised as attachments of socially shareable content such as funny images, greeting cards, or audio and video files.
This type of virus can take control when you start — or boot — your computer. One way it can spread is by plugging an infected USB drive into your computer. This type of virus exploits the code of web browsers and web pages. If you access such a web page, the virus can infect your computer. A resident virus can execute anytime when an operating system loads. This type of virus comes into action when you execute a file containing a virus. Otherwise, it remains dormant. A polymorphic virus changes its code each time an infected file is executed.
It does this to evade antivirus programs. This common virus inserts malicious code into executable files — files used to perform certain functions or operations on a system. This kind of virus infects and spreads in multiple ways.
It can infect both program files and system sectors. Macro viruses are written in the same macro language used for software applications. Such viruses spread when you open an infected document, often through email attachments. You can take two approaches to removing a computer virus.
One is the manual do-it-yourself approach. The other is by enlisting the help of a reputable antivirus program. Want to do it yourself? There can be a lot of variables when it comes to removing a computer virus.
0コメント