Computer Virus and there types

In this article, we know what is a computer virus and how many types of computer viruses are there ? If you are interested in computer, then you must know a lot about it. If you do not know, then after reading this article, you will easily understand what is a computer virus ? If settled, a computer virus is a program or software that enters our computer system without our permission and spreads its infection to the computer. 

 

This is the inherent property of computer viruses. In this article, I have explained the complete information about how this virus infects our computer system and how it has been infected. So let's understand about computer virus in this article in simple language.



               

What is virus ?
       A computer virus is a type of malware that alters programs and applications to multiply the program code itself. The computer becomes infected through the natural of ambiguous code. Computer viruses come in different forms to infect the system in different ways. Let's know about some types of computer viruses.

Boot sector virus :-
   Such viruses infect the master boot record, and removing this virus is a complex task and after requires system preparation. Mostly it spreads through removable media.

Direct action virus :-
    A direct action virus is type of file infector virus that when installed or executed, reduces itself by attaching itself to an .exe, .bin or .com file. Once existing files and make them unrecoverable.

Resident virus :-
      A resident virus is a computer virus that stores it self inside memory, allowing other files to be infected when the originally infected program is no longer running. Storing in memory allows the virus to spread easily, as it has greater access to other parts of the computer.

Multipartite virus :-
      This virus is a computer virus capable of attacking both the boot sector and the executable file of the infected computer. If you are familiar with cyber zones, then you know that most computer viruses attack boot sector or executable files.

Polymorphic virus :-
   In computer terminology, the polymorphic code is a flowing code that uses a polymorphic engine to perform polymorphism while retaining the original algorithm. That is, the code changes automatically  every time it is run, but the code function will not change at all.

Overwrite virus :-
    An overwrite virus is a malicious program that, after infection, will effectively destroy the original program code, typically by overriding the data in the systems memory. Example of override viruses are :- TRJ. Reboot virus that uses visual basic five libraries to overwrite existing program code.

Spacefiller virus :-
    Spacefiller virus, also know as cavity virus or Chernobyl virus or CIH, is a rate type of computer virus that attempts to position itself by filling in empty pieces of a file. By using the cable blank sections of a file, a virus can infect a file without changing the size of the file, making it more difficult to defect.

Full form of virus :-
V - Vital
I - Information
R - Resource
U - Under
S - Seize


Which is the first computer virus ?
     The first computer virus is considered brain. Which was introduced as the first virus in 1986, and is considered to be the first computer virus for MS-DOS. It infects the boot sector of the media formatted with the DOS file allocation table (FAT) file system.

Who introduce virus in computer ?
       Talking about computer virus, this is the first story written about computer viruses. Mail MS-DOS is called brain and was written in 986 by two brothers "Basit farooq alvi" and "Amjad farooq alvi" from Lahore, Punjab, Pakistan.

How to get read of computer virus ? 
    Never expect the computer virus to remain in your system. Why this virus can kill your important files, folders, programs. In some cases, this virus can also damage the system hardware. To avoid the dangers of all such viruses, it becomes unavoidable to install an effective anti-virus in your system.

Signs of virus infections :-
        It is important for every computer user to abstain from these warning signs :-

* Change to your home page or password
* Mass emails being send from your email account
* Frequent crashed
* Unusually performance
* Programs running of their own
* Pop-ups bombarding the screen
* File multiplying/ duplicating on their own
* New files or program in the computer
* File, folder or program are deleting
* The sound of a hard drive

Detecting of computer virus :-
      An anti-virus program is required to remove or detect a computer virus. There are some popular methods of detecting viruses. Each of these methods has its own strengths and weakness, such as signature scanning, heuristic scanning and integrity checking solution signature scanning is the easiest way to detect a virus but it cannot detect viruses whose signature is not available in the virus database.



How does a computer virus work ?
       A virus is a small pieces of software that occurs on real-time programs. For example, a virus can spread itself in a problem such as a spreadsheet program.

Some common source of computer virus infections :-
     There are many sources of computer virus infection but we will tell you five sources :-

1- Downloading program :-
    Programs that contains the downloadable files are the commonest source of malware such as freeware, worms, and other executable files.

2- Pirated or cracked software :-
    Every time you open a cracked software, your antivirus software might flag it as a malware as the cracks consist of malicious scripts. Always say "No" to cracks as they can inject malicious script into your PC.

3- E-mail attachments :-
    Whether you know it or not, you can message any email. In such a case, if you click on a known link or attachment, then your system can be. If anything like this matches, then check it properly and click.

4- Internet :-
   In today's time, everyone uses the internet. In such a way, the most easy way to bring virus to your device from the middle of the internet. If you open any website, you must check its URL. For a secure URL, see https in it.

5- Bluetooth :-
        Bluetooth transfer can also infect your system, so it is important to know what kind of media file is send to your computer when the transfer occurs.

Post a Comment

0 Comments