Está en la página 1de 8

TYPES OF COMPUTER VIRUSES

1. Boot Sector Virus

The term boot sector is a generic name that seems to originally come from MS-DOS but is now applied generally to the boot information used by any operating system. In modern computers this is usually called the master boot record, and it is the first sector on a partitioned storage device. Boot sector viruses became popular because of the use of floppy disks to boot a computer. The widespread usage of the Internet and the death of the floppy has made other means of virus transmission more effective.

2. Browser Hijacker

This type of virus, which can spread itself in numerous ways including voluntary download, effectively hijacks certain browser functions, usually in the form of re-directing the user automatically to particular sites. Its usually assumed that this tactic is designed to increase revenue from web advertisements.
Ads by Google

airtel broadband Book an airtel broadband connection Get a chance to win an ipad. Hurry
www.airtel.com/broadband

Scan Without Computer Sale Buy Scan Without Computer And Save Big - Low US Shipping &
Fast!

Scan-Without-Computer.BuyCheapr.com

Class 1 to Class 12 Free NCERT Solutions, Test Papers, Lessons, Animations, Videos, Puzzle
www.MeritNation.com

Anti-Influenza A M2 Influenza A M2 Antigen Antibodies for Western, IP & IHC Assays


www.pierce-antibodies.com

There are a lot of such viruses, and they usually have search included somewhere in their description. CoolWebSearch may be the most well known example, but others are nearly as common.

3. Direct Action Virus


This type of virus, unlike most, only comes into action when the file containing the virus is executed. The payload is delivered and then the virus essentially becomes dormant it takes no other action unless an infected file is executed again. Most viruses do not use the direct action method of reproduction simply because it is not prolific, but viruses of this type have done damage in the past. The Vienna virus, which briefly threatened computers in 1988, is one such example of a direct action virus.

4. File Infector Virus

Perhaps the most common type of virus, the file infector takes root in a host file and then begins its operation when the file is executed. The virus may completely overwrite the file that it infects, or may only replace parts of the file, or may not replace anything but instead re-write the file so that the virus is executed rather than the program the user intended.

Although called a file virus the definition doesnt apply to all viruses in all files generally for example, the macro virus below is not referred to by the file virus. Instead, the definition is usually meant to refer only to viruses which use an executable file format, such as .exe, as their host.

5. Macro Virus
A wide variety of programs, including productivity applications like Microsoft Excel, provide support for Macros special actions programmed into the document using a specific macro programming language. Unfortunately, this makes it possible for a virus to be hidden inside a seemingly benign document. Macro viruses very widely in terms of payload. The most well known macro virus is probablyMelissa, a Word document supposedly containing the passwords to pornographic websites. The virus also exploited Words link to Microsoft Outlook in order to automatically email copies of itself.

6. Multipartite Virus
While some viruses are happy to spread via one method or deliver a single payload, Multipartite viruses want it all. A virus of this type may spread in multiple ways, and it may take different actions on an infected computer depending on variables, such as the operating system installed or the existence of certain files.

7. Polymorphic Virus

Another jack-of-all-trades, the Polymorphic virus actually mutates over time or after every execution, changing the code used to deliver its payload. Alternatively, or in addition, a Polymorphic virus may guard itself with an encryption algorithm that automatically alters itself when certain conditions are met. The goal of this trickery is evasion. Antivirus programs often find viruses by the specific code used. Obscuring or changing the code of a virus can help it avoid detection.

8. Resident Virus
This broad virus definition applies to any virus that inserts itself into a systems memory. It then may take any number of actions and run independently of the file that was originally infected.

A resident virus can be compared to a direct payload virus, which does not insert itself into the systems memory and therefore only takes action when an infected file is executed.

9. Web Scripting Virus


Many websites execute complex code in order to provide interesting content. Displayingonline video in your browser, for example, requires the execution of a specific code language that provides both the video itself and the player interface. Of course, this code can sometimes be exploited, making it possible for a virus to infect a computer or take actions on a computer through a website. Although malicious sites are sometimes created with purposely infected code, many such cases of virus exist because of code inserted into a site without the webmasters knowledge.

Types of antivirus software

Spyware Spyware is installed on your computer without your knowledge and can disrupt your system with unsolicited pop-up windows and even literally spy on your computer activity, secretly sending your private information to criminals. Good anti-spyware software is designed to both remove any spyware it detects on your computer and prevent any further spyware from becoming installed. It should work in two main ways, providing real-time protection from spyware infection, whilst also allowing you to perform regular system scans, preferably as part of an ongoing automatic security schedule.

The line between anti-spyware and anti-virus software has blurred over the years but its worth noting that, while many anti-virus products now also include spyware protection, most dedicated anti-spyware programs dont usually protect against viruses. Do I need it? Absolutely all computers need to be protected against spyware. Windows 7 and Vista PCs come with a built-in anti-spyware program called Windows Defender, which is also available as a free download for XP users. Most internet security suites also include anti-spyware features and there are also several free alternatives available for PCs, including Spybot Search & Destroy and PC Tools Spyware Doctor. Mac users should consider an all-in-one anti-virus and anti-spyware tool, such as MacScan.

Antivirus programs Most antivirus programs would be better described as anti-malware, since they are often designed to protect against worms, Trojans and most other types of malicious software as well as viruses. Some even protect against spyware, but it doesnt hurt to have a separate anti-spyware program installed, too. Most anti-virus programs identify malware by comparing signatures to a built-in database of known malicious software types. This database needs to be kept up to date in order to ensure protection, which is why its vital to download updates as soon as theyre available. Some anti-virus programs also use techniques called heuristic detection' and sandboxing to help identify new types of malware as they appear. Do I need it? Anti-virus software is essential. Neither Apple Macs nor Windows-based PCs come with any kind of anti-virus software and its vital to install some yourself. Anti-virus programs can be purchased on their own or as part of an internet security suite. There are also many good free anti-virus programs available, such as Microsoft Security Essentials, Avira AntiVir Personal Edition and AVG Anti-Virus Free Edition.

Your most visited sites are displayed at start-up Browser security A web browser is the program used to view pages on the internet, such as Internet Explorer, Safari, Firefox, Opera and Google Chrome. Its possible for malware, hackers and other cyber criminals to exploit weaknesses in web browsers. As such, you need to make sure that youre using the very latest version of your chosen browser and that you keep it up to date. The web browsers mentioned above also include a number of other security features, such as pop-up blockers and phishing detectors, which can warn you if a website appears to be a fraud. These tools should be turned on by default, but you can usually check by looking under the relevant section of the Tools, Options or Settings menu. Do I need it? Everyone needs a web browser to surf the web. As long as youre not using an old version, then you shouldnt have to worry all the latest versions of popular browsers include phishing detectors and other useful built-in security features. Your browser needs to be kept up to date in order to stay safe but, again, the latest versions have this covered thanks to their auto-updating features.

Firewall Your firewall is your first line of defence against hackers and other types of unauthorised access to your PC from over a network or the internet.

A firewall works in the background all the time monitoring traffic to (and, in some cases, from) your computer. The firewall blocks certain ports and only allow specific programs and services to communicate with your PC. Do I need it? A firewall is essential. Some routers have built-in firewalls, but you need to have one running on each of your home computers as well in order to be safe. Both Windows and Mac OS X come with built-in firewall software but, as mentioned here, the default settings they operate on dont necessarily provide the best protection. It may be worth considering using an alternative one that can monitor both outgoing and incoming traffic. Virtually all commercial security suites contain a powerful bi-directional firewall but there are several very good free equivalents that can be used instead, such as Zonealarm.

Our tips can help you set up the software Parental controls These are programs that allow you to limit and, in some cases, monitor specific peoples computer use. Usually this means parents (or grandparents) restricting the number of hours their children can use the PC, blocking the use of certain programs (including blocking games by their age rating) and limiting internet access to known safe sites in order to prevent children from being exposed to anything unsuitable online. Windows 7 and Vista PCs and Apple Mac computers both come with some basic parental control features and there are other paid-for (such as Net Nanny) and free (such as K9 Web Protection) alternatives. Do I need it? If you have children or grandchildren, or if for any reason you need to limit computer use or restrict access to certain files, programs or websites, then parental controls are extremely useful, since you cant always be there to supervise. Phishing protection

Phishing scams usually take the shape of a two-pronged attack that starts with a fake email posing as if it is from a genuine source, such as your bank, that then points you towards an equally fake website in order to con you into parting with vital private information, such as your credit card number. Protecting from them takes a similarly two-pronged effort, with anti-spam software (see below) filtering out unsolicited emails and web browser security features (see above) protecting against known fraudulent sites. Do I need it? We thoroughly recommend using a spam filter; these can significantly reduce your chances of being exposed to a fraud. And its vital to use the latest web browsers, which all have anti-phishing features switched on by default.

Spam filter Also known as anti-spam software, these utilities act like a sieve, letting through legitimate email messages but blocking unwanted or unsolicited mail from reaching your inbox. Ask your internet service provider about spam filtering you may find that your ISP is already employing spam protection on its servers. Its still a good idea to have your own spam protection on board too. See our advanced email tips for help on managing spam Some email programs, such as Apple Mail, Microsoft Outlook 2007 and the free email program Thunderbird, come with built-in spam filters. Most of the big security suites come with an anti-spam element too.

También podría gustarte