Types of Viruses

Program viruses

These contaminate executable PC program files like those with extensions such as.COM, .BIN, .OVL, .EXE, .DRV (driver) as well as .SYS (device driver). All of these programs are being loaded in memory throughout execution, captivating the virus with them. The virus turns to be active in memory, creating copies of it and infecting files on the disk.

Examples: Cascade, Sunday

Boot viruses

These infect the master boot records of hard disks or floppy disk boot records. They restore the boot record program (that is accountable for loading the operating system in the memory) duplicating it away on the disk or even overwriting it. Boot viruses were loaded into memory if the PC tries to examine the disk as it is booting.

Examples: Michelangelo, Disk Killer, Form, and Stone virus

Multipartite viruses

A hybrid of Program and Boot viruses. These infect program files and once the infected program is performed, these viruses dirty the boot record. Once you boot the PC next time the virus from the boot trace loads in the memory and then begins infecting other files on the disk.

Examples: Flip, Tequila, and Invader

Macro Viruses

This is a new kind of PC virus that infects the macros in a template or document. As you open a spreadsheet document or word processing, the macro virus is triggered and it taints the Normal template (Normal.dot)-a universal use file that saves default document formatting surroundings. Each document you open refers to Normal template, as well as thus gets infected by the macro virus. Because this virus connects itself to documents, the infection could extend if such documents are released on other PCs.

Examples: Nuclear, DMV, Word Concept.

Read more about Macro Viruses >>

Stealth viruses

These viruses employ sure techniques to shun detection. They might either readdress the disk head to understand writing another sector as an alternative of the one into which they dwell otherwise they might change the reading of the contaminated file’s size showing the directory catalog. As the Whale virus added 9216 bytes to a contaminated file; afterward the viruses deduct identical number of bytes (9216) from the size shown in the directory.

Examples: Whale, Frodo, Joshi,

Read more about Stealth viruses >>

Active X

Java controls and ActiveX would almost immediately be the scourge of computing. Mostly citizens don’t know how to manage there web browser to disable or enable the a variety of function like playing video or sound and thus, by default, go a nice large hole in the safety through allowing applets free to run into there machine. There have been lots of commotion after this plus through the amount of authority that JAVA imparts, stuff from the security angle seems a bit gloom.

Polymorphic viruses

It is a kind of virus that could encrypt its code in a dissimilar way so that it comes out in a different way in every infection. These viruses are more not easy to identify.

Examples: Virus 101, Involuntary, Evil, Proud, Stimulate, Phoenix, Cascade

These are just a small number of broad categories. There have lots of more specialized types. However allow us not to go into that. Here, we learn to guard our self, not to write a theory on computer virus specification.