Virus Post


 Top Image


Written by: Lalitgrg992

Profile Picture
 Post Image
1. OVERWRITE VIRUS Overwrite virus is characterized by the aspect that it deletes all the data. The only way to get rid of overwrite virus is to delete the infected files immediately and permanently. By which you also lose the data or information contained in those files. Common examples of overwrite virus are Trj.Reboot, Way, and Trivial.88.D. 2. RESIDENT VIRUS Resident Virus is one that perpetually lives in the RAM of computers. From there it is capable of overriding and interrupting all the operations executed by the physical memory. Most common signs of the resident virus include corruption of data, random opening and closing of different files, and copying or renaming of files. Common examples of a resident virus are MrKlunky, Meve, Randex, and CMJ. 3. NON-RESIDENT VIRUS Non-resident viruses are a bit similar to resident viruses in using replication of program modules. In addition to that, it also works as a finder module that can infect files when it finds one. 4. DIRECTORY VIRUS Directory or Cluster virus changes the address which indicates the location of any file. Sometimes by opening a file with .com or .exe extensions. You are actually executing a virus file while the original file has been moved by the directory virus. Once infected it is impossible to locate the infected files. 5. EMAIL VIRUS Email viruses are sort of macro virus only. It usually infects computers when it is opened by the recipients. For example, the user might be asked to download a gift voucher attached to the mail. And the rest doesn’t need to be said. The “gift vouchers” always turn out to email viruses sent to infect your computer. 6.NETWORK VIRUS Network viruses use internet and LAN (Local Area Networks) to spread its interactivity. They usually multiply through shared network connections like shared folders and drives. When a network virus infects one computer, it searches for network connection to find new potential preys. Once the virus finishes corrupting the data in a computer. It moves on to the next one and repeats the cycle. 7.WORMS A worm is not precisely a virus, though it has the ability to spread by self-replicating itself and can cause adverse effects on your system. Common examples of worms are Mapson, Trile.C, and PSWBugbear.B. 8. BOOT VIRUS These types of viruses affect the boot system of hard drives. It is a vital part in which all the information on the disk is stored with a program that is used to boot the computer from the disk. The best way to avoid boot virus is to make sure no unknown storage device is connected while starting the computer. Using write-protected hard disks can also help evade boot virus attacks. Common examples of boot virus are AntiEXE and Polyboot.B. 9.FAT VIRUS FAT (File Allocation Table) viruses are a part of disk used in transmitting data and play a crucial role in normal functioning of computers. These virus attacks can prevent you from accessing certain parts of the drive where important files might have been stored. The damage caused by a FAT virus is permanent and non-reversible. 10. FILE INFECTORS Like directory virus, file infectors also attack programs files with .exe and .com extensions. When one of these types of programs is run by the user, file infectors get activated and cause the damage they are programmed to do. Most of the virus usually detected in home networks are of this nature and can be further classified on the basis of function they are encoded to carry out.
profile image


Hi Everyone.