SlideShare une entreprise Scribd logo
1  sur  13
The term “boot sector” is a generic name that
seems to originally come from MS-DOS but is
now applied generally to the boot information
used by any operating system. In modern
computers this is usually called the “master boot
record,” and it is the first sector on a partitioned
storage device.
Boot sector viruses became popular because of
the use of floppy disks to boot a computer. The
widespread usage of the Internet and the death
of the floppy has made other means of virus
transmission more effective.
This type of virus, which can spread itself in numerous ways
including voluntary download, effectively hijacks certain
browser functions, usually in the form of re-directing the user
automatically to particular sites. It’s usually assumed that this
tactic is designed to increase revenue from web
advertisements
This type of virus, unlike most, only comes into
action when the file containing the virus is
executed. The payload is delivered and then the
virus essentially becomes dormant – it takes no
other action unless an infected file is executed
again.
Most viruses do not use the direct action method
of reproduction simply because it is not prolific,
but viruses of this type have done damage in the
past. The Vienna virus, which briefly threatened
computers in 1988, is one such example of a
direct action virus.
Perhaps the most common type of virus, the file infector
takes root in a host file and then begins its operation
when the file is executed. The virus may completely
overwrite the file that it infects, or may only replace parts
of the file, or may not replace anything but instead re-
write the file so that the virus is executed rather than the
program the user intended.
Although called a “file virus” the definition doesn’t apply
to all viruses in all files generally – for example, the
macro virus below is not referred to by the file virus.
Instead, the definition is usually meant to refer only to
viruses which use an executable file format, such as .exe,
as their host.
A wide variety of programs, including productivity
applications like Microsoft Excel, provide support for
Macros – special actions programmed into the document
using a specific macro programming language.
Unfortunately, this makes it possible for a virus to be
hidden inside a seemingly benign document.
Macro viruses very widely in terms of payload. The most
well known macro virus is probably Melissa, a Word
document supposedly containing the passwords to
pornographic websites. The virus also exploited Word’s
link to Microsoft Outlook in order to automatically email
copies of itself.
While some viruses are happy to spread via one
method or deliver a single payload, Multipartite viruses
want it all. A virus of this type may spread in multiple
ways, and it may take different actions on an infected
computer depending on variables, such as the
operating system installed or the existence of certain
files.
Another jack-of-all-trades, the Polymorphic virus actually
mutates over time or after every execution, changing the
code used to deliver its payload. Alternatively, or in
addition, a Polymorphic virus may guard itself with an
encryption algorithm that automatically alters itself when
certain conditions are met.
The goal of this trickery is evasion. Antivirus programs
often find viruses by the specific code used. Obscuring or
changing the code of a virus can help it avoid detection.
This broad virus definition applies to any virus that inserts
itself into a system’s memory. It then may take any
number of actions and run independently of the file that
was originally infected.
A resident virus can be compared to a direct payload
virus, which does not insert itself into the system’s
memory and therefore only takes action when an infected
file is executed.
Many websites execute complex code in order to provide
interesting content. Displaying online video in your
browser, for example, requires the execution of a specific
code language that provides both the video itself and the
player interface.
Of course, this code can sometimes be exploited, making
it possible for a virus to infect a computer or take actions
on a computer through a website. Although malicious
sites are sometimes created with purposely infected code,
many such cases of virus exist because of code inserted
into a site without the webmaster’s knowledge.
The threat of viruses infecting our computers is a serious matter. Luckily,
the steps for avoiding an infection on your equipment are relatively simple.
1. The first step in preventing infection is by installing anti-virus software
on your all your computers. A good antivirus system will scan your machine
regularly to clean it from any infected files. Some popular antivirus systems
are Norton Antivirus, Panda Antivirus and McAfee. It is advised to NOT
connect to the Internet without AV protection – the cost is well worth it.
Update your anti-virus software regularly. Over 200 viruses are
discovered each month, so you'll want to be protected.
3. WHEN IN DOUBT, THROW IT OUT! Always use caution and do not
open, download, or execute any suspicious files or email attachments. If the
file was in fact legitimate, you can always ask the sender to resend it. Do not
open any files attached to an email
Delete chain emails and junk email. Do not forward or reply to
any to them. These types of email are considered spam, which is
unsolicited, intrusive mail that clogs up the network.
2. Use caution when downloading files from the Internet. Ensure
that the source is a legitimate and reputable one. Verify that an
anti-virus program checks the files on the download site. If you're
uncertain, don't download the file at all.
3. Back up your files on a regular basis. If a virus destroys your
files, at least you can replace them with your back-up copy.
Computer virus

Contenu connexe

Tendances

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..Sid1256
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Assignment of virus
Assignment of virusAssignment of virus
Assignment of virusHuma Tariq
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Computer virus
Computer virusComputer virus
Computer virushrithikjha
 
As computer virus
As computer virusAs computer virus
As computer virusachal bisht
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Virus & Worms(20120628)
Virus & Worms(20120628)Virus & Worms(20120628)
Virus & Worms(20120628)Tejas Kolge
 

Tendances (20)

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Assignment of virus
Assignment of virusAssignment of virus
Assignment of virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
Virus  Virus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Virus & Worms(20120628)
Virus & Worms(20120628)Virus & Worms(20120628)
Virus & Worms(20120628)
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 

En vedette

CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"Mikee Monte de Ramos
 
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...COWCATCHER Publications
 
Health issues of ICT
Health issues of ICTHealth issues of ICT
Health issues of ICTCJ900
 

En vedette (7)

CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Rohan dev
Rohan devRohan dev
Rohan dev
 
Computer virus
Computer virusComputer virus
Computer virus
 
Chemistry pbl
Chemistry pblChemistry pbl
Chemistry pbl
 
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
 
Health issues of ICT
Health issues of ICTHealth issues of ICT
Health issues of ICT
 

Similaire à Computer virus

Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Computer Virus
Computer Virus Computer Virus
Computer Virus bebo
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threatSadaf Walliyani
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 

Similaire à Computer virus (20)

Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Virus
VirusVirus
Virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer virus
Computer virus Computer virus
Computer virus
 

Dernier

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 

Dernier (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Computer virus

  • 1.
  • 2. The term “boot sector” is a generic name that seems to originally come from MS-DOS but is now applied generally to the boot information used by any operating system. In modern computers this is usually called the “master boot record,” and it is the first sector on a partitioned storage device. Boot sector viruses became popular because of the use of floppy disks to boot a computer. The widespread usage of the Internet and the death of the floppy has made other means of virus transmission more effective.
  • 3. This type of virus, which can spread itself in numerous ways including voluntary download, effectively hijacks certain browser functions, usually in the form of re-directing the user automatically to particular sites. It’s usually assumed that this tactic is designed to increase revenue from web advertisements
  • 4. This type of virus, unlike most, only comes into action when the file containing the virus is executed. The payload is delivered and then the virus essentially becomes dormant – it takes no other action unless an infected file is executed again. Most viruses do not use the direct action method of reproduction simply because it is not prolific, but viruses of this type have done damage in the past. The Vienna virus, which briefly threatened computers in 1988, is one such example of a direct action virus.
  • 5. Perhaps the most common type of virus, the file infector takes root in a host file and then begins its operation when the file is executed. The virus may completely overwrite the file that it infects, or may only replace parts of the file, or may not replace anything but instead re- write the file so that the virus is executed rather than the program the user intended. Although called a “file virus” the definition doesn’t apply to all viruses in all files generally – for example, the macro virus below is not referred to by the file virus. Instead, the definition is usually meant to refer only to viruses which use an executable file format, such as .exe, as their host.
  • 6. A wide variety of programs, including productivity applications like Microsoft Excel, provide support for Macros – special actions programmed into the document using a specific macro programming language. Unfortunately, this makes it possible for a virus to be hidden inside a seemingly benign document. Macro viruses very widely in terms of payload. The most well known macro virus is probably Melissa, a Word document supposedly containing the passwords to pornographic websites. The virus also exploited Word’s link to Microsoft Outlook in order to automatically email copies of itself.
  • 7. While some viruses are happy to spread via one method or deliver a single payload, Multipartite viruses want it all. A virus of this type may spread in multiple ways, and it may take different actions on an infected computer depending on variables, such as the operating system installed or the existence of certain files.
  • 8. Another jack-of-all-trades, the Polymorphic virus actually mutates over time or after every execution, changing the code used to deliver its payload. Alternatively, or in addition, a Polymorphic virus may guard itself with an encryption algorithm that automatically alters itself when certain conditions are met. The goal of this trickery is evasion. Antivirus programs often find viruses by the specific code used. Obscuring or changing the code of a virus can help it avoid detection.
  • 9. This broad virus definition applies to any virus that inserts itself into a system’s memory. It then may take any number of actions and run independently of the file that was originally infected. A resident virus can be compared to a direct payload virus, which does not insert itself into the system’s memory and therefore only takes action when an infected file is executed.
  • 10. Many websites execute complex code in order to provide interesting content. Displaying online video in your browser, for example, requires the execution of a specific code language that provides both the video itself and the player interface. Of course, this code can sometimes be exploited, making it possible for a virus to infect a computer or take actions on a computer through a website. Although malicious sites are sometimes created with purposely infected code, many such cases of virus exist because of code inserted into a site without the webmaster’s knowledge.
  • 11. The threat of viruses infecting our computers is a serious matter. Luckily, the steps for avoiding an infection on your equipment are relatively simple. 1. The first step in preventing infection is by installing anti-virus software on your all your computers. A good antivirus system will scan your machine regularly to clean it from any infected files. Some popular antivirus systems are Norton Antivirus, Panda Antivirus and McAfee. It is advised to NOT connect to the Internet without AV protection – the cost is well worth it. Update your anti-virus software regularly. Over 200 viruses are discovered each month, so you'll want to be protected. 3. WHEN IN DOUBT, THROW IT OUT! Always use caution and do not open, download, or execute any suspicious files or email attachments. If the file was in fact legitimate, you can always ask the sender to resend it. Do not open any files attached to an email
  • 12. Delete chain emails and junk email. Do not forward or reply to any to them. These types of email are considered spam, which is unsolicited, intrusive mail that clogs up the network. 2. Use caution when downloading files from the Internet. Ensure that the source is a legitimate and reputable one. Verify that an anti-virus program checks the files on the download site. If you're uncertain, don't download the file at all. 3. Back up your files on a regular basis. If a virus destroys your files, at least you can replace them with your back-up copy.