Вы находитесь на странице: 1из 2

Computer viruses are small software programs that are designed to spread from one

computer to another and to interfere with computer operation. A virus might corrupt or
delete data on your computer, use your e-mail program to spread itself to other
computers, or even erase everything on your hard disk.Computer viruses are often
spread by attachments in e-mail messages or instant messaging messages. That is why
it is essential that you never open e-mail attachments unless you know who it's from
and you are expecting it.Viruses can be disguised as attachments of funny images,
greeting cards, or audio and video files. Computer viruses also spread through
downloads on the Internet. They can be hidden in illicit software or other files or
programs you might download.

1. Resident Viruses This type of virus is a permanent which dwells in the


RAM memory. From there it can overcome and interrupt all of the
operations executed by the system: corrupting files and programs that are
opened, closed, copied, renamed etc.Examples include: Randex, CMJ,
Meve, and MrKlunky.
5. Boot VirusThis type of virus affects the boot sector of a floppy or hard
disk. This is a crucial part of a disk, in which information on the disk itself is
stored together with a program that makes it possible to boot (start) the
computer from the disk.Examples of boot viruses include: Polyboot.B,
AntiEXE.

6. Macro VirusMacro viruses infect files that are created using certain
applications or programs that contain macros. These mini-programs make
it possible to automate series of operations so that they are performed as a
single action, thereby saving the user from having to carry them out one by
one.Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.
9. File InfectorsThis type of virus infects programs or executable files (files
with an .EXE or .COM extension). When one of these programs is run,
directly or indirectly, the virus is activated, producing the damaging effects it
is programmed to carry out. The majority of existing viruses belongs to this
category, and can be classified depending on the actions that they carry
out.
12. Network VirusNetwork viruses rapidly spread through a Local Network
Area (LAN), and sometimes throughout the internet. Generally, network
viruses multiply through shared resources, i.e., shared drives and folders.
When the virus infects a computer, it searches through the network to
attack its new potential prey. When the virus finishes infecting that
computer, it moves on to the next and the cycle repeats itself.
14. Stealth VirusesStealth Viruses is some sort of viruses which try to trick
anti-virus software by intercepting its requests to the operating system. It
has ability to hide itself from some antivirus software programs. Therefore,
some antivirus program cannot detect them.
18. WormsA worm is technically not a virus, but a program very similar to a
virus; it has the ability to self-replicate, and can lead to negative effects on
your system and most importantly they are detected and eliminated by
antiviruses.Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C,
Sobig.D, Mapson.
19. Trojans or Trojan HorsesAnother unsavory breed of malicious code
(not a virus as well) are Trojans or Trojan horses, which unlike viruses do
not reproduce by infecting other files, nor do they self-replicate like worms.

Вам также может понравиться