Tweet





Share

Computer Virus

AppId is over the quota
AppId is over the quota

Sometime the term computer virus is used to describe a logic bomb in which a piece of unauthorized code acts as a parasite that attaches it self to a host program during a copy operation. Like their biological counterparts computer viruses reproduced and spread; copy commands embedded in the virus code to make, it reproduce and transmit commands may be inserted to spread the virus from one computer to the other on its network. Unfortunately, viruses are common in today's, computer system and the potential problems they may cause must be addressed. In 1992, the potential problems became even worse. Professional computer viruses fighters were outraged by the publication of the book that contain the source code heeded to create potentially destructive viruses, plus coupons for floppy disk containing executable virus program.

To be able to analyze and remove viruses from the computer system you need to ascertain its type some of the types have been discussed below:

Macro Viruses

Developing Viruses

Boot Sector Viruses

Macro Viruses:

Macro virus is the first virus to infect the data files, rather than executable. Macro viruses infects the files in the form of macro or OLE objects and are easier to write than "traditional" files viruses which are mostly written in assembly code. Today many applications have macro languages, so the problem is a growing one. Macro viruses spread by people sending infected files to each other, entirely innocently, either on floppy disk, or via the internet LAN, or via an external e-mail system.

Many applications provide the functionality to create macros. A macro is a series of commands to perform some application specific task. Macros are designed to make, life easier like automating some everyday tasks, for instance, doing calculations. Macros can be saved as a series of keystrokes; or they can be written in some macros languages.

Developing Viruses:

Some viruses are badly written and "lose" their own macros. The original virus may consist of the set (Auto Open, File Save, and File Save As), if the replicates via Auto Open, the complete macro set will be preserved. However, if the user invokes File (Save As), the virus will fail to copy the File Save macro. The resulting virus set (Auto Open, File. Save As) is known as developed Macro and original virus is developing.

Boot Sector Viruses:

Once of the most common kind of viruses are boot sector viruses, for example. Form and Stoned. These viruses infected the floppy disks in either of the following parts:

Master Boot Record (MBR)

Partition Sector of the DOS Boot Record (DBR)

DOS Boot sector of hard disks

The following examples shows how a boot sector virus spreads: you have got a floppy disk with data on it, perhaps some page maker file. This is part of a project that you are doing jointly with a classmate. What your classmate does not know is that his computer is infected with a boot sector virus and therefore, so is the disk that has been sent to you. You put the disk in drive A: and start using these files. So far, the virus has not done anything. But when you finish for the day, you switch off the computer and go home. The next day, you come and switch on. The floppy disk is still in drive A. so the computer is trying to boot up from there. It loads the first sector into memory and executes it, or if it cannot find DOS on the disk, tells you: "Not a system disk, please press any key to continue". Everyone has seen this message numerous times.


SOURCE : click here


Get New Article Alerts In Your Inbox

Subscribe to Computers Knowledge Article Alerts to get daily notifications of our newest articles in your email for free. You can unsubscribe at any time. share your opinion about Computer Virus by comment on below post.

 

Thank you in advance.

Yours sincerely,

suyanto-signature


Bookmark to: Technorati   Bookmark to: Del.icio.us   Bookmark to: Google   Bookmark to: Yahoo   Bookmark to: Blinklist   Bookmark to: Digg   Bookmark to: Reddit

Related Posts :



0 komentar:

Posting Komentar

Categories

10100Mbps 156Inch 240GB 256MB 28GHz 2x120GB 384019003 412786001 418872001 419107001 463552003 519329002 5Port 608425002 608425003 609939001 7270FW 7Inch 80211g 920002555 about Access Accreditation Accreditations Accurate accused Acquires Adapter AdapterPower Advantage Advisor adware against Agency Alien Allows Altering Amazon AmericanStatesman AMZAZING Android Announce Announces Anyone appealDemocrat Apple arrested article Assessments Atlantic Atrix Attain Audio Austin Automation AutoMDIX Backlinks Bagleheads Barranco Based basics batteries Because Being Believe Benefits Better Black BlackBerry Bloomberg Bookmarking Books Boost Bottom Braces Bradleyaposs break bride Briefcase Brilliant bring browsing Budget Business businesses Busters Cable calculate Calculators Career Carrier CCCHSA0DSU01 CDROM CDRWDVD Certification Certifications change Changed charge Chatting cheap chest chips Choices Christian Clarksville Class Cleaner Clear Clearly clinical close cloud Combo coming commerants Common Commtouch companies Company Completely Computer ComputerActivecouk computers Computerworld computing ConceivablyTech Concept Connection Consumerization consumers Contemporary control Converter Cosmetic Costs could Courses CrossPlatform Cyber Cyberwar Dalvik daughter decision defpro Demystifying Dentistry dependency Depth design Desktop desktops destroy device devices Dewalt Diamond different digital Disable Dispatch disrupted documents domainB download Downs Droid DVDROM DWave Dwelling early Edgar Edition Education effective efficient Electronic Electronics Eliminate Elimination Elysium Embrace Enables engine engineer Ensure enyoy Eradicate escape Ethernet every exactly Examinations Excel expands Experts exploring extends Extension F7553D350 Facebook Factor faire Features Feeder Files Finest Finish Firefox Firewall first Flash Flyer Forbes Framework Freeze Freezes Friday function Fundamentals funding Fusion Gamers Games Gaming GDDR2 Geekzone Gerrit Getting GigaOm Globes Goodbye Google Googleaposs Government Gradual grande Greatest Guide hampel Hannspad Hannspree Harry hazard Heights hello Helps Herald Heres Hershey HewlettPackard Hints Homage homes hosting Huawei Huffington iCloud Immersion Imperio Importance Imports incarnate Increase India Industry infected infringement Inquirer Insider Inspire Instant Intel Intellectual intelligent InterinetSkim International Internet introducing Invest investigative iPhone Isnapost jargon joins Journal journalism Keyboard Kindle Kingston laptop laptops Laser Latest launches Leader leaks Learned Leelee Lessons Level Leveling Levels Lexington Lexmark Liliputing Limited Lindhurst Linksys LockheedMartin Logitech LogMeIn Lunch Magazine maintenant majorit majority Making malware management Managers Managing Manner Market Marketing MarketWatch Marketwire MctiviaFrom MD1024SD1333 Meadows media memory Menus Micro microSD Microsoft Midnight Might Million Minneapolis Mk550 Mobile Modern Module Monday Money Monitor Mortgage Mostly Mouse moving Mozilla MrExcelLiveLessons msnbccom MSPmentor mtiers Mueller Myths Needed Network networks newly NewsChannel Nextgov Nokia NoniPadTablet notebook Novel observer Office online Operating Optical OPTIMA optimization Oracle Ordinateurs Organization organizations ORourke outsource overtake Pages PanDigital Paperback Parents Particulars patents Payday Paying PC2700 people People percent perform Performance Permanently Personal Pfizer Philadelphia philippines Phillip phone PHOTOS Pinball Planning plans PocketCloud Pogoplug Points Polkast Popular Popularity Ports Potter Power PowerPoint Precaffeine press prices printing prints Produkt Professional Professionals Profitable Program promise promised Promote Property Prospects Protect prototype proven Provider public publishing punching purchasing purported Qosmio Qualification Qualifications quality Quarter quick Quickly Radeon rapidrelease Razer ready Reasons recall recovery Reflecting regarding register Registry relation release releases Relevance reliable Remote remotely Remove Reorganizes Replica Replication Reports Residence Restore restores Results Retail revealed Reviewed revolution right Ripping Rocket roots Router Running Samsung SanDisk Sapphires School schools Science Score Screen SDC2GB SDSDB8192A11 seamless search Seattle Second security Seeks Selling Sensation Sense Service services Setting Seven Short Shouldnt signs Sites sketches SlashGear Small smart Smartphone smartphones Smiles Smooth SN10T1 Sobieski Social Software solution Someones something Sorts Sound Spanish SPDIF special Specialists specs Spectacular Speed Sphere Spiralbound Spyware square StarTechcom Starting state Stealth SteelSeries Steve Stock Stocks Story Streaming Street student students Studies Superior supplier SupplyCord support surfing Switch Switcher system systems Table tablet tablets tagged Taiwan Tamas TE100S5 TechCrunch Techniques technology Tests Texts thefts Their Thinking THINTOS10 Threats Through Times TimesLeader timing Today Toshiba Toslink Total touch Toward transform Trend TRENDnet Trends trial Tribune Trust Turbine turbo Turning Tutorial Twitter Typical Ultimate Ultra understand Undertake Unique university Unveils Unwired Upgrade Upload Users Using Utica Value Vampire version Video Videonow Videos virus voice Warcraft Warrior Washington Watches Webcam WebOS Website websites wedding Weddings welcomes which White Wholesale Wilkes Window Windows Windowscompatible Wireless Wisdom Wizard Working World Worth Wrong X8300455NBK Xigmatek Yearold young yourself YouTube

 
Your Ad Here