TYPES OF VIRUSES AND PART WHICH THEY INFECT
- Get link
- X
- Other Apps
There are many viruses which affect your device and these viruses are not easy to detect if you don’t have an antivirus installed in your device. Different viruses affect your device in different ways. Let’s look at the destination where these viruses stay and which part they affect the most.
Here are few viruses:
Ø Executable File Infectors: these
viruses reside in the memory of the computer and infect executable files with
extensions, so that it continues to infect other executables. They can remain
in memory for a long time after being activated. These viruses are believed to
be overwrite viruses, as they corrupt the file where it is located.
Ø Direct Infectors: the
infected program must be running for the virus to function, that is, to
continue infecting and carry out its destructive actions.
Ø Memory Resident Infectors: the
infected program does not need to be running, the virus lodges in memory and
remains resident infecting each new program executed and executing its
destructive routine.
Ø Boot Sector Infectors: the
boot sector is that contains the specific information regarding the disk format
and the data stored on it. This boot sector contains a program called Boot
Program, which is in charge of executing the disk and searching and activating
the operating system files on the disk. If this program cannot find the files,
it is because it is affected by boot sector viruses. In this way, every boot
disk, and failing that, the entire computer is infected; however, in some
cases, it is necessary to replace the infected sector with an original boot
sector due to the infection. The virus becomes activated when you turn on your
device.
Ø Macro viruses: they
are the most popular viruses today. They are not transmitted in executable
files, but through the documents of the applications that have some type of
macro language. They are application specific and cannot infect other
executable files, such as Microsoft Word, Microsoft Excel, Microsoft Power
Point, and Microsoft Access. When some of these files are opened or closed, the
virus takes control and copies itself to the base template of new documents so that
the rest of the files that are opened or created in the future are infected.
Ø From Actives Agents and Java Applets:
these are small programs that are recorded on the user's hard drive when it is
connected to the Internet and are executed when the Web page on which it is
browsing requires it, being a way of executing routines without having to
consume the width of the band. These viruses access the hard drive through a
WWW connection so that the user does not detect them. They can be programs to
delete, corrupt files, control memory and send information to a certain Syrian
Web.
Ø From HTML: it is
a more efficient infection mechanism than the previous one. By including code
in HTML files and simply connecting to the Internet, any file that contains
this format can become infected and run the virus. This type of virus is
developed in Visual Basic Script, attacking users of Windows 98, 2000, and the
latest versions of Explorer. It can delete or corrupt files.
Ø Trojan / Works: these
are programs that imitate useful programs or execute some kind of apparently
harmless action, but that in a hidden way executes the harmful code from the
user. They are designed in such a way that the content is disseminated by the
user himself and not for reproduction. They can also be programmed so that once
it reaches its objective it destroys everything.
So, to keep your device safe
from all these viruses and keep your device in healthy and working position you
should be using an antivirus
which fights with all the viruses and is capable of giving you complete
security focusing on all the parts of your device.
- Get link
- X
- Other Apps
Comments
Post a Comment