Académique Documents
Professionnel Documents
Culture Documents
Dela Cruz
BSCS-4A
Types of Viruses and Other Malicious Programs
1. Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From
there it can overcome and interrupt all of the operations executed by the
system: corrupting files and programs that are opened, closed, copied,
renamed etc.
Examples include: Randex, CMJ, Meve, and MrKlunky.
2. Multipartite Viruses
Multipartite viruses are distributed through infected media and usually hide
in the memory. Gradually, the virus moves to the boot sector of the hard
drive and infects executable files on the hard drive and later across the
computer system.
3. Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is
executed. When a specific condition is met, the virus will go into action and
infect files in the directory or folder that it is in and in directories that are
specified in the AUTOEXEC.BAT file PATH. This batch file is always located in
the root directory of the hard disk and carries out certain operations when
the computer is booted.
4. Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information
contained in the files that it infects, rendering them partially or totally
useless once they have been infected.
The only way to clean a file infected by an overwrite virus is to delete
the filecompletely, thus losing the original content.
Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
5. Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a
crucial part of a disk, in which information on the disk itself is stored together
with a program that makes it possible to boot (start) the computer from the
disk.
The best way of avoiding boot viruses is to ensure that floppy disks are writeprotected and never start your computer with an unknown floppy disk in the
disk drive.
Examples of boot viruses include: Polyboot.B, AntiEXE.
6. Macro Virus
Macro viruses infect files that are created using certain applications or
programs that contain macros. These mini-programs make it possible to
automate series of operations so that they are performed as a single action,
thereby saving the user from having to carry them out one by one.
Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.
7. Directory Virus
Directory viruses change the paths that indicate the location of a file. By
executing a program (file with the extension .EXE or .COM) which has been
infected by a virus, you are unknowingly running the virus program, while
the original file and program have been previously moved by the virus.
Once infected it becomes impossible to locate the original files.
8. Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using
different algorithms and encryption keys) every time they infect a system.
This makes it impossible for anti-viruses to find them using string or
signature searches (because they are different in each encryption) and also
enables them to create a large number of copies of themselves.
Examples include: Elkern, Marburg, Satan Bug, and Tuareg.
9. File Infectors
This type of virus infects programs or executable files (files with an .EXE or
.COM extension). When one of these programs is run, directly or indirectly,
the virus is activated, producing the damaging effects it is programmed to
carry out. The majority of existing viruses belongs to this category, and can
be classified depending on the actions that they carry out.
10. Encrypted Viruses
(a)
Act.
6. Cyber-squatting - The acquisition of a domain name over the
internet in bad faith to profit, mislead, destroy reputation, and
deprive others from registering the same, if such a domain name is:
(b)
Computer-related offenses
Content-related offenses
organs or sexual activity, with the aid of a computer system, for favor
or consideration.
2. Child Pornography - The unlawful or prohibited acts defined and
punishable by Republic Act No. 9775 or the Anti-Child Pornography Act
of 2009, committed through a computer system. The penalty to be
imposed shall be (1) one degree higher than that provided for in
Republic Act No. 9775.
3. Unsolicited Commercial Communications - The transmission of
commercial electronic communication with the use of computer system
which seek to advertise, sell, or offer for sale products and services are
prohibited unless:
There is prior affirmative consent from the recipient; or
The primary intent of the communication is for service
and/or administrative announcements from the sender to
and
The commercial electronic communication does not
purposely include misleading information in any part of the
message in order to induce the recipients to read the
message.
4. Libel - The unlawful or prohibited acts of libel as defined in Article 355
of the Revised Penal Code, as amended, committed through a
computer system or any other similar means which may be devised in
the future.
system.
For section 4c3, punishment of arresto mayor or a fine of at least
P500,000 or both.
Corporate liability is equivalent to at least double the fines imposable
in section 7 up to maximum of P10,000,000.
criminal offense and in ensuring the provisions of the law are complied
with.