Vous êtes sur la page 1sur 36

Different Types of

Computer Viruses

There are Different Types of


Computer Viruses could be
classified in :
Origin
Techniques
Types of file they inject
Where they hide
The kind of damage they cause
The type of operating system or
platform they attack

Computer Virus
Is a kind of malicious software written
intentionally to enter a computer without
the users permission.
Is has an ability to replicate itself and
continuing to spread.

Most common type of


computer viruses are:

1. Resident Viruses
This type of virus is a permanent which
dwells in the RAM memory.
It can overcome ant interrupt all the
operations executed by the system.
Corrupting files and programs that are
opened, closed, copied, renamed etc.

2. Direct Action Viruses


The main purpose of this virus is to
replicate and take action when it is
executed.
When a specific condition is met, the virus
will go into action and infect files in the
directory or folder that is in and in
directories that are specified in the
AUTOEXE.BAT file path.

3. Overwrite Viruses
It is characterized by the fact that it
deletes the information contained in the
files that it infects, rendering them partially.
The only way to clean the file infected by
an overwrite virus is to delete the file
completely, thus losing the original
content.

4. Boot Virus
This type of virus affects the boot sector of a
floppy or hard disk.
This is a crucial part of a disk, in which
information on the disk itself is stored together
with a program that makes it possible to start the
computer from the disk.
The best way of avoiding boot viruses is to
ensure that floppy disk are write-protected and
never start your computer with an unknown
floppy disk in the disk drive.

5. Macro Virus
It infects files that are created using
certain applications or programs that
contain macros.
It impossible to automate series of
operation so that they are performed as a
single action, thereby saving thee users
from having them out one by one.

6. Directory Virus
It change the paths that indicate the
location of a file by executing a program
which has been infected by a virus.
Ones infected it impossible to locate the
original files.

7. Polymorphic Virus
It encrypt or encode themselves in a
different way every time they infect a
system.
This make impossible for anti-viruses to
find them using strip or signature searches
and also enables them to create a large
number of copies of themselves.

8. File Infectors
This type of virus infects program or executable
files.
When one of these programs is run, directly or
indirectly, the virus is activated, producing the
damage effects it is program to carry out.
The majority of existing viruses belong to this
category and can be classified depending on the
action that they carry out.

9. Companion Viruses
It can be considered file infector viruses
like resident or direct action types.
They are known companion viruses
because once they get into the system
they accompany the other files that
already exist.

10. FAT Virus


The file allocation table or FAT is a part of
a disk used to connect information and is
a vital part of the normal functioning of the
computer.
This type of virus attack can be specially
dangerous by preventing access to certain
section of the disk where important files
are stored.

11. Worms
This is a program very similar to a virus; it
has the ability to self-replicate, and lead to
negative effects on your system and most
important they are detected and eliminate
by anti-viruses.

12. Logic Bombs


They are not considered viruses because
they do not replicate.
They are not even programs in their own
right but rather camouflage segments of
other programs.

13. Trojans or Trojan Horses


Another unsavory breed of malicious code
which unlike viruses do not reproduce by
infecting other files, nor do they selfreplicate like worms.
Their objective is to destroy data on the
computer once certain conditions have
been met.

Adware, Spyware and Hijackware

Adware
Programs that pop-up various
advertisements and offers, often based on
the website you visit.
These ads are independent from pop-up
windows that appear when visiting
specific sites.

Spyware
Are programs designed to track all of your
computer activities, from which application
you use to which website you visit.
They often work in conjunction with
viruses to record your key strokes and
transmit them back to a host.

Hijackware
This software allow someone else to
control your computer.

Spam and Phishing

Spam
Is unsolicited electronic mail.

Phishing
A malicious spam designed to lure people
into providing confidential personal and
financial information. This information is
then use to empty accounts and for identity
theft.

Keep Software Up-to-Date


An updated software fix the problems with
the original code, such as bugs and
security holes.
A large percentage of recent viruses take
advantage of such flaws, and millions of
needless infections have occurred
because patches that been available for
months were never applied.

Attachment Caution
Never open an e-mail attachment if youre
not sure what it is, and colleagues may not
actually be safe. Some viruses will send
themselves to everyone in an email
address book, while others will make it
look like the message is coming from a
random address book entry,

Firewall
Another way to protect your computer
from intruders is through the use of a
firewall, which will limit back-door access
to computer by other computers on the
network.

Password
Password help to protect your computer
from unauthorized use, and your various
accounts from unauthorized access, which
turn help protect your confidential
documents and information.
Password must be harder to figure out but
easy for you to remember.

Anti-Spyware/Adware Software
Removes of significant number of
spyware/adware items, and will therefore
reduce the number of pop-up ads you get
and will help eliminate those programs
designed to spy on your computing and
internet activities.

Surf Smart
Regular empty cache, cookies and history.
The cache stores copies of pages you visit
and all files associated with them.
Cookies contains username and password
information for certain sites.

Safer Online Shopping


You should use the outmost caution when
shopping on-line.
Shop only on sites that offer secure check
out, check the company reviews from
other costumers, and even consider
paying a little more from a better known
and more trusted site.

Wired vs. Wireless


Wireless connection offer about the same
security as cell phones, so if someone is
out there listening they could capture the
information you transmit.
Wireless is fine for basic surfing but for
maximum protection, you should connect
to standard wired networked.

Computer Safety Hazards

Gas from computers and other


sources
One source of this gas is the plastic
components; most plastic are unusable
and break down naturally over time.
People who have been sensitized may
react to even small amount of this gas by
getting headaches, dizziness and
respiratory problems etc.

Laser Printer and breathing


problem
Laser printer emit a lot of toner dust, which
contains carbon and solvent.
NCR paper or carbonless paper can also
cause wheeziness.

Monitors and Headaches


Radiation is well known problem.
More radiation is emitted by the back of
the monitor than the screen.
Another is headache produced by the
almost invisible flicker of the monitor as
the image on screen is refreshed.

Carpal tunnel Syndrome and


repetitive motion injury
is a median entrapment neuropathy that
causes paresthesia, pain, numbness, and
other symptoms in the distribution of
the median nerve due to its compression
at the wrist in the carpal tunnel.

Vous aimerez peut-être aussi