wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types of Viruses

profile
251 Rizwan Shaikh
Jul 12, 2023
0 Likes
0 Discussions
32 Reads

File Virus: 

This type of virus infects the system by appending itself to the end of a file. It changes the start of a program so that the control jumps to its code. After the execution of its code, the control returns back to the main program. Its execution is not even noticed. It is also called a Parasitic virus because it leaves no file intact but also leaves the host functional.

 

Boot sector Virus: 

It infects the boot sector of the system, executing every time system is booted and before the operating system is loaded. It infects other bootable media like floppy disks. These are also known as memory viruses as they do not infect the file systems. 

 

 

boot sector virus flowchart

 

 Macro Virus: 

Unlike most viruses which are written in a low-level language(like C or assembly language), these are written in a high-level language like Visual Basic. These viruses are triggered when a program capable of executing a macro is run. For example, the macro viruses can be contained in spreadsheet files.

 

Source code Virus: 

It looks for source code and modifies it to include virus and to help spread it.

 

Polymorphic Virus: 

A virus signature is a pattern that can identify a virus(a series of bytes that make up virus code). So in order to avoid detection by antivirus a polymorphic virus changes each time it is installed. The functionality of the virus remains the same but its signature is changed.

 

Encrypted Virus: 

In order to avoid detection by antivirus, this type of virus exists in encrypted form. It carries a decryption algorithm along with it. So the virus first decrypts and then executes.

 

Stealth Virus: 

It is a very tricky virus as it changes the code that can be used to detect it. Hence, the detection of viruses becomes very difficult. For example, it can change the read system call such that whenever the user asks to read a code modified by a virus, the original form of code is shown rather than infected code.

 


Comments ()


Sign in

Read Next

Juveniles, Internet and Computer Crime

Blog banner

RAID

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

How Cyber Forensics use in AI

Blog banner

Artical on FreshBooks

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Data Security must be your Priority!

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

Multiple processor scheduling

Blog banner

Network Forensics Tools and Techniques

Blog banner

A Short History of GIS

Blog banner

Outlook.com

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Memory management

Blog banner

Mail merge

Blog banner

Education?

Blog banner

Banaras

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Understanding E-mail Servers

Blog banner

computer security

Blog banner

Way to make your meal healthier.

Blog banner

What is a geographic information system (GIS)?

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

Women Empowerment

Blog banner

Importance of education

Blog banner

The most common internet security threats

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Fault Tolerance

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

RAID_142

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Security Breaches in Stock market trading

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Measuring IT Risk

Blog banner

What is Virtual Memory

Blog banner

Threats To Computer System

Blog banner

Operating system

Blog banner

Session Vulnerabilities

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner