Tuesday 17 May 2011

CRITERIA FOR VIRUS

A program can be called as a virus if they meet the minimum 5 following criteria:
1.  The ability to obtain information
2.  The ability to check a file
3.  The ability to replicate and transmit themselves
4.  The ability to manipulate
5.  The ability to hide themselves.
Now will try to explain briefly what is meant from each ability is and why it is needed.
1.  The ability to obtain information
In general, a virus requires a list of the names of files in a directory.  For what?  So that he can get a list of files that can he tulari.  For example, the macro virus will infect all the data files MS Word, will find a list of files ending in *. doc.  This is where the ability to gather the information necessary for the virus to create a list / data of all files, then sort them by looking for files that can be infected.  Normally this data is created when the file is infected / infected with a virus or a program file virus itself was opened by the user.  The virus will immediately undertake to collect data and put it (usually) in RAM, so when the computer is turned off all the data is lost.  But these data will be created again each time the virus is activated.  Normally this data is also stored as hidden files by virus.
2.  The ability to check a program
A virus must also be able to check a file to be infected, for example, he served infect program extensions *. doc, then he should check whether the document files have been infected or not, because if it is, will be useless menularinya again.  This is very useful to enhance the ability of a virus in terms of speed of infecting a file / program.  Commonly done by the virus is to have / give a mark on a file / program that has infected so easy to recognize by the virus.  Examples of such labeling is to provide a unique byte in every file that has been infected.
3.  The ability to multiply
If this is indeed a virus "bang-get", that is, without this ability is not a virus.  The core of the virus is the ability mengandakan itself by infecting other files.  A virus if it has found a candidate
victim so she would recognize him with a look.  If not infected then the virus will begin transmission action by writing the byte identifiers on the file, and so on mengcopikan / write virus code object above the target file.  Some common ways that done by the virus to infect / reproduce itself are:
a.  Infected files to be deleted or renamed.  Then created a file containing the virus program itself using the original file name.
b.  Virus programs that have been executed / loaded into memory will directly infect other files by riding all existing files.
4.  Their ability to manipulate
Routine (routine) owned by a virus will be executed after the virus infects a file.  The contents of this routine can range from harmless to doing vandalism.  This routine is generally used to manipulate files or even popularizing the creators!  This routine use of the ability of an operating system (Operating System), which has the same ability to those of the operating system.  For example:
a.  Create a picture or message on the monitor
b.  Replacing / changing the label of each file, directory, or labels from the drive on your PC
c.  Manipulate file infected
d.  Damaging files
e.  Disrupting the work printer, etc.
5.  The ability to hide themselves
The ability to hide it should be owned by a virus for all the good work from the beginning to the success of transmission can be accomplished.
The usual steps are:
- Program viruses are stored in coded form and machines combined with other programs that are considered useful by the user
- Program Boot Record virus or placed on tracks on the disk that is rarely noticed by the computer itself
- Program viruses are made as short as possible, and the infected file is not changed in size
- The virus does not change the description / information when a file is

No comments:

Post a Comment