To further refine our knowledge about the virus, I will try to give an explanation of the types of viruses that often roam in the general population.
1. Macro Virus
This strain must have been very often we hear. The virus is written in the programming language of an application rather than with the programming language of an Operating System. This virus can start if the constituent applications to run well. For example if on mac computers run applications Word, the macro virus created from Word macro language to work on this Mac computer operating system.
Examples of viruses:
- Varian W97M, eg W97M.Panther
The length of 1234 bytes, akanmenginfeksi normal.dot and infect the document when opened.
- WM.Twno.A; TW
The length of 41,984 bytes, will infect documents Ms.Word that use macro languages, usually with extension *. DOC and *. DOT
2. Boot Sector Virus
Boot sector viruses are spread is very common. This virus multiplies in, will remove or replace the original boot sector with boot virus program. Thus, whenever booting the virus will be loaded into memory and then the virus will have the ability to control the standard hardware (eg monitors, printers, etc.) and from this memory is also the virus will spread to all drives and are connected to the computer (eg, floppy, drive other than drive c:).
Examples of viruses:
- Variant virus wyx
ex: wyx.C (B) infects the boot record and floppy;
Length: 520 bytes;
Characteristics: memory resident and encrypted.
- Varian V-sign:
Infect: Master Boot Record;
The length of 520 bytes;
Characteristics: living in the memory (memory resident), encrypted, and polymorphic)
- Stoned.june 4th / bloody!:
Infect: Master Boot Record and floppy;
The length of 520 bytes;
Characteristics: living in the memory (memory resident), encrypted and displays the message "Bloody! June
3. Stealth Virus
This virus will dominate the DOS interrupt table that often we are familiar with "Interrupt interceptor". The virus is capable to control the DOS level instructions and usually they are hidden as its name either full or size.
Examples of viruses:
- Yankee.XPEH.4928,
Infect files *. COM and *. EXE;
The length of 4298 bytes;
Characteristics: living in memory, ukurantersembunyi, has a trigger
- WXYC (which includes any category because the boot record into stealth kategri also included here), an infected floppy motherboot record;
The length of 520 bytes;
Characteristics: living in the memory; size and hidden viruses.
- Vmem (s):
Infect files *. EXE, *. SYS and *. COM;
Fie 3275 bytes long;
Characteristics: living in memory, the size of a hidden, encrypted.
- Etc.
4. Polymorphic Viruses
The virus is designed to make misleading antivirus program, meaning the virus is always trying to avoid being recognized by antivirus in a way is always changing its structure change after each infected files / programs.
Examples of viruses:
- Necropolis A / B,
Infect files *. EXE and *. COM;
The length of the file 1963 bytes;
Characteristics: living in memory, the size and viruses hidden, encrypted and is subject to change structure
- Nightfall,
Infect files *. EXE;
The length of the file 4554 bytes;
Characteristics: living in memory, the size and hidden viruses, has a trigger, terenkripsidan can change the structure
- Etc.
5. Virus Files / Program
This virus infects files that can be executed directly from the operating system, be it a file *. EXE, *. COM and usually also the result of infection from this virus can be identified by changing the file size is attacked.
6. Multi Partition Virus
This virus is a combination of boot sector viruses and file viruses. This means that the work performed resulted in two, that he can infect files *. EXE or *. COM and also infect the boot sector.
No comments:
Post a Comment