Skip to main content

Describe the types of viruses.

Computer Virus

Types of viruses


The names of two species of virus in general are particularly noteworthy. Two types are Trojan horse and worm virus-


• Trojan horse virus: This type of virus encourages the computer user to follow the message with some interesting message. By responding to the Trojan virus's call, the computer user is in immediate danger.


• Worm virus: This type of virus gets into the computer like a malicious insect along with any file. Then it attacks the special files of the computer by making automatic copies and enters and disrupts the normal functioning of the computer. Computer viruses can be mainly divided into two categories on the basis of their destructive effect, like:


(i) Program Viruses
(ii) Boot sector virus.


Program virus:
This type of virus adds virus code to the first or last part of the executable file. In this case the number of bytes of the executable file shows more or less than the actual number. In this case, some common words can be noted as extensions at the end of the executable file, such as exe, com, ovl, drv sys etc.


Program virus activities can be divided into two categories, namely--


(a) Direct File Infected Viruses
(b) Indirect file infected viruses.


Boot Sector Virus: This type of virus directly modifies the boot sector of the floppy or hard disk and becomes part of the operating system. The virus first loads into memory. It then replaces the code located in the boot sector and replaces the boot sector with the virus code. When a computer infected with such a virus is turned on, the virus code is first stored in memory and disrupts the normal booting of the computer.


In terms of time, viruses can be divided into three categories:


(i) Instant acting viruses : Attacks of such viruses cause immediate downtime of the computer. Boot sector viruses cause such immediate problems.


(ii) Hierarchical virus : After attacking the computer, this type of virus gradually dominates the computer system and at one time paralyzes the normal functioning of the computer.


(iii) Time Bomb Virus : This type of virus hides in the computer for a long period of time. Then come alive on a certain day and damage the computer, such as Jerusalem B virus, CIH virus.





Comments

Popular posts from this blog

What should the processor look at?

The things that we all should keep an eye on are the processor or not; 1. Clock speed 2. Number of course 3. cache memory 4. FBS 1. Clock Speed: It is also called GH2. All processors are written on. Clock speed means how fast your computer can work. That's what this signal means. The speed of the processor is known through this clock speed, how fast the calculation can be done. 2. Number of Cores: The more cores the processor has, the faster the processor can work. If I give an example to explain the matter, I hope you can understand it very easily. Suppose if a person had many hands, then he could do many things at the same time. That is, if we go to the market and buy a smartphone, then we will see what the configurations of the phone are. If we look closely at the configuration of the smartphone, we will see that Dual Core Processor, Quad Core Processor, Octa core processor, Hexa core processor, Deca core processor. This means that the dual core processor has two arms or cores, ...

How to create a google account from a Android mobile?

 I don't believe a long introduction. I don’t want to bore you.  Today I will teach how to create a google account very flexibly from an android device.  Firstly open a browser like Opera, Firefox, Google Chrome or any other it doesn't matter in that and then type create a Gmail account or  click here After clicking here then click on  create an account  option. Write here your first name and last name exactly. Then write an email address uniquely which did not use in the network or google database. After completing the write a unique email address subsequently you will write a password like  @hga34#@ !. This password format is very effective and efficient against brute force or any other intelligence attack. Now click on the next button  Select your country from here      Enter your mobile number in the orange colour selected blank field. Now enter a recovery email address in the selected field. Anytime if your email address passwo...

What is transmission media? Introduction to different types of data transmission cables

Transmission media: When a PC communicates or wants to communicate with another PC, it has to take the help of some transmission media. The most commonly used media in the network are twisted pair cable, coaxial cable, fiber optic cable. Nowadays, the use of optical fiber is increasing greatly. Radio wave, microwave and infrared technologies are prominent among wireless media. Among these mediums, optical fiber has the highest data transfer speed. The type of medium used in a network depends on the type and location of that network. The connection system for exchanging information between the sender and the remote receiving end is called a channel. The means or methods used to implement the channel are called media. such as-- (i) Cable or wire. (ii) Common telephone lines. (ii) Radio waves. (iv) Microwave. (v) Geo-satellite systems etc. Cable or Wire: Cable is an important medium in data communication. Cables are generally used for data transfer over short range networking such as LAN...