Types of computer viruses

Types of computer viruses





1. Virus Compiler, a virus that has been compiled so that it can be executed directly. This is a virus that first appeared in the computer world, and is experiencing rapid development now. These first Virs are very difficult to eradicate because they are made in low language, assembler. Indeed this language is suitable for making viruses but it is very difficult to use it. The advantage of this virus is that it can do almost all manipulations, which cannot always be done by other types of viruses because they are more limited. Cara Memperbaiki Hardisk Eksternal Yang Tidak Terbaca


2. Bagle BC virus, this virus is one of the types of viruses that are dangerous and have been ranked as the type of virus that most quickly affects our computers. A few hours after the release of this virus, there were already 2 Bagle variants (Bagle BD and BE) that spread through e-mail, computer networks and P2P applications. This virus is spread by e-mail with a variety of different subjects. According to a study of Panda Bagle BC virus, this infiltrated e-mail with subjects including: Re :, Re: Hello, Re: Hi, Re: Thank you, Re: Thanks. The attachments also vary, including: .com, .cpl, .exe, .scr. The BC Bagle virus is also able to stop working antivirus programs.


2. Virus File, is a virus that uses files that can be executed / executed directly. Usually * .EXE or * .COM files. But it can also infect * .SYS, * .DRV, * .BIN, * .OVL and * .OVY files. This type of virus can move from one media to all types of storage media and spread on a network.
> 3. System Virus, or better known as the Boot virus. Why is that because this virus uses files that are used to make a computer system. Often found on floppy disks / storage areas without our knowledge. When going to use the computer (restart), then this virus will infect the Master Boot Sector and the System Boot Sector if the infected diskette is on a diskette drive / storage area.


4. Boot Sector Virus, a virus that utilizes relationships between computers and storage places for the spread of viruses. If on the boot sector there is a program that is able to spread itself and be able to stay in memory as long as the computer works, the program can be called a virus. The boot sector virus is divided into two, namely viruses that attack diskettes and viruses that attack diskettes and partition tables.


5. Dropper virus, a program that is modified to install a computer virus that is the target of an attack. after it is installed, the virus will spread but Dropper will not spread. Dropper can be a file name like Readme.exe or through Command.com which becomes active when the program runs. One Dropper program can have several types of viruses.


6. Virus Script / Batch, this virus was originally known as the batch virus as it used to be in a batch file in DOS. Viruses are usually often obtained from the Internet because of the advantages that are flexible and can run when we play the internet, this type of virus usually hitching on HTML files (Hype Text Markup Language) is made using script facilities such as Javascript, VBscript, 4 or a combination of scripts that activate the Active-X program from Microsoft Internet Explorer.


7. Macro Virus, a virus made by utilizing modular programming facilities on an application program such as Ms Word, Ms Excel, Corel WordPerfect and so on. Although this virus is contained in certain applications but the danger posed is no less dangerous than other viruses.


8. Polymorphic virus, can be said to be a smart virus because viruses can change their structure after carrying out tasks so that it is difficult to detect by Antivirus.


9. Stealth Virus, this virus uses smart ways, namely by modifying the file structure to hide additional program code in it. This code allows viruses to hide themselves. All kinds of other viruses also use this code. The file sizes do not change after the virus infects the file.


10. Virus Companion, this type of virus looks for * .EXE files to create a * .COM file and copy it to put the virus. The reason is that the * .COM file runs before the * .EXE file.


11. Worm, this is a program that is parasitic because it can duplicate itself. However, worms do not resemble viruses because they do not infect other computer programs. Therefore, worms are not classified as viruses. Mainframe is a type of computer that is often attacked by worms. It spreads to other computer through a network. In its development, the Worm experiences a “genetic mutation” so that in addition to making a new file, it will try to attach itself to a file, this is commonly called a Hybrid virus.


12. Hybrid virus, this virus is a virus that has two capabilities can usually enter the boot sector and can also enter the file. One example of this virus is the Mystic virus made in Indonesia.


13. Trojan horse, also called Trojan horse. Trojans infect computers through files that seem harmless and usually seem to do something useful. But eventually the virus become dangerous, for example, formatting the hard drive.


14. Backdoor Alnica, this dangerous virus is one type of Trojan Horse virus. It is one of the backdoor viruses that if it successfully infects a computer it will be able to access remotely and retrieve all information desired by the attacker. Operating systems that were attacked by the virus include: Windows 200, Windows 95, Windows 98, Windows Me, Windows NT and Windows XP. This virus measures 57,856 bytes


15. Trojans on Linux. Red Hat Linux users are expected to be careful of PATCHs sent via e-mail with the address “security@redhat.com” because it is actually not a patch security but a Trojan virus that can disrupt the security system. Warning e-mails from Red Hat are usually sent from the address “secalert@redhat.com” and digitally signed. This virus has also attacked the Windows security system in 2003 with subjects offering security solutions. 

May be useful . .

Leave a Reply

Your email address will not be published. Required fields are marked *