A computer virus is a relatively small program that attaches itself to data and program files before it delivers its malicious act. There are many distinct types of viruses and each one has a unique characteristic. Viruses are broken up into to main classes, file infectors and system or boot-record infectors.
A file infector attaches to ordinary programs usually affecting .COM and .EXE files. These two files are subject to infection though some can infect any program from which execution is requested. On the other spectrum, system or boot-record infectors infect executable codes found in certain system areas on a disk, which are not ordinary files.
Not only are there two main classes of viruses, but there are also many different types. A virus can be classified as a boot sector virus, a program virus, a trojan horse virus, a macro virus, a memory resident virus, a stealth virus, or a polymorphic virus.
A boot sector virus replaces the startup code on a disk with a modified version, which is loaded into the memory when the computer is started.
Program viruses attach to legitimate program files. After attachment the program file will then intercept the program’s execution and take control of the computer system.
Trojan horse viruses are also legitimate programs that are advertised as something desirable, but are actually something that is undesirable. It performs an unauthorized destructive act on your computer when executed. They received their name from the mythical Trojan Horse that was delivered to the gates of the city Troy.
Macro viruses are written in macro language of specific computer programs, such as Word or Excel. These viruses infect files when a program document is accessed, or triggered by user actions, such as certain keystrokes or menu choices.
Memory resident viruses hide in memory and are difficult to detect. When the virus is in memory it will infect any uninfected file that is executed.
A stealth virus hides their presence. They can infect a program by adding bytes to the infected file. It then subtracts the directory entry of the infected file by the same number of bytes. This gives the impression that the file’s size has not changed, therefore, antiviral programs can not detect them through these changes.
Polymorphic viruses modify their appearance and scramble their code periodically. This allows them to replicate so that none of its copies are the same.
These viruses also all have different characteristics.
At the Aim Higher College there have been recently discovered malware on the campus systems that are due to many recent attacks. I used an Anti-virus protection software called AVG on the computer systems on campus and ran a whole computer scan. The results came back very quick of numbers of malware being high and medium priorities that these should not be taken lightly. Furthermore, the scan found many viruses, Trojans, and malicious software and applications.
This virus searches for a new vulnerable host in order to survive and carry the disease to the next victim. The critical aspect around the spread of a virus is how drastically the reproduction process occurs. Without being controlled, the contamination throughout any species causes the spread to take place in a toxic way, “On day one, there were two people. And then, four, and then, sixteen. In three months, it’s a billion.
The word virus comes from the Latin word, poison. A virus infects a cell and into it, inserts its DNA. The virus then multiplies inside the cell and when enough of the virus has been produced, the newly formed viruses will break out into the body of the host, destroying the cell in the process. Variola major and Variol...
Beal, V. (2011, March 29). The difference between a computer virus, worm, and Trojan horse.
The hanta virus is not a new foe to humanity. This mysterious and sometimes fatal disease has plagued humanity for over 1000 years. This virus, most likely originating in China over 1000 years ago, is transmitted by human contact with mice. Only relatively recently has the hanta virus captured the attention of the United States. Although the hanta virus has been known for such a long time, there is little known about the virus. In the United States most cases are found in the southwestern part of the country, although cases have been reported from all four corners of the country. Recently, there have been successful tests done on prospective vaccines for the hanta virus. Despite this, strains of the hanta virus kill many people a year for lack of an effective medicine or vaccine (www.pharminfo.com).
Latency is the property shared by some viruses which allows them to persist indefinitely in
Viruses have majority nonliving characteristics with little to none living characteristics. They do not have a cellular organization, metabolism,
Malware could be defined as several different objects such as worms, viruses, Trojans, or blended, so I’m going to compare malware to a car manufacturer. There are countless models that a car manufacturer makes, so it would be difficult to distinctly describe, Ford as solely a truck or sedan company. We know manufactures make several types of different vehicles. Let’s get back to malware and let me give you an example.
Malware is short for "malicious software”. It is a software installed (usually without someone’s knowledge) to disrupt computer operation, gather information, or gain access to private computer systems. Malware can appear in the form of a code, a script, an active content or other software’s. Once malware enters a computer it is capable of basically spying any actions that are taken using that computer. Any internet surfing, typing in your passwords by observing every keystroke, stealing personal information and identities, reading the emails that are received or sent through the computer, hijacking your browser to web pages that ‘phish’ for your personal information, and a variety of other invasive tactics are used by the ha...
Malware can survive in a number of ways say different sizes, shapes and also the purpose ranging from viruses to spyware and to bots. Malware in general is classified into two types. They are the concealing malware and infectious malware. In case of infectious malware, the malware code is said to spread all over which means that the software code shall replicate from one user to another and this goes on. In infectious malware, we need to consider two cases, which are called the viruses and the worms. Viruses are termed as the software that has executables within itself and causes the executables to spread when it is run. The second case called worms is a software which infects a computer and then spreads to others.
What is the “MALWARE”? A malware refers to software programs designed to damage or do other unwanted actions on a computer system. In Spanish, "mal" is a prefix that means "bad," making the term "bad ware" .Malware includes viruses, worms, Trojan horses, and spyware. Viruses, for example, can cause havoc on a computer's hard drive by deleting files or directory information. Spyware can gather data from a user's system without the user knowing it. This can include anything from the Web pages a user visits to personal information, such as credit card numbers.
A virus infects files that already exist on systems. They are not standalone programs. It is designed to wreak havoc on a computer and spread itself from one file to another, then from computer to computer. (“What Are Viruses, Worms, and Trojan Horses?”) Computer worms are like viruses as they replicate themselves, but worms can replicate themselves over a computer network.
Malicious software in short known as Malware. It is also known as computer Contaminant. Similar to biological parasite, malware also reside in a Host. Malware will get installed on host without user’s consent. Generally a software is considered malware based on the intent of the creator...
Virus is one of the most common malware. Unlike spyware, virus is largely designed to harm useful programs or wreck down an entire operating system. There are many ways through which virus may enter a computer. The most common way is via email attachments. A...
Malicious code, also known as malware, installed on a computer provides an attacker with the control over this machine. Therefore, malware can be defined as “a set of instructions that run on your computer and make your system do something that an attacker wants to do”. It is more common to see malicious code to be implemented in binary executable files. However, it can be implemented in almost any computer language. Attackers have used a huge number of scripting languages, word processing macro languages and a h...