Now a
day’s virus became a part and parcel of our community, each and every device is
infected with some kind of virus. Some might be a threat and some might not
have the potential to cause any harm. So, here is the list of some virus
that are little bit famous
Resident Virus:
A resident virus hides and stores itself within the system and infects
any file that is run by the computer, depends on the way it was programmed.
Examples:
Jerusalem Virus, One-half virus, Magistr, Junkie, Satanbug etc.
Multipartite
Virus:
A multipartite virus infects and spreads into boot sectors mainly. It
is a fast-moving virus that uses
file infectors or boot infectors to attack the boot sector and executable files
simultaneously at a great speed.
Examples:
VCL.428 etc.
Direct
Action Virus:
Direct action virus replicated its self and then spreads as an infection whenever the code
is executed. Certain conditions have to be followed for the virus to be
executed. The virus is set
into action and begins to infect files in the
directory or folder it's located in.
Overwrite Virus:
An overwriting virus after infection, will effectively destroy the
original program code, typically by overwriting data in the system's memory.
Examples:
TRj.reboot virus.
Boot virus:
Boot sector
viruses operate by replacing a hard disk’s boot sector writing
copies of code that are triggered to run every time a user tries to reboot the
system, or run a particular software program.
Examples:
Michelangelo and Stoned virus.
Macro Virus:
It is a virus
that is written in the same macro language that is used for software
applications, most often Microsoft office application like Microsoft Word and
Excel. The macros are automatically activated when these documents are opened
because the macro language is embedded in documents. This is also the same way
macro viruses work opening and closing a document. Macro viruses are among the
more difficult viruses to detect; learn more about them below.
Examples:
Melissa virus (This virus when opened in WORD the computer gets infected and
then the virus sends itself by email to the first 50 persons in their address
book hence infecting others)
Directory virus:
Directory virus is also known as a
“cluster” virus that infects your files not by changing the file or planting
extra files but by changing the DOS directory information so that directory
entries point to the virus code instead of the actual program.
Examples:
DIR-2 etc.
Polymorphic Virus:
A polymorphic virus is a harmful,
destructive or intrusive type of malware that can change or "morph"
making it difficult to detect with antimalware programs. It is a self-encrypted
virus. Upon infection, the polymorphic virus duplicates itself by
creating usable, albeit slightly modified, copies of itself.
Examples:
The 1260 virus, The Dark Avenger Mutation Engine (MtE), 32-Bit Polymorphic
Viruses etc.
Encrypted virus:
A virus using encryption to hide
itself from virus scanners. That is, the encrypted virus rearranges the program
code to make it hard to detect. An encrypted virus's code begins with a
decryption algorithm and continues with encrypted code. Each time it infects,
it automatically encodes itself differently, so its code is never the same.
Through this method, the virus tries to avoid detection by anti-virus software.
Examples: Cascade on DOS, W95/Mad.2736 Virus,
W95/Silcer etc.
Companion virus:
A companion virus is a
computer virus that stores
itself in a file that is named similar to another program file that is commonly
executed. When that file is executed, the virus will infect the computer or perform
malicious steps such as deleting the files on your computer hard drive.
Examples:
Globe virus (1992)
Non-Resident
Virus:
A non-memory-resident virus or non-resident
virus, when executed, scans the disk for targets, infects them, and then exits.
Examples:
All Executables Viruses.
Stealth Virus:
A stealth virus is a computer virus
that uses various mechanisms to avoid detection by antivirus software.
Generally, stealth describes any approach to doing something while avoiding
notice.
Examples:
Rootkits.
Fat Virus:
A FAT virus can be rather dangerous as it infects a vital
part of the computer's operational process. When infected with fat virus
it can use permanent data loss and can overwrite directories and can prevent
access to certain sections on the hard drive.
Examples:
Casino, Alabama, Brain etc.
========== Hacking Don't Need Agreements ==========
Just Remember One Thing You Don't Need To Seek Anyone's To Hack Anything Or Anyone As Long As It Is Ethical, This Is The Main Principle Of Hacking Dream
Thank You for Reading My Post, I Hope It Will Be Useful For You
I Will Be Very Happy To Help You So For Queries or Any Problem Comment Below Or You Can Mail Me At Bhanu@HackingDream.net
No comments:
Post a Comment