Anda di halaman 1dari 7

Computer

viruses

Computer
viruses

Computer viruses are small software programs that are designed to spread from
one computer to another and to interfere with computer operation.
Like a biological virus, a computer virus is something you don't want to get.
Computer viruses are small programs or scripts that can negatively affect the
health of your computer. These malicious little programs can create files, move
files, erase files, consume your computer's memory, and cause your computer not
to function correctly. Some viruses can duplicate themselves, attach themselves to
programs, and travel across networks. In fact opening an infected e-mail
attachment is the most common way to get a virus.

A computer virus is a program or piece of code that is loaded onto your computer
without your knowledge and runs against your wishes. Viruses can also replicate
themselves. All computer viruses are man-made. A simple virus that can make
a copy of itself over and over again is relatively easy to produce. Even such a
simple virus is dangerous because it will quickly use all available memory and
bring the system to a halt. An even more dangerous type of virus is one capable of
transmitting itself across networks and bypassing security systems.

Different types of viruses


There are different types of viruses which can be classified according to their
origin, techniques, types of files they infect, where they hide, the kind of damage
they cause, the type of operating system, or platform they attack. Let us have a
look at few of them.
Memory Resident Virus

These viruses fix themselves in the computer memory and get activated whenever
the OS runs and infects all the files that are then opened.
Hideout: This type of virus hides in the RAM and stays there even after the
malicious code is executed. It gets control over the system memory and allocate
memory blocks through which it runs its own code, and executes the code when
any function is executed.
Target: It can corrupt files and programs that are opened, closed, copied,
renamed, etc.
Examples: Randex, CMJ, Meve, and MrKlunky
Protection: Install an antivirus program.
Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is executed.
When a specific condition is met, the virus will go into action and infect files in the
directory or folder that are specified in the AUTOEXEC.BAT file path. This batch file
is always located in the root directory of the hard disk and carries out certain
operations when the computer is booted.
Find First/Find Next technique is used where the code selects a few files as its
victims. It also infects the external devices like pen drives or hard disks by copying
itself on them.
Hideout: The viruses keep changing their location into new files whenever the
code is executed, but are generally found in the hard disk's root directory.
Target: It can corrupt files. Basically, it is a file-infecter virus.
Examples: Vienna virus
Protection: Install an antivirus scanner. However, this type of virus has minimal
effect on the computer's performance.
Overwrite Viruses
A virus of this kind is characterized by the fact that it deletes the information
contained in the files that it infects, rendering them partially or totally useless
once they have been infected.
Hideout: The virus replaces the file content. However, it does not change the file
size.
Examples: Way, Trj.Reboot, Trivial.88.D
Protection: The only way to clean a file infected by an overwrite virus is to delete
the file completely, thus losing the original content.
However, it is very easy to detect this type of virus, as the original program
becomes useless.
Boot Sector Virus
This type of virus affects the boot sector of a hard disk. This is a crucial part of the
disk, in which information of the disk itself is stored along with a program that
makes it possible to boot (start) the computer from the disk. This type of virus is
also called Master Boot Sector Virus or Master Boot Record Virus.
Hideout: It hides in the memory until DOS accesses the floppy disk, and whichever
boot data is accessed, the virus infects it.
Examples: Polyboot.B, AntiEXE
Protection: The best way of avoiding boot sector viruses is to ensure that floppy

disks are write-protected. Also, never start your computer with an unknown floppy
disk in the disk drive.
Macro Virus
Macro viruses infect files that are created using certain applications or programs
that contain macros, like .doc, .xls, .pps, .mdb, etc. These mini-programs make it
possible to automate series of operations so that they are performed as a single
action, thereby saving the user from having to carry them out one by one. These
viruses automatically infect the file that contains macros, and also infects the
templates and documents that the file contains. It is referred to as a type of e-mail
virus.
Hideout: These hide in documents that are shared via e-mail or networks.
Examples: Relax, Melissa.A, Bablas, O97M/Y2K
Protection: The best protection technique is to avoid opening e-mails from
unknown senders. Also, disabling macros can help to protect your useful data.
Directory Virus
Directory viruses (also called Cluster Virus/File System Virus) infect the directory of
your computer by changing the path that indicates the location of a file. When you
execute a program file with an extension .EXE or .COM that has been infected by a
virus, you are unknowingly running the virus program, while the original file and
program is previously moved by the virus. Once infected, it becomes impossible to
locate the original files.
Hideout: It is usually located in only one location of the disk, but infects the entire
program in the directory.
Examples: Dir-2 virus
Protection: All you can do is, reinstall all the files from the backup that are infected
after formatting the disk.
Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using
different algorithms and encryption keys) every time they infect a system. This
makes it impossible for antivirus software to find them using string or signature
searches (because they are different in each encryption). The virus then goes on
to create a large number of copies.
Examples: Elkern, Marburg, Satan Bug and Tuareg
Protection: Install a high-end antivirus as the normal ones are incapable of
detecting this type of virus.
Companion Viruses
Companion viruses can be considered as a type of file infector virus, like resident
or direct action types. They are known as companion viruses because once they
get into the system they 'accompany' the other files that already exist. In other
words, to carry out their infection routines, companion viruses can wait in memory
until a program is run (resident virus), or act immediately by making copies of
themselves (direct action virus).
Hideout: These generally use the same filename and create a different extension
of it. For example: If there is a file "Me.exe", the virus creates another file named
"Me.com" and hides in the new file. When the system calls the filename "Me", the
".com" file gets executed (as ".com" has higher priority than ".exe"), thus infecting
the system.
Examples: Stator, Asimov.1539 and Terrax.1069
Protection: Install an antivirus scanner and also download Firewall.

FAT Virus
The file allocation table (FAT) is the part of a disk used to store all the information
about the location of files, available space, unusable space, etc.
Hideout: FAT virus attacks the FAT section and may damage crucial information. It
can be especially dangerous as it prevents access to certain sections of the disk
where important files are stored. Damage caused can result in loss of information
from individual files or even entire directories.
Examples: Link Virus
Protection: Before the virus attacks all the files on the computer, locate all the files
that are actually needed on the hard drive, and then delete the ones that are not
needed. They may be files created by viruses.
Multipartite Virus
These viruses spread in multiple ways possible. It may vary in its action depending
upon the operating system installed and the presence of certain files.
Hideout: In the initial phase, these viruses tend to hide in the memory as the
resident viruses do; then they infect the hard disk.
Examples: Invader, Flip and Tequila
Protection: You need to clean the boot sector and also the disk to get rid of the
virus, and then reload all the data in it. However, ensure that the data is clean.
Web Scripting Virus
Many web pages include complex codes in order to create an interesting and
interactive content. This code is often exploited to bring about certain undesirable
actions.
Hideout: The main sources of web scripting viruses are the web browsers or
infected web pages.
Examples: JS.Fortnight is a virus that spreads through malicious e-mails.
Protection: Install the microsoft tool application that is a default feature in
Windows 2000, Windows 7 and Vista. Scan the computer with this application.
Worms
A worm is a program very similar to a virus; it has the ability to self-replicate and
can lead to negative effects on your system. But they can be detected and
eliminated by an antivirus software.
Hideout: These generally spread through e-mails and networks. They do not infect
files or damage them, but they replicate so fast that the entire network may
collapse.
Examples: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson
Protection: Install an updated version of antivirus.
Trojans
Another unsavory breed of malicious code are Trojans or Trojan horses, which
unlike viruses, do not reproduce by infecting other files, nor do they self-replicate
like worms. In fact, it is a program which disguises itself as a useful program or
application.
Beware of the fact that these viruses copy files in your computer (when their
carrier program is executed) that can damage your data, and even delete it. The
attacker can also program the trojans in such a manner that the information in
your computer is accessible to them.

Logic Bombs
They are not considered viruses because they do not replicate. They are not even
programs in their own right, but rather camouflaged segments of other programs.
They are only executed when a certain predefined condition is met. Their objective
is to destroy data on the computer once certain conditions have been met. Logic
bombs go undetected until launched, the results can be destructive, and your
entire data can be deleted!
Viruses Affecting Palm OS
The initial launch of Palm OS in 1996 and then the stable release in 2007 made
way for attackers to write new malicious codes. The viruses known till date that
affect this type of OS are:
"Liberty" Crack: It is a Trojan horse that deletes all your files and applications from
your PDA.
PEMagic: It allegedly deletes the ROM.
Phage: It deletes your files.
Vapor: It deletes your files.
With all said and done, there is no real threat to your PDAs as regards to virus
attacks. There is still no evidence showing the amount of damage these viruses
can cause.
Viruses Affecting Symbian OS
Symbian OS also has no proven virus threats. The only virus that is said to affect
the smartphones is the Cabir virus. However, this virus runs in the background and
drains the battery power. The fact that these viruses spread via Bluetooth has also
proven to be a myth.
Read more at Buzzle: http://www.buzzle.com/articles/different-types-of-computerviruses.html
How to Prevent from Virus ?
To help avoid computer viruses, it's essential that you keep your computer current
with the latest updates and antivirus tools, stay informed about recent threats, run
your computer as a standard user (not as administrator), and that you follow a few
basic rules when you surf the Internet, download files, and open attachments.
Once a virus is on your computer, its type or the method it used to get there is not
as important as removing it and preventing further infection.
We all know it's hard enough to get a computer to work well when it is healthy, let
alone when it has been attacked by a virus. Therefore, it is better to prevent an
attack than to try and cure it. There are many antivirus programs available that
scan incoming files for viruses before they can cause damage to your computer.
Some of these programs include Norton AntiVirus, McAfee VirusScan, and Virex.
It is a good idea to have one of these programs on your computer to prevent a
virus attack. It is also important to update your virus definitions file at least once a
month so that your anti-virus program can check for all the latest viruses. It's a lot

like having a glass of orange juice every morning it keeps your computer's
immune system strong and healthy.
Removing a computer virus or spyware can be difficult without the help of
malicious software removal tools. Some computer viruses and other unwanted
software reinstall themselves after the viruses and spyware are detected and
removed. Fortunately, by updating the computer and by using malicious software
removal tools, you can help permanently remove unwanted software.
Do not open unknown attachments in emails or do a virus scan after
opening them. (If you get an email from a person that contains one or more
viruses, the viruses may infect files in the computer. The viruses might also send
emails to people from your email address book or email folders automatically).
Download files only from trusted sites. If you download a program or a data
file from the Internet or other shared networks, viruses might be transferred to
your computer. Sometimes the free software programs on the Internet have
viruses especially if you are downloading from sources such as Torrent or Usenet
newsgroups.
Remember to do a virus scan for them after peripheral devices are
connected to your computer. The devices such as MP3 players, USB thumb
drives, memory cards or CD drives are also means of spreading viruses.

Tips for computer security and to prevent viruses


You must run quality security software on your computers to protect your work and
private data from viruses, spyware, and other security threats. When it comes to
security, there is no substitute for quality. See below our recommended
quality solutions. If any of the following is difficult for you, get an IT Expert to do it
for you. You must do the following or risk all of your work/data being compromised
(think of it as locking your front door):

1. Get good anti virus software e.g. one of the below.


Recommended anti virus software:
- AVG - Our most recommended Antiv Virus software.
- Norton Anti virus
- McAffee Anti Virus
- Sophos Anti Virus
Be sure to regularly update your 'virus definitions' e.g. once per week
Install a quality Firewall
There are many firewalls available, some good, some bad. Our
recommendation is the FREE ZoneAlarm. They provide a paid version with extra
tools (of course), but we think the free firewall-only option is fine. Its getting
harder on their site to see the free one (so look carefully!). At time of writing,
go here, scroll down and click the free option. If the above link doesn't work,
start looking from the Zone Alarm front page.

Install an anti-spyware application


There are many available, some good, some bad. Our recommendation is
the FREE: Spybot - Search & Destroy. Download here, and find Spybot info
here.
Email Attachments: BEWARE OF ATTACHMENTS. Do not open email attachments you
are not expecting. Viruses come with some very nasty messages to trick you into opening
the attachement e.g. "Your email account has been cancelled, see attachment for details".
Even worse, the virus looks like it comes from an email address you recognise e.g. from
admin@yourDomain.com (where 'your domain' is the domain name that you use). Virus
attachments can have the following 'file extension': .exe, .pif. If you receive a .zip
attachment and open it - make sure it doesn't contain a file with one of those extensions. Do
not open attachments you haven't requested, even if they appear to be from people you
know.

Anda mungkin juga menyukai