• WELCOME IN MY SITE

    Types of Viruses General


    Types of Viruses General
    Today many types of variations circulating viruses, most of which can be grouped into six general categories, each of which is a little different kind of how it works:
    • Boot-sector virus: replacing or inserting itself into the boot-sector-an area on your hard drive (or any other disk) to be accessed when the computer is first turned on. This type of virus can hinder your computer to boot from the hard disk.
    • Virus files: infects the application. This virus to spread itself to execute the application and documents associated with it when the infected file is opened or executed.
    • Macro Virus: written using simplified macro programming language, and Microsoft Office applications, such as Word and Excel, and currently estimated at 75 percent of this strain has spread across the world. A document infected with a macro virus generally modifies existing commands and widely used (such as the "Save") to trigger its payload when the command completes.
    • Virus multipartite: infect both files and boot-sector-criminals impersonate a double which can infect your system continuously before being captured by the antivirus scanner.
    • Virus Polymorphic: will change the code itself when passed on a different machine; This type of virus is theoretically more difficult to be detected by antivirus scanners, but in reality this type of virus is not well written, so it is easy to unknown.
    • Stealth Virus: hides himself by making an infected file seems not infected, but the virus of this type are rarely able to deal with the latest antivirus scanners.

    All Evil Code (Malicious Code) is not virus

    One misperception in the computer community is bad other electronic code, such as worms and Trojan horse applications is a type of virus. They are not viruses. Worms, Trojan horses, and viruses in the category of large-called analysts as "malicious code".
    A worm will replicate itself and into the network connections to infect every machine on the network and then replicate itself back, taking the hard disk space and slowing down the computer and network. However, the worm does not change or delete other files.
    A Trojan horses do not replicate themselves, but he is in the form of a malicious program that is disguised as another format such as a screen saver or image files. When executed on your machine, a Trojan horse will take the information from your system-such as user names and passwords-or can create a malicious hacker to take over your computer remotely (from a distance).

    Emergency Call Answering Antivirus Software

    Experts virus has recorded about 40,000 types of virus and its variants over the years, though only 200 species are currently active in the wilds of the computer. While most viruses more just annoying and spend our time, from the very merusaklah types that are dangerous to health [computer and your bag].
    Computer viruses have been around since 1960, since the beginning of the computer era, even up to the range of 1980 they mostly only specimens in the computer lab, created by researchers and released in a controlled environment to evaluate their effects.
    When the virus was first discovered on the surface in the 1980s, the spread they are very slow and move through a "network of smugglers": through floppy disks are sold and shared between computers. But with the advent of the Internet and e-mail access to the accelerated spread of the virus.
    Two years ago, starting with the advent of LoveLetter Melissa virus, the virus spread through e-mail continues to increase so that the ratio of ordinary computer users face the virus was getting bigger. E-mail virus now occupies the top spot where he took 81 percent portion causes the virus infected computer and can spread into the system in a matter of minutes.

    Practice Using Computer In Safe

    The best way to protect yourself [er, computer] you of the virus is if you have a connection to the Internet, do not open e-mail attachments from strangers and avoid downloading from sources that are not clear. Resist the temptation you to double-click on the contents of your mailbox. And when you receive a file attachment and you do not ask, ask the sender about the attachment contents and how to use it before it opened.
    To tighten security, you need to install antivirus scanning software that is reliable and always download updates regularly. Major antivirus software vendors, such as Symantec, Network Associates, Computer Associates, and Kaspersky Lab, providing regular updates (for the record Computer Associates InoculateIT is a free antivirus software). Some vendors also offer regular updates through their company's Web site.
    Regular updates are very important. The researchers from Computer Economics estimates that 30 percent of small businesses are particularly vulnerable to the dangers of the virus and it is because they do not update their antivirus software regularly or they do not menginstalasikannya correctly.

    How it Works Antivirus Software

    Antivirus software scans the contents of a computer hard drive in two ways. If there is a known virus (the virus that has been known to exist and antidotes have been found), the software will look for the signature (sign) virus is a unique string of bytes virus program that identifies the virus as a fingerprint-and will dispose of the system you. Most scanning software are not only looking for early type virus, but also can search for variants of the virus, because the virus signature code is usually similar.
    In the case of a new virus that has not found its antidote, the antivirus software will run a program that will search heuristic virus-like activity on your system. When the program saw no symptoms of anything wrong, it will quarantine the troubled program and will display a warning message to you about what will be done by the program (eg change your Windows registry). If you and the software feel that the program is a virus, you can send the quarantined files on the antivirus software vendors to analyze, determine the signature, name it and put it in the catalog, and sends its antidote. The virus is now a known virus.
    If the virus does not appear anymore-it often occurs because the virus is not well written for distributed-vendor would categorize it as a dormant virus (viral sleep). But most viruses spread like an earthquake: Spreading the beginning is always accompanied by subsequent events. Variants of the virus (viral tracing the spread of the virus that emerged after the first) will increase the number of viruses that exist.
    An example is when the Melissa virus LoveLetter appeared in the United States, the variant-VeryFunnyJoke-direct appears in a while, followed by more than 30 other types within two months later. And not all variants derived from the mysterious author of the program. Some companies had been infected by a virus variant that spread by its own employees who curiously against viruses that they are received, create variants, and release it in their company's computer system-sometimes by accident, sometimes you really want to do it