By Rashmi Ravi: Roll No.66 S.Y.Bcom B'
By Rashmi Ravi: Roll No.66 S.Y.Bcom B'
By Rashmi Ravi: Roll No.66 S.Y.Bcom B'
Contents
What is Computer Virus? History of Computer Virus Types of Computer Virus How it effects on the computer? The methods to eliminate the virus References
A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.
Computer viruses are often spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.
The article describes a fully functional virus written in assembler language for a SIEMENS 4004/35 computer system.
In 1980 Jrgen Kraus wrote his diplom thesis "Selbstreproduktion bei Programmen" (Self-reproduction of programs) at the University of Dortmund. In his work Kraus postulated that computer programs can behave in a way similar to biological viruses.
In 1984 Fred Cohen from the University of Southern California wrote his paper "Computer Viruses - Theory and Experiments". It was the first paper to explicitly call a self-reproducing program a "virus"; a term introduced by his mentor Leonard Adleman.
Types
Resident Viruses:This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc. Examples include: Randex, CMJ, Meve, and MrKlunky.
Direct Action Viruses:The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH.
Overwrite Viruses:-
Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected. Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
Boot Viruses:-
hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk. Examples of boot viruses include: Polyboot.B, AntiEXE.
Macro Viruses:-
Macro viruses infect files that are created using certain applications or programs that contain macros.Example:- Relax, Melissa.A, Bablas, O97M/Y2K.
Directory Viruses:-
Directory viruses
change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus.
Polymorphic Viruses:-
Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. Examples include: Elkern, Marburg, Satan Bug, and Tuareg.
This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out.
Companion Viruses:-
Companion viruses can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they "accompany" the other files that already exist.
FAT Viruses:-
This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored.
Worms:-
A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses.
Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms.
Logic Bombs:-
certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.
Critical files may get deleted automatically, and this can happen periodically or all at once.
Error messages may become prevalent, it may become difficult to save documents, and the computer maybe running slowly than usual.
Scan the computer at regular interval to check if there are any viruses or not. Download any files or data from the trusted sites.
Do not open any document or e-mails which you find suspicious.
References