wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types of Viruses

profile
251 Rizwan Shaikh
Jul 12, 2023
0 Likes
0 Discussions
32 Reads

File Virus: 

This type of virus infects the system by appending itself to the end of a file. It changes the start of a program so that the control jumps to its code. After the execution of its code, the control returns back to the main program. Its execution is not even noticed. It is also called a Parasitic virus because it leaves no file intact but also leaves the host functional.

 

Boot sector Virus: 

It infects the boot sector of the system, executing every time system is booted and before the operating system is loaded. It infects other bootable media like floppy disks. These are also known as memory viruses as they do not infect the file systems. 

 

 

boot sector virus flowchart

 

 Macro Virus: 

Unlike most viruses which are written in a low-level language(like C or assembly language), these are written in a high-level language like Visual Basic. These viruses are triggered when a program capable of executing a macro is run. For example, the macro viruses can be contained in spreadsheet files.

 

Source code Virus: 

It looks for source code and modifies it to include virus and to help spread it.

 

Polymorphic Virus: 

A virus signature is a pattern that can identify a virus(a series of bytes that make up virus code). So in order to avoid detection by antivirus a polymorphic virus changes each time it is installed. The functionality of the virus remains the same but its signature is changed.

 

Encrypted Virus: 

In order to avoid detection by antivirus, this type of virus exists in encrypted form. It carries a decryption algorithm along with it. So the virus first decrypts and then executes.

 

Stealth Virus: 

It is a very tricky virus as it changes the code that can be used to detect it. Hence, the detection of viruses becomes very difficult. For example, it can change the read system call such that whenever the user asks to read a code modified by a virus, the original form of code is shown rather than infected code.

 


Comments ()


Sign in

Read Next

Is Pursuing a Dance Career in India Worth it?

Blog banner

Multiprocessor

Blog banner

Types of email

Blog banner

Virtual memory

Blog banner

operating system

Blog banner

Intrusion Detection System

Blog banner

Constrained Management in IT

Blog banner

Big Data

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Operating System Objectives and Functions

Blog banner

GIS

Blog banner

Life of an army person

Blog banner

NodeJs

Blog banner

Health and fitness in technology

Blog banner

The Sunny Side of Instagram

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

Deadlock and starvation in operating system

Blog banner

Service Design Model

Blog banner

Why Users Leave Your Website in 5 Seconds (And How UI/UX Fixes It)

Blog banner

Virtual Memory

Blog banner

Emailing the merger document

Blog banner

JIRA SOFTWARE

Blog banner

IP Address

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

INTRODUCTION

Blog banner

About myself

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

KAHAWA TEA

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Processes : Process description and control

Blog banner

Starvation

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

RAID

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

DATA WRANGLING

Blog banner

Capacity management in ITSM

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Memory management and virtual memory

Blog banner

Multiple processor scheduling

Blog banner