wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types of Viruses

profile
251 Rizwan Shaikh
Jul 12, 2023
0 Likes
0 Discussions
32 Reads

File Virus: 

This type of virus infects the system by appending itself to the end of a file. It changes the start of a program so that the control jumps to its code. After the execution of its code, the control returns back to the main program. Its execution is not even noticed. It is also called a Parasitic virus because it leaves no file intact but also leaves the host functional.

 

Boot sector Virus: 

It infects the boot sector of the system, executing every time system is booted and before the operating system is loaded. It infects other bootable media like floppy disks. These are also known as memory viruses as they do not infect the file systems. 

 

 

boot sector virus flowchart

 

 Macro Virus: 

Unlike most viruses which are written in a low-level language(like C or assembly language), these are written in a high-level language like Visual Basic. These viruses are triggered when a program capable of executing a macro is run. For example, the macro viruses can be contained in spreadsheet files.

 

Source code Virus: 

It looks for source code and modifies it to include virus and to help spread it.

 

Polymorphic Virus: 

A virus signature is a pattern that can identify a virus(a series of bytes that make up virus code). So in order to avoid detection by antivirus a polymorphic virus changes each time it is installed. The functionality of the virus remains the same but its signature is changed.

 

Encrypted Virus: 

In order to avoid detection by antivirus, this type of virus exists in encrypted form. It carries a decryption algorithm along with it. So the virus first decrypts and then executes.

 

Stealth Virus: 

It is a very tricky virus as it changes the code that can be used to detect it. Hence, the detection of viruses becomes very difficult. For example, it can change the read system call such that whenever the user asks to read a code modified by a virus, the original form of code is shown rather than infected code.

 


Comments ()


Sign in

Read Next

Mumbai

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

Guidelines for a low sodium diet.

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

Threads and concurrency

Blog banner

Man In The Middle Attack

Blog banner

The Difference Between Plaque and Tartar Explained Simply

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

USPS mail

Blog banner

10 Reasons to date your best friend

Blog banner

Design Considerations for Disk Cache Management

Blog banner

objectives and functions of operating system

Blog banner

File management

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

WORKFRONT SOFTWARE

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Bots and Cyber Security

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Busted : Common Web Security Myths

Blog banner

M commerce

Blog banner

Self-love: Being the reason of your own smile

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Message Passing in OS

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

MENDELEY

Blog banner

Search Marketing In 2026: From Keywords To Credibility And User Intent

Blog banner

Importance of Website

Blog banner

Memory Management in an Operating System

Blog banner

PROCESS STATE:

Blog banner

Student Grade Calculator in LISP

Blog banner

Music

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

ProofHub

Blog banner

AI and Cyber Security

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner