wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types of Viruses

profile
251 Rizwan Shaikh
Jul 12, 2023
0 Likes
0 Discussions
32 Reads

File Virus: 

This type of virus infects the system by appending itself to the end of a file. It changes the start of a program so that the control jumps to its code. After the execution of its code, the control returns back to the main program. Its execution is not even noticed. It is also called a Parasitic virus because it leaves no file intact but also leaves the host functional.

 

Boot sector Virus: 

It infects the boot sector of the system, executing every time system is booted and before the operating system is loaded. It infects other bootable media like floppy disks. These are also known as memory viruses as they do not infect the file systems. 

 

 

boot sector virus flowchart

 

 Macro Virus: 

Unlike most viruses which are written in a low-level language(like C or assembly language), these are written in a high-level language like Visual Basic. These viruses are triggered when a program capable of executing a macro is run. For example, the macro viruses can be contained in spreadsheet files.

 

Source code Virus: 

It looks for source code and modifies it to include virus and to help spread it.

 

Polymorphic Virus: 

A virus signature is a pattern that can identify a virus(a series of bytes that make up virus code). So in order to avoid detection by antivirus a polymorphic virus changes each time it is installed. The functionality of the virus remains the same but its signature is changed.

 

Encrypted Virus: 

In order to avoid detection by antivirus, this type of virus exists in encrypted form. It carries a decryption algorithm along with it. So the virus first decrypts and then executes.

 

Stealth Virus: 

It is a very tricky virus as it changes the code that can be used to detect it. Hence, the detection of viruses becomes very difficult. For example, it can change the read system call such that whenever the user asks to read a code modified by a virus, the original form of code is shown rather than infected code.

 


Comments ()


Sign in

Read Next

LiquidPlanner

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Article on Team Work

Blog banner

Fashion marketing in india

Blog banner

Importance of modern technology era

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Virus

Blog banner

The Golden Temple , Amritsar

Blog banner

Evolution of Operating Sytems

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

VPN

Blog banner

Security issues

Blog banner

PROCESS STATE:

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Operating system

Blog banner

Smitten Kitchen Keepers

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

File Allocation Methods

Blog banner

Security Issues

Blog banner

Optimization of operating system design

Blog banner

Modern OS

Blog banner

What is Influencer Marketing and its Trends

Blog banner

Apple

Blog banner

Virtual memory

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Flipkart

Blog banner

Best password managers: Reviews of the top products

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Marvel Cinematic Universe

Blog banner

Population

Blog banner

Security issues

Blog banner

Scala - a programming tool

Blog banner

Processing Crime and Incident Scenes

Blog banner

Memory managment

Blog banner

Deadlock in Operating System

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Importance of business process documentation

Blog banner

Mobile Security

Blog banner