wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types of Viruses

profile
251 Rizwan Shaikh
Jul 12, 2023
0 Likes
0 Discussions
32 Reads

File Virus: 

This type of virus infects the system by appending itself to the end of a file. It changes the start of a program so that the control jumps to its code. After the execution of its code, the control returns back to the main program. Its execution is not even noticed. It is also called a Parasitic virus because it leaves no file intact but also leaves the host functional.

 

Boot sector Virus: 

It infects the boot sector of the system, executing every time system is booted and before the operating system is loaded. It infects other bootable media like floppy disks. These are also known as memory viruses as they do not infect the file systems. 

 

 

boot sector virus flowchart

 

 Macro Virus: 

Unlike most viruses which are written in a low-level language(like C or assembly language), these are written in a high-level language like Visual Basic. These viruses are triggered when a program capable of executing a macro is run. For example, the macro viruses can be contained in spreadsheet files.

 

Source code Virus: 

It looks for source code and modifies it to include virus and to help spread it.

 

Polymorphic Virus: 

A virus signature is a pattern that can identify a virus(a series of bytes that make up virus code). So in order to avoid detection by antivirus a polymorphic virus changes each time it is installed. The functionality of the virus remains the same but its signature is changed.

 

Encrypted Virus: 

In order to avoid detection by antivirus, this type of virus exists in encrypted form. It carries a decryption algorithm along with it. So the virus first decrypts and then executes.

 

Stealth Virus: 

It is a very tricky virus as it changes the code that can be used to detect it. Hence, the detection of viruses becomes very difficult. For example, it can change the read system call such that whenever the user asks to read a code modified by a virus, the original form of code is shown rather than infected code.

 


Comments ()


Sign in

Read Next

Interrupts in operating system.

Blog banner

Emailing the merger document

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

Save Environment

Blog banner

E-Governance

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Amazon

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

How to Grow Your Brand on YouTube Without a Big Budget

Blog banner

File Management

Blog banner

PPT methodology

Blog banner

URL vs Domain

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Time Series Analysis

Blog banner

Spyware

Blog banner

Ola

Blog banner

How To Secure Operating Systems ?

Blog banner

Visualization in Data Science

Blog banner

Memory Management

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Memory Management

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Types of threads

Blog banner

Virtual Machine

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

VIRTUAL MACHINE

Blog banner

Lucidchart

Blog banner

File management -disha parekh

Blog banner

Importance Of Blockchain

Blog banner

Love is in air.....

Blog banner

File management In Operating System

Blog banner

How Preschool Annual Day Shapes Confidence, Emotions, and Growth

Blog banner

Python as a tool for data analysis

Blog banner

I/O Buffering

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner