https://invisiblesecurity.blogspot.com/ https://knowledgeanitivirus.blogspot.com/ https://easydatasolutionshere.blogspot.com/ https://anitvirusecurity.blogspot.com/ Tech-Talk: FORMS OF VIRUSES & ANTIVIRUS

FORMS OF VIRUSES & ANTIVIRUS

 

FORMS OF VIRUSES & ANTIVIRUS

What is an Antivirus?

An antivirus is a program with which it is possible to protect a computer against most viruses, worms, Trojans, among other invaders that are unwanted and that have been designed to infect computers.

They are characterized by being advanced programs that are not exclusively dedicated to detecting viruses, but rather take on the task of blocking them, disinfecting files that have been modified and preventing new infections.

Antivirus classification

·         Preventive Antivirus - They are characterized by being in charge of warning before an infection occurs. In general, this is a type of antivirus that is present in the computer's memory, monitoring each of the actions and functions of the system.

 

·         Antivirus identifiers - These are those whose objective is to identify programs that can infect the computer and therefore affect the system. On the other hand, they also track specific code sequences that may be linked to viruses.


·         Decontamination Antivirus - They are similar to identifier antivirus, but in this case their specialty lies in decontaminating a system that has already been infected, due to the action of malicious programs. In this case, the main objective is for an operating system to be as it was at startup.

Forms of computer viruses

There are many types of computer viruses that can be identified today, so it is important to know them, in order to improve the defense of the devices:

 

1.    Worm or computer worm - It is a type of malware that is characterized by staying in the memory of the computer and that is duplicated in it without the user intervening in the process. They typically consume a lot of bandwidth or system memory.

 

2.    Trojan horse - It is a class of computer virus that hides in a legitimate program, so that when it is executed it begins to damage the computer. To a large extent it affects the security of the PC so that it is completely defenseless and in turn capture information that is sent to other sites, such as passwords.

 

3.    Logic or time bombs - They are characterized by being activated once a specific event occurs. You can think of a combination of certain keys or a particular date. In case the fact does not happen, the virus will simply remain hidden.

 

4.    Hoax - They do not have the ability to reproduce on their own and the truth is that they are not true viruses. In reality, they are messages with content that is not true and that ends up encouraging the user to forward the information to the contacts. Normally, these fake viruses seek to overload the flow of information through emails and networks.


5.    Link - They are viruses that modify the addresses through which the computer is accessed through which it resides. In that sense, they make it impossible to locate the files that have been stored.


6.    Overwriting - They are computer viruses that cause the loss of the content of the files they attack. This happens because it overwrites the previous one.


7.    Resident - It is a virus that remains in memory and waits for the user to run a file or programs in order to infect it.


8.    Boot Sector Viruses - They lodge in the hard drive's boot sector, a crucial part of the disk that is needed for the computer to boot from the hard drive.


9.    Macro viruses - They infect files using applications or programs that contain macros, such as Microsoft's office suite. Due to their characteristics, they can automate a series of operations so that they are executed as if they were a single action.


10.  Polymorphic viruses - They are viruses that are encrypted or modified in a different way through algorithms and encryption keys once they manage to infect the system.


11.  Fat virus - The fat file allocation table is a part of the hard disk that is used to store the information about the location of the files, the space that cannot be used and the space available. They prevent access to certain sections of the disk.


12.  Web scripting virus - Complex code for creating interesting content is included on some websites. This type of code is sometimes exploited so that computer viruses cause undesirable actions for the user.


13.  Browser hijacker - These are viruses that spread in many different ways, such as a voluntary download. In the event that the browser is infected, the user will be automatically redirected to certain sites.


14.  Email virus - It spreads through emails, once the recipient opens them.


15.  Companion virus - It is a virus that infects files directly and in turn to


16.   Resident Types (viruses). As for accessing the computer, they can accompany other existing files.


17.  Multipartite virus - It is a virus that can spread in various ways. Among its actions, depending on the operating system will be adjusted. They almost always hide within memory without infecting the hard drive.

What Are The Limitations Of An Antivirus?

·         Do not avoid spam - In some cases they offer online protection, but the truth is that they are not entirely effective.

 

·         They do not prevent direct attacks - In case a person with advanced knowledge until the own computer, they are not in a position to be a defense.


·         They do not prevent criminal activities - Nor are they software capable of this work.

 

No comments:

Post a Comment