Skip to main content

Computer Virus

                                         Computer Virus

Computer Virus:

                   Computer virus is one program or piece of code typically affect on the system such as a corrupting file,destroy itself.



   Following are the different categories of                  viruses:
                    i) Boot Sector virus
                   ii) Macro virus
                  iii) Multipartic  virus
                  iv) TSR virus
                   v) Stealth virus
                    






i)Boot Sector Virus:

  •  Its spread using physical media like floppy disks, M.B.R., Hard Drives etc,.
  •  Booting process means loading the operating system into the main memory.
  • This virus replace a some booting files with their corrupted files.
  • A boot sector virus is able to infect a computer only if the virus is used to boot up the computer.







ii)Macro Virus:

  •  Macro is one special purpose command language.
  • Macro virus is written in the macro.
  • Its made for the sophisticated  program of the Microsoft Office like word,excel  etc,
  • Its infect only the documents not executable part of the code.

iii)Multipartite  Virus:

  • Its computer virus that infect and spread multiple way and it is fast moving virus.
  • Most of attack on the boot sector and program files.
  • It attacks on the boot sector and program simultaneously.











iv)TSR Virus:

  • Terminate and Stay Resident virus.
  • TSR programs are used in disk operating system and perhaps other non-task operating system.
  • TSR virus that steps active in memory after application is completed. 

V)Stealth Virus:

  • Its works same as name its hidden from the anti-virus or anti malware.
  • Stealth virus eradication requires adv advanced anti-virus or clean system reboot.



Comments

Post a Comment

Popular posts from this blog

Piconet and Scatternet

                                 Piconet and Scatternet         Transfer a data to various people  its become most important now a days. There are a lots of methods are available to  share to data or transfer to data.But I explain here about the Bluetooth  Piconet and Scatternet. Piconet:           Piconet gets its name fro the world "pico". Pico means a very small.         A piconet is nothing but small network. Using this network we can share the data or transfer the data .Its one ad-hoc network.Which links a wireless user group of devices,using Bluetooth  technology.         Piconet is formed at least two devices such as portable PC and a cellular phone to connect. Ad maximum 8 to need to make this network.When network is established, one device act as master and other as sa...

Deep Web

                                               Deep Web                           The internet is known as a most important searching platform. We are use the Internet for various activities like a searching a information, listening a music,watching a various videos and all other so many activities. For that we can use a various search engine like a google,being,yahoo etc.Now-a-days google and like a other search engine makes a part of our day-to-day life.                        If you want a search a any information then most we uses a platforms like a Google,yahoo etc. This search engines is our first choice its hit in mind suddenly. This is also called "Surface web" .  But another is most important option for all this is the which give...

Information Assurance(IA)

                                Information Assurance ( IA ) 1.Introduction:                  Now-a-days Internet clients has increased which is over the world 200 million.This Internet is accessed via mobile telephone,computer,PDA, games machine etc,. So its also need to protect the data,information as well as security  of data and all other things related to the security. Hence the Information Assurance is very important concept which is related to the Information Security.                     2.What is Information Assurance ?   Information Assurance is one process or its is a one activity which help us to protecting our data,our system or network. Its also getting the right data to the right persons at the right time. It protects the information,hardware,software and data from dam...