MODULE No.21 Types of Viruses and Worms
MODULE No.21 Types of Viruses and Worms
Module No. and Title MODULE No.21: Types of Viruses and Worms
1. Learning Outcomes
2. Introduction
3. Different Types Of Computer Virus On The Basis Of Action
4. Some Other Types Of Virus
5. Worms
6. Summary
2. Introduction
A computer virus is a program made to damage or cause destruction on an infected
computer. It extends by e-mail attachments, transferable devices, websites having
malevolent scripts and file downloads. A computer virus attaches itself with the host files
and will activate whenever one open the infected files. The virus can duplicate itself and
then infect the other files on the computer causing more harm.
CMJ
meve
randex
mrklunky
These kinds of viruses erase any information in a file they infect, making them partially
or entirely useless if they are infected. Once in the computer, they substitute each of the
file content but the file size doesn’t change.
Trj.Reboot
way
trivial.88.D
These viruses mostly duplicate or take action once they are executed. When a certain
condition is met, the viruses will act by infecting the files in the directory or the folder
specified in the AUTOEXEC.BAT. The viruses are usually seen in the hard disk’s root
index, but they keep on changing location. For example: Vienna virus.
The majority web pages consist of some intricate codes in order to generate an interactive
and attention-grabbing content. Such a set of laws is regularly demoralized to cause
certain objectionable actions. They typically invent from the infected web pages or
browsers. For example: JS.Fortnight – a virus that spreads via malicious emails.
These kinds of viruses can spread in various ways. Their method varies according to their
OS installed and existence of certain files. They tend to hide in the computer’s memory
but do not infect the hard disk.
A program formed to distribute a malicious program that may then cause damage to your
computer. A Trojan horse is delivered by somebody or hidden inside another program
that may seem undamaging.
4.3. Adware
4.4. Worms
A nasty little program can cause less speed in a network. A worm will duplicate itself
and multiply from computer to computer. Worms are commonly spread through email
attachments.
Not so usual any longer, but they were spiteful little programs that got encumbered into
your master boot record. Most frequently multiply by floppy disks. These viruses could
then commence themselves ahead of your operating system even loaded. Today most
BIOS avert code from being written to the boot sector.
A virus made to perform at a later date or upon an action done. These programs lay
inactive until an incident occurs.
A virus will cover your web browser and involuntarily readdress you to another website.
A virus that live inside a file, usually a .exe file. When the file is executed, it will then
run its malicious code.
5. Worms
A computer worm is a standalone malware computer program that duplicates itself so
that it can extend to other computers. Often, it uses a computer network to multiply itself,
relying on security failures on the target computer to access it. Unlike a computer virus, it
does not require to join itself to an accessible program. Worms nearly at all times cause at
least some harm to the network, still only by consuming bandwidth, while viruses almost
forever crooked or change files on a targeted computer.
Many worms that have been formed are intended only to spread, and do not effort to alter
the system they go by. However, as the Morris worm and my doom showed, even these
"payload free" worms can cause significant interference by rising network traffic and
other unintentional effects. A "payload" is code in the worm formed to do more than
multiply the worm it might delete files on a host system (e.g., the Explore Zip worm),
encrypt files in a crypto viral extortion attack, or send documents via e-mail. A very
ordinary payload for worms is to install a backdoor in the infected computer to permit the
formation of a "zombie" PC under power of the worm creator. Networks of such
machinery are frequently known to be bonnets and are very usually used by spam senders
for transferring scrap email or to hide their website's address. Spammers are therefore
thought to be a source of financial support for the formation of such worms, and the
worm writers have been caught selling lists of IP addresses of infected machines. Others
try to blackmail company with threatened DoS attacks.