Senin, 07 Oktober 2013

Type Virus Type MMN

To further refine Game PC dan Android Gratis  our knowledge about the virus , I will try to give an explanation of the types of viruses that often roam the cyber world .
Macro 1.VirusThis type of virus would have been very often we dengar.Virus is written with the programming language of an application rather than the programming language of an Operating System. The virus can be run if the constituent applications can run well , meaning if the computer can run applications mac word then this virus works on computer operating system Mac . virus samples :

    
W97M-variant , eg W97M.Panther 1234 bytes long , and infect the Normal.dot akanmenginfeksi documents when dibuka. - WM.Twno.A ; TW 41984 bytes long , will infect Ms.Word document that uses a macro language , usually with extension * . DOT and * . DOC - etc
2.Virus Boot SectorBoot sector viruses are common in all these menyebar.Virus reproduce itself will move or replace the original boot sector virus with the boot program . So when booting the virus will occur in subsequent viral load kememori and will have the ability to control the standard hardware ( ex :: monitor , printer , etc. ) and from this memory is also virus will spreadeseluruh existing drive and connected kekomputer ( ex : floppy , drive other than drive C ) . virus samples :

    
wyx ex - variant virus : wyx.C ( B ) infect the boot record and floppy ; length : 520 bytes ; characteristics : memory resident and encrypted ) . - variant V - sign : infect : Master boot record ; 520 bytes long ; characteristics : living in memory ( memory resident ) , encrypted and polymorphic ) . 4th - Stoned.june / bloody ! : infect : Master boot record and floppy ; length of 520 bytes ; characteristics : resident in memory ( memory resident ) , encrypted and displays the message " Bloody ! june 4th 1989 " after booting the computer 128 times
3.Stealth VirusThis virus will master DOS interrupt table table who are familiar with the " Interrupt interceptor " . This virus capable to control instruction and instruction-level DOS hidden as they are usually either full name or size. virus samples :

    
- Yankee.XPEH.4928 , infect files * . COM and * . EXE ; 4298 bytes long ; characteristics : living in memory , ukurantersembunyi , has a trigger - WXYC ( which includes boot record category was due to enter stealth kategri also here ) , infects an motherboot floppy record ; 520 bytes long ; resident in memory ; sizes and virus - Vmem tersembunyi. ( s ) : infects files * . EXE , * . SYS , and * . COM ; fie 3275 bytes long ; characteristics : resident in memory , the size of the hidden , in enkripsi. - etc
4.Polymorphic VirusThe virus is designed for outwit antivirus program , meaning the virus is always trying to avoid being recognized by antivirus fox by always changing structure after each infected file / other programs . virus samples :

    
- Necropolis A / B , infect files * . EXE and * . COM ; file 1963 bytes long ; characteristics : resident in memory , and the size of a virus hidden, encrypted and can be changed to change the structure - Nightfall , infect files * . EXE ; 4554 file length bytes ; characteristics : resident in memory , and the size of a virus hidden, has a trigger , terenkripsidan can change the structure - etc
5.Virus File / ProgramThis virus infects files that can be executed directly from the operating system, application file ( * . EXE ) , and * . Com usually the result of infection from this virus can be identified by changing the file size is attacked .
Partition 6.Multi VirusThis virus is a combination of boot sector viruses and file viruses : means work performed resulted in two , that he can infect files * . Infects EXE and Boot Sector .

Tidak ada komentar:

Posting Komentar