To
further refine Game PC dan Android Gratis our knowledge about the virus , I will try to give an
explanation of the types of viruses that often roam the cyber world .
Macro 1.VirusThis
type of virus would have been very often we dengar.Virus is written
with the programming language of an application rather than the
programming language of an Operating System. The
virus can be run if the constituent applications can run well , meaning
if the computer can run applications mac word then this virus works on
computer operating system Mac . virus samples :
W97M-variant
, eg W97M.Panther 1234 bytes long , and infect the Normal.dot
akanmenginfeksi documents when dibuka. - WM.Twno.A ; TW 41984 bytes long
, will infect Ms.Word document that uses a macro language , usually
with extension * . DOT and * . DOC - etc
2.Virus Boot SectorBoot
sector viruses are common in all these menyebar.Virus reproduce itself
will move or replace the original boot sector virus with the boot
program . So
when booting the virus will occur in subsequent viral load kememori and
will have the ability to control the standard hardware ( ex :: monitor ,
printer , etc. ) and from this memory is also virus will spreadeseluruh existing drive and connected kekomputer ( ex : floppy , drive other than drive C ) . virus samples :
wyx
ex - variant virus : wyx.C ( B ) infect the boot record and floppy ;
length : 520 bytes ; characteristics : memory resident and encrypted ) .
- variant V - sign : infect : Master boot record ; 520 bytes long ;
characteristics : living in
memory ( memory resident ) , encrypted and polymorphic ) . 4th -
Stoned.june / bloody ! : infect : Master boot record and floppy ; length
of 520 bytes ; characteristics : resident in memory ( memory resident )
, encrypted and displays the message " Bloody ! june 4th 1989 " after booting the computer 128 times
3.Stealth VirusThis virus will master DOS interrupt table table who are familiar with the " Interrupt interceptor " . This virus capable to control instruction and instruction-level DOS hidden as they are usually either full name or size. virus samples :
-
Yankee.XPEH.4928 , infect files * . COM and * . EXE ; 4298 bytes long ;
characteristics : living in memory , ukurantersembunyi , has a trigger -
WXYC ( which includes boot record category was due to enter stealth
kategri also here ) , infects an
motherboot floppy record ; 520 bytes long ; resident in memory ; sizes
and virus - Vmem tersembunyi. ( s ) : infects files * . EXE , * . SYS ,
and * . COM ; fie 3275 bytes long ; characteristics : resident in memory
, the size of the hidden , in enkripsi. - etc
4.Polymorphic VirusThe
virus is designed for outwit antivirus program , meaning the virus is
always trying to avoid being recognized by antivirus fox by always
changing structure after each infected file / other programs . virus samples :
-
Necropolis A / B , infect files * . EXE and * . COM ; file 1963 bytes
long ; characteristics : resident in memory , and the size of a virus
hidden, encrypted and can be changed to change the structure - Nightfall
, infect files * . EXE ; 4554 file length bytes
; characteristics : resident in memory , and the size of a virus
hidden, has a trigger , terenkripsidan can change the structure - etc
5.Virus File / ProgramThis
virus infects files that can be executed directly from the operating
system, application file ( * . EXE ) , and * . Com usually the result of
infection from this virus can be identified by changing the file size
is attacked .
Partition 6.Multi VirusThis
virus is a combination of boot sector viruses and file viruses : means
work performed resulted in two , that he can infect files * . Infects
EXE and Boot Sector .
Tidak ada komentar:
Posting Komentar