.

Wednesday, February 27, 2019

What are computer viruses and how do they work?

A reckoner computer computer virus is nothing but a programme that is built to infect other programs by making current changes in that programme that render it unable to perform its designated function.During this procedure of contagious disease, the virus also self perpetuates, in that it makes many copies of itself, so that it trick then further infect other programmes, much handle the viral infections that affect human beings.Surprisingly, there is so much similarity surrounded by the tow, in that during the replication process the copies are made exactly equivalent the original, with no posttranslational modifications.Depending on what the virus was created to do, it can either delete the programmes it infects, or it can make it altogether useless, and may itself turn it into an infecting programme also.Major categories of viruses are1 bloodsucking virus these are the most common form of virus, it attaches itself to executable files and twins when the give program is e xecuted.2 Memory-resident virus this virus attacks the main cache memory of the system, and gains gravel to whole the programmes that are executed.3 Boot sector virus this virus infects the mention segment, and then infects all the files that are executed from the disc4 Stealth virus like the stealth machine, is virtually immune from anti virus softwares5 Polymorphic virus after each infection, the virus changes its character, thus making cleaning or treatment very difficult6 Metamorphic virus unlike the previous, the virus completely changes itself after every infection. .In the lifetime of the virus, a number of var.s have been identify that allow the identification and possible clean up of the virus.1 Dormant build virus is not attacking in this phase. It waits for a specific generalisation for which it has been programmed. It may be a particular date or a specific programme that is required. These are specific viruses, while not all viruses have been programmed to follow t his phase2 Propagation phase virus makes multiple copies of itself to infect many files at the same time. Thus the virus may place down the files or the system areas itself.3 Triggering phase the virus gets its signal to become activated. Having certain its signal, it then assumes a position from which it can attack easily.4 Execution phase this is the final step, when the virus actually performs the step it was made to do. Thus the virus may delete the file, make the programme corrupt, make multiple copies of itself, or whatever it was programmed to perform.Viruses are operating system specific and some til now only attack specific hardwares. For example the linux operating system has not yet faced a virus attack, while the microsoft system is forever batting many virus attacks, even the apple OS is not immune from these attacksAnother identity is a worm. This is a program that can replicate itself (like a virus), but it has the additional ability to send copies from one comput er to another computer across network connections, via e-mails or VPN systemsReferances1 Heidari M. Malicious Codes in Depth. Accessed from www.securitydocs.com. on 13 June, 20082 Brain M. How computer viruses worl. Accessed from www.howstuffworks.com/virus.htm on 13 June, 2008

No comments:

Post a Comment