Today, almost everyone familiar with the computer. At home, at school, office, or elsewhere, is almost always found computer equipment. Aside from being a regular user, we would also need a little more aware of the ins and outs of computers.
In interacting with kemputer, of course there are important terms that we find. So should we also need to know the meaning of the term is far more than just a user. During the use of computers, we often do not realize that there are programs that can disrupt the work of a computer system. That so-called computer viruses. Computer viruses are programs that interfere with the working system of our computer, so that it can cause the computer is often blank, lelet, bluescreen and even to the point that we must do to overcome them reinstall our computer.
Well actually what the virus is, what kind. Well that is not often we can do to reinstall the prevention, of course, before we have to know what kind of virus that had attacked our computer.
The types of computer virus that you need to know:
1. Virus Compiler,
viruses that have been compiled so that it can be executed directly. This is a virus that first emerged in the computer world, and is now experiencing rapid development. The first virus is very difficult to be liquidated because it is made with raw language, assembler. It is this language suitable for creating a virus but it is hard to use it. The advantages of this virus is capable of doing almost all the manipulations in which this may not always be performed by other types of viruses because they are more limited.
2. BC Bagle virus,
This virus is one type of virus that is dangerous and has been ranked the fastest type of virus that affects our computer. Several hours after the release of this virus, already there are 2 variants of Bagle (Bagle BD and BE), which spreads via e-mail, computer networks and P2P applications. This virus spreads via e-mail with a variety of different subjects. According to a study from Panda Software BC Bagle virus is seeping into the e-mail with the subject, among others: Re:, Re: Hello, Re: Hi, Re: Thank you, Re: Thanks. Attachment was also varied, including:. Com,. CPL,. Exe,. Scr. BC Bagle virus is also able to terminate antivirus programs.
3. Virus File
Are viruses that use executable files directly. Usually the files *. EXE or *. COM. But it can also infect files *. SYS, *. DRV, *. BIN, *. *. OVL and OVY. Results from this virus can be detected denganberubahnya attacked file size. This type of virus can move from one media to any type of storage media and spread within a network.
4. Virus Systems,
Or better known as a Boot virus. Why do so because the virus is utilizing the files used to create a computer system. Often found in floppy / storage place without our knowledge. We will use a computer (restart), then this virus will infect the Master Boot Sector and System Boot Sector if an infected floppy diskette is in drive / storage area.
5. Boot Sector Virus,
This virus has often we meet. This virus can copy itself and move or replace the original boot sector and replace them with virus programs. These viruses take advantage of the relationship between computers and storage place for the spread of the virus. If the boot sector there is a program that is able to propagate themselves and can live in the memory during computer work, so the program can be called a virus. Boot sector virus is divided into two, namely viruses that attack the virus that attacks the floppy and floppy disks and partition table. At the time of booting your computer then the virus will be loaded into memory, then this virus has the ability to control the standard hardware (monitor, printer, etc.) and subsequently spread to the entire drive.
6. Virus dropper,
a modified program to install a computer virus which attacks target. once installed, the virus will spread but did not participate dropper spread. Dropper can be either a filename like Readme.exe or through Command.com which becomes active when the program runs. One program can have some kind of dropper virus.
7. Virus Script / Batch,
This virus was originally known by names such as the first batch viruses contained in a batch file in a script usually DOS.Virus often obtained from the Internet because of its advantages of flexible and able to walk when we play on the internet, the virus of this type usually ride on the HTML file (Hype Text Markup Language) is created by utilizing scripts such as Javascript, VBScript, 4 or a combination of scripts that activate Active-X programs from Microsoft Internet Explorer.
8. Macro Viruses,
viruses are made by using modular programming facilities in an application program such as Ms Word, Ms Excel, Corel WordPerfect, and so forth. Although the virus is found in certain applications but caused no less danger berbahanya from other viruses. Macro virus will infect files in MS Word with ektension DOT (Document template) and DOC (document), which if KITAS'm running MS Word and call the files are the macros of the virus will be executed. In the course of this macro-instruction to move instructions to spread viruses or other intervention program data manipulation.
9. Polymorphic Viruses,
can be said smart virus because the virus can change its structure after carrying out the task so difficult to detect by antivirus. This virus is designed to be able to fool anti-virus program. This virus could Prgram meengevolusi myself so hard to be recognized by anti-virus program. Proramnya able to change their structure after each menginveksi files or other programs.
10. Stealth viruses,
This type of virus capable of mastering the DOS interrupt table known as the 'interrupt interceptor. "Viru was mmpunyai ability to control the program instructions and the DOS level can also be hiding out in full according to its name and size. This clever virus, it can modify the file structure for meyembunyikan additional program code in it. This code allows the virus can menyembunyika themselves. All kinds of other viruses also take advantage of this code. The sizes of the file does not change after the virus infects a file.
11. Companion Virus,
these viruses search for the file type *. EXE to create a *. COM file and copy to put the virus. The reason, the files *. COM *. EXE file run before.
12. Worm.
This worm is not the kind of virus, but it can be said as a result of the evolution of the development of the virus itself. Worm has a high-speed characteristics of infecting a computer, particularly on networked systems. So this could have is a parasitic program because it can duplicate itself. But i can also say, the worm does not resemble viruses because they do not infect other computer programs. Mainframe is the type of computer that is frequently attacked by worm. Spread on other computers over a network. Privileged worm than a virus is that he can spread with little or no intervention from users. For example with a single click on the attachment file is infected e-mail worm, then one adatu multiple systems connected via e-mail can be infected. In the development Worm experience "genetic mutations" that besides creating a new file, he will try to put himself into a file, usually called Hybrid viruses.
13. Multi partition virus
This is an integrated between boot sector virus with virus files. In a sense, a result generated from its activities will result in two things, where he can infect the files *. EXE or *. COM and also infect the boot sector.
14. Hybrid viruses,
This virus is a virus that has two abilities can usually get into the boot sector and can also be entered into the file. One example of this virus is a virus Mystic made in Indonesia.
15. Trojan horses,
(Trojan Horse). Trojan Horses do not spread like the others. Therefore, the Trojan Horse virus, although not belonging to the same characteristics.
Progrmam Trojan is composed of two parts, namely a computer program that infiltrated into the target (victim) with all the tactics (tricks) and other programs run by computer hackers. If the hacker has slipped into the victim's computer program, then the hackers will control the computer activity of a computer hacker.
Trojan infects a computer through a file that looks harmless and usually it seems to do something useful. But eventually become dangerous viruses, such as formatting the hard drive.
16. Spyware
This program can secretly entered into the computer and retrieve the necessary data that we have such accounts and so on. The initial purpose of this virus, is designed to search data from Internet users and Internet users recorded the habits of a person in the world through cyberspace.
hopefully useful
0 komentar:
Posting Komentar