Different Types of Virus that are Running Wild on the internet

Now a day’s virus became a part and parcel of our community, each and every device is infected with some kind of virus. Some might be a threat and some might not have the potential to cause any harm. So, here is the list of some virus that are little bit famous 

Resident Virus:

A resident virus hides and stores itself within the system and infects any file that is run by the computer, depends on the way it was programmed.
Examples: Jerusalem Virus, One-half virus, Magistr, Junkie, Satanbug etc.

Multipartite Virus:

A multipartite virus infects and spreads into boot sectors mainly. It is a fast-moving virus that uses file infectors or boot infectors to attack the boot sector and executable files simultaneously at a great speed.
Examples: VCL.428 etc.

Direct Action Virus:

Direct action virus replicated its self and then spreads as an infection whenever the code is executed. Certain conditions have to be followed for the virus to be executed. The virus is set into action and begins to infect files in the directory or folder it's located in.

 Overwrite Virus:

An overwriting virus after infection, will effectively destroy the original program code, typically by overwriting data in the system's memory.
Examples: TRj.reboot virus.

Boot virus:

 Boot sector viruses operate by replacing a hard disk’s boot sector  writing copies of code that are triggered to run every time a user tries to reboot the system, or run a particular software program.
Examples: Michelangelo and Stoned virus.

Macro Virus:

It is a virus that is written in the same macro language that is used for software applications, most often Microsoft office application like Microsoft Word and Excel. The macros are automatically activated when these documents are opened because the macro language is embedded in documents. This is also the same way macro viruses work opening and closing a document. Macro viruses are among the more difficult viruses to detect; learn more about them below.
Examples: Melissa virus (This virus when opened in WORD the computer gets infected and then the virus sends itself by email to the first 50 persons in their address book hence infecting others)

Directory virus:

Directory virus is also known as a “cluster” virus that infects your files not by changing the file or planting extra files but by changing the DOS directory information so that directory entries point to the virus code instead of the actual program.
Examples: DIR-2 etc.

Polymorphic Virus:

A polymorphic virus is a harmful, destructive or intrusive type of malware that can change or "morph" making it difficult to detect with antimalware programs. It is a self-encrypted virus. Upon infection, the polymorphic virus duplicates itself by creating usable, albeit slightly modified, copies of itself.
Examples: The 1260 virus, The Dark Avenger Mutation Engine (MtE), 32-Bit Polymorphic Viruses etc.

Encrypted virus:

A virus using encryption to hide itself from virus scanners. That is, the encrypted virus rearranges the program code to make it hard to detect. An encrypted virus's code begins with a decryption algorithm and continues with encrypted code. Each time it infects, it automatically encodes itself differently, so its code is never the same. Through this method, the virus tries to avoid detection by anti-virus software.
Examples: Cascade on DOS, W95/Mad.2736 Virus, W95/Silcer etc.

Companion virus:

A companion virus is a computer virus that stores itself in a file that is named similar to another program file that is commonly executed. When that file is executed, the virus will infect the computer or perform malicious steps such as deleting the files on your computer hard drive.
Examples: Globe virus (1992)

Non-Resident Virus:

A non-memory-resident virus or non-resident virus, when executed, scans the disk for targets, infects them, and then exits.
Examples: All Executables Viruses.

Stealth Virus:

A stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software. Generally, stealth describes any approach to doing something while avoiding notice.
Examples: Rootkits.

Fat Virus:

A FAT virus can be rather dangerous as it infects a vital part of the computer's operational process. When infected with fat virus it can use permanent data loss and can overwrite directories and can prevent access to certain sections on the hard drive.
Examples: Casino, Alabama, Brain etc.

==========     Hacking Don't Need Agreements     ==========
Just Remember One Thing You Don't Need To Seek Anyone's  To Hack Anything Or Anyone As Long As It Is Ethical, This Is The Main Principle Of Hacking Dream
    Thank You for Reading My Post, I Hope It Will Be Useful For You

I Will Be Very Happy To Help You So For Queries or Any Problem Comment Below Or You Can Mail Me At Bhanu@HackingDream.net

Bhanu Namikaze
Bhanu Namikaze

Bhanu Namikaze is an Ethical Hacker, Web Developer, Student and Mechanical Engineer. He Enjoys writing articles, Blogging, Solving Errors, Social Surfing and Social Networking. Feel Free to let me know any of your concerns about hacking or let me know if you need any more methods on hacking anything. Enjoy Learning

No comments:

Post a Comment

Sponsored Post