Music Hit In your life

วันจันทร์ที่ 28 ธันวาคม พ.ศ. 2552

Type of Virus (English)

Type of Virus

Boot of Virus: These virus infect floppy disk boot records or master boot records in hard disks. Boot virus load into memory if the computer tries to read the disk while it is booting.
Examples: Disk Killer, Stone virus.

Program viruses: These infect executable program files such extensions like .BIN , .COM , .EXE and .SYS . These programs are loaded in memory during exaction. The virus becomes active in memory, making copies of itself and infecting files on disk.
Examples: Sunday and Cascade.

Stealth viruses: These viruses use certain techniques to avoid detection. They may either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading lf the infected file's.
Example: Frodo and Whale.


Active X: Active X and Java controls will soon be the scourge of computing. Most people do not know how to control there web browser to enable or disable the various functions like playing sound or video. By default leave a nice big hole in the security by allowing applets free run into there machine. These are just few broad categories and there are many more specialized types.

Parasitic Viruses (file viruses): Parasitic viruses also known as file viruses, When you start a program infected with a file virus, the virus is launched first. The operating system on your computer sees the virus as part of the program you were trying to run and gives it the same right. These rights allow the virus to copy itself, install in memory or release its payload.
Trojan Horse: Trojan horse are program that do things that are not described in their specifications. Trojan horse are sometime used as a mean of infecting a user with

a computer virus. Trojan is programs that allow other computer users to take control of your PC over the internet.
What are hoaxes?
Hoaxes are reports of non-existent viruses. Typically, they are emails which do some or all of the following:
Warn you that there is an undetectable, highly destructive new virus.
Claim that a major software company, internet provider or government agency issued the warning. Urge you to forward the warning to other users.
Why are hoaxes a problem?
Hoaxes can be as disruptive and as a genuine virus.
If users do forward a hoaxes warning to all there friends and colleagues, there can be a deluge of email. This can overload mail servers and make them crash. The effect is the same as that of a real virus, but the hoaxes hasn't even had to write any computer code.
What is Spam
Spam is unsolicited email, often advertising get-rich quick schemes, home working jobs, loans or pornographic website. Spam often comes with fake return information ,which makes it more difficult to deal with the perpetrator. Such mail should simply be deleted.
Can I be infected just by visiting websites?
Visiting a websites is less hazardous them opening unknown programs or document. There are risks. the threat depends on the types code used in the site and the security measures taken by service providers and by you. Here are the main types of code you will encounter.
Are cookies a risk ?
Cookies do not pose a direct threat to your computer or the data on it. A cookie enable a website to remember your details and keep track of your visits to the site.

.
.
.

ไม่มีความคิดเห็น:

แสดงความคิดเห็น