When we
talk about computer security, the virus is the leading threat. It can destroy a
single program or the whole computer system instead. The very first virus was
created in the 1970s and was called the Creeper virus, affecting computers on
the ARPANET. In 1981, the first hacker-made virus came into existence and
spread through Apple floppy drives.
According
to Information-Technology
Promotion Agency, the
numbers of viruses ballooned to 52,151 in 2004. However, due to certain
programs that completely eliminate viruses, their numbers decreased to about
14,000 in 2010.
57% of the
threats affecting your computer security is viruses. Other threats include
Trojans, adware, worms, and malware, among others. Now, viruses are still
widespread, affecting PC performance. Viruses are also tools of hackers to gain
unauthorised access to your system and steal private information. It is
important that you are aware of the different types of viruses that are
affecting your computers.
Overwrite virus is the
simplest computer virus. It overwrites the code of infected file with its own
malicious code. The content of infected file is replaced partially or
completely but the size of file does not change.
Macro Virus
Macro virus alters or
infects the macros of a document or data file. It is embedded as macro in a
document and adds its codes to the macros of the document. The virus spreads
when infected documents or data files are opened in other computers.
Boot Virus
Boot virus or boot
sector virus alters the boot sector program stored in hard disk or any other
storage device. It replaces the boot sector program with its own malicious
version. Usually it enters into your system through corrupt media files,
infected storage devices and insecure computer networks.
Resident Virus
Resident virus stays
permanently in the primary memory (RAM) of computer. When you start the computer,
it becomes active and corrupts the files and programs running on the computer.
Multipartite Virus
Multipartite Virus
Multipartite virus
spreads and infects in multiple ways. It infects both the files as well as the
boot sector.
File Infector Virus
It is one of the
commonly found computer viruses. It particularly infects the executable files;
the files with .com or .exe extensions. The virus becomes active when the
infected file is executed. The active virus overwrites the file partially or
completely. Thus, it may destroy the original file partially or completely.
Computer
Worm
Computer worm is
similar to virus but is technically different from virus. It can replicate and
spread like virus but unlike viruses it don't need a host program to spread.
Being able to self-replicate it can produce multiple copies of itself. It
spreads through networks such as an email sent to an infected email id can
infect your system with computer worm.
Trojan Horse
Trojan horse is a malware like a virus
or worm, but it is technically different from both. It can't replicate like
virus and worm. Trojan horse hides itself in a program. Once you install any
such program the trojan horse enters into your computer. It can provide
unauthorized access to your computer, send your files to other computers and
may delete files or can make other unwanted changes in your computer.
Social Icons