COMPUTER VIRUS | TYPES, EXAMPLES, EFFECTS

Computer virus is a software program written with malicious intentions. They are intentionally written by some software developer to cause severe damage for the computer, programs, and data files in which it found itself. A computer virus has the ability to replicates itself by changing other programs to include a copy of itself.

Examples of computer viruses include: form, cascade, virus 101, phoenix, stimulate, involuntary, proud, disk killer, multi partite, flip, Trojan horse, sleeper, logic bombs, Alabama virus, Christmas virus, worm, data crime, Jerusalem virus, Barcelonia virus April1st virus etc.

 Type of computer virus

There are basically three ways in which virus will infect micro-computers:

  1. Boot sector
  2. Executable file viruses
  3. Document
  • Boot sector virus: They affect hard drives and flash disks by making itselfavailable on the boot sector of the disk. Booting up from an infected flash disk can cause damage to the hard drive. Examples of boot sector viruses are polyboot.B, AntiEXE
  • Executable file viruses: They spread infection by attacking the code to executable files (EXE, COM) in this way, the virus program will be executed before the host program is executed.
  • Document virus: Virus can affect the document by moving from disk partition table to a different sector and replace with its own code, therefore. Infecting document as they are accessed.

 

Other types of virus include the following:

  • Resident virus: This type of virus dwells in the RAM memory is permanent in nature. Its effect of existence is to overcome and interrupt all the operations executed by the system.for instance, corrupt files and programs that are opened, closed, coped etc.

Examples are CMJ, Meve, Randex, and Marklunky.

  • Micro Virus:This type of virus infects files that are created by making use of certain program or application that have macros. Examples are Relax, Melissa. A, Bablas, 097M/Y2K
  • Overwrite Virus:Overwrite virus deletes the information contained in the files, it duplicates itself by rendering information partially or totally useless. The only way to clean a file infected is to delete the file totally, thus losing the original content.
  • Directory Virus: This virus changes the paths that indicate the location of a file.When you execute a program that has been infected with this virus, indirectly you are running the virus program, meanwhile, the original file and program has been displaced by the virus. It is then impossible to locate the original location of file or program.
  • Polymorphic viruses: They change themselves through different ways.eg. Encryption and this act makes it impossible for antiviruses to find them using string or signature searches. They have the ability of duplicating themselves in large numbers. Examples include: Elkern, Marburg, Satan Bug, and Tuareg.
  • Fat virus: This is part of a disk that is used to connect information and it is a vital part of the normal function of the computer. They prevent access to certain section of the disk where important files are stored and the damage caused can result in information losses from individual files or entire directories.

Other Malicious Programs

There are other types of destructive programs not purely classified as virus but are equally threats to internet eg. Worm

  • WORMS

Worm is considered to be a sub-class of a virus. It spreads from one computer to another without any human action and they have the capability of reproducing itself on the system at any point in time. For example, worm can spread itself to everyone listed in your email address book. Worm consumes or occupy a large part of computer memory thereby causing network servers and individual computers to stop responding. Worms travel across the network. ExamplePSWBBugbear.B, Lovegate.F, Trile.C, Sobig.D, Mapson,Blaster.

  • Trojans or Trojan Horses

Trojans do not reproduce themselves by infecting other files nor can they replicate like worm but they will actually do damage once installed in the system. Sometimes they appear to be useful software but when it is activated the result can be annoying ( adding silly active desktop icons), or deletion of files and information on the system. Hacker utilizes viruses or Trojans to gain access to your computer, to steal data, invade privacy or use computer for their evil purposes. e.g: Netbus, subseven, Beast, Zeus, Flashback Trojan, ProRat, ZeroAccess etc.

  • LOGIC BOMBS

They are not really a virus parse because they lack the ability of replicating themselves. They can camouflage segments of other programs, despite the fact that they are not programs. Their aim is to destroy data on the computer once certain conditions have been met.

  • Adware and spyware

They usually come together with other programs that seem to be harmless. These programs are not as dangerous as virus but also collect data of your computer and send it “home” which is in most cases a company uses this information to spam you with advertising E-mails. Spyware can track internet searching habits and possibly redirect web site activity. e.g. The red sheriff and BESS.

Examples of Computer Virus

Macro viruses Nuclear.DMV.Word concept

Boot viruses Form, Disk Killer, Michelangelo, Stone virus

Active X and JAVA viruses

Stealth viruses Frodo, Joshi, whale

Program viruses Cascade, Sunday

Polymorphic viruses- cascade, pround, EvilVirus 101, phoenix, stimulate, involuntary

Multipartite viruses, Tequila, invader, Flip

 GENERAL EVALUATION

  1. Define computer virus.
  2. State five types of computer virus.
  3. Mention six examples of computer virus.

See also

NETWORKING | LAN, MAN, WAN, SERVER, TOPOLOGY

DISTRIBUTED DATABASE

CRASH RECOVERY | ARIES, CONDITIONS, PROCEDURES

INTRODUCTION TO DATA PROCESSING

DATA AND INFORMATION

Leave a Comment

Your email address will not be published. Required fields are marked *