Professional Documents
Culture Documents
Assignment On Computer Viruses - Odt
Assignment On Computer Viruses - Odt
Assignment On Computer Viruses - Odt
1. Boot Sector Virus - This type of virus is stored in the boot sector of floppy
and hard disk. When you start the computer, then it interrupts the operating
system to load and if the operating system starts working in any way, then it
starts interrupting the other work of the computer.
2. Partition Table Virus - This type of virus damages the partition table of
the hard disk. This affects the hard disk's master boot record and has the
following results-
It executes itself at the higher priority location of the master boot record.
This reduces the capacity of RAM.
It generates an error in the disc's input / output controller program.
3. File Virus - This virus damages computer files, it damages the .exe file.
4. Secret Virus (Stealth Virus) - Secret viruses make every effort to hide
their identity from the user in the computer according to their name. These
are called secret viruses.
5. Polymorphic Virus - This virus has the ability to change itself frequently
so that each infection looks completely different from the actual infection. It
is very difficult to stop such viruses because each time it is completely
different.
2.Mebroot Virus -
This virus takes control of the entire system as soon as it is downloaded into
the computer and in a few seconds, it copies itself and creates thousands of
files. On the system affected by this virus, hackers have complete control
over any user's file manager, registry editor, webcam, power option, remote
IP scanner, etc.
3.Leap Virus -
This virus first affected Apple's MacBook. This virus sends fake messages to
people connected to i-chat through messages. The system affected by this
virus slows down considerably.
4.Storm Worm -
This virus is installed in the system as soon as you click on the link that
comes with the mail. As soon as it is downloaded into the system, the hackers
can control the computer and send snap (picture) through internet.
5.My Doom -
The virus comes with a title like "mail transaction failed". This virus transfers
to the address book of the mail box and kills the data.
This virus comes with the title I love you and it is attached to the “love letter
for you” attachment. This virus becomes active as soon as you open this mail.
This virus automatically enters the system and sends exactly the same
message to the 50 people present in the user's mail box through which the
message came in the user's system. This virus crashes the entire mail and
server system. The virus has so far eradicated many banking systems. Many
pagers and paging services have been shut down due to this virus.
7.CIH -
This virus attack causes the system's hard drive to crash. This virus
overwrites the system's BIOS chip.
1. Always install a good Antivirus in your system and keep updating it from
time to time.
2. Be careful while opening your email. Do not open spam mails. If you do
not know about the sender then you should not open it.
4. Get all the downloaded things scanned properly. Because they are more
likely to have a virus.
5. Use removable media such as pendrive, only after scanning the disks. Do
not try to open any unsolicited executable files, documents, spreadsheets,
without scanning.
Worms-
Worms are also like viruses, but they multiply themselves and try to spread
themselves as much as possible. Which means that if there are worms in your
system, then they start making many copies of different files, due to which
the system slows down.
If we copy and share the same files with another computer, then worms will
go there and slow down that computer by making many copies of files.
Trojen Horse-
Trojan horse is a harmful computer program that controls our system and
leads to malicious action. Trojan cannot create its own copy like a virus, but
it can install the virus in the system.
Trojan horse is also called trojan, people download the trojan by cheating
thinking that this file is correct but it is trick to trap people.
A Trojan can delete system files and data.It can steal important information
and passwords. It can lock the system. Can download and install malware.
Can restart the system. Can infect CDs. And also it can close the program.
Bad rabbit-
The Chameleon virus is the first polymorphic virus. When a file infected with
Chameleon is executed the virus will infect all .com files in the current
directory. It sets the seconds field of a newly infected file's timestamp to the
impossible value of 62.
Software bomb-