Computer viruses are malicious software that can replicate itself and spread to other computers without permission. There are many types of viruses including resident viruses that live in RAM, direct action viruses that replicate and take action on execution, boot viruses that infect boot sectors, macro viruses that infect files containing macros, and more. Hackers are people who attempt to break into computer systems, ranging from crackers who do it maliciously to white hat hackers who do it to test security systems. There are signs that can indicate a computer has been hacked, such as defaced webpages, decreased disk space, high network usage, strange processes running, or things seeming unusual.
Computer viruses are malicious software that can replicate itself and spread to other computers without permission. There are many types of viruses including resident viruses that live in RAM, direct action viruses that replicate and take action on execution, boot viruses that infect boot sectors, macro viruses that infect files containing macros, and more. Hackers are people who attempt to break into computer systems, ranging from crackers who do it maliciously to white hat hackers who do it to test security systems. There are signs that can indicate a computer has been hacked, such as defaced webpages, decreased disk space, high network usage, strange processes running, or things seeming unusual.
Computer viruses are malicious software that can replicate itself and spread to other computers without permission. There are many types of viruses including resident viruses that live in RAM, direct action viruses that replicate and take action on execution, boot viruses that infect boot sectors, macro viruses that infect files containing macros, and more. Hackers are people who attempt to break into computer systems, ranging from crackers who do it maliciously to white hat hackers who do it to test security systems. There are signs that can indicate a computer has been hacked, such as defaced webpages, decreased disk space, high network usage, strange processes running, or things seeming unusual.
software written intentionally to enter a computer without the user’s permission or knowledge, with an ability to replicate itself, thus continuing to spread. TYPES OF COMPUTER VIRUSES Resident Viruses
This type of virus is permanent. Its dwells
inside the RAM. From there, it can overcome and interrupt all of the operations executed by the system. Direct Action Viruses
The Main purpose of this virus is to replicate
and to take action when it is executed. Boot Virus
This Affects the Boot Sector of a floppy or a
hard drive. This is a crucial part of the disk, in which information on the disk itself is stored together with a program that makes it possible to boot the computer from the disk. Macro Viruses
Infect all files that are created using programs
that contain Macros. Directory Viruses
Change the paths that indicate the location
of the file. Polymorphic Viruses
Encrypt or encode themselves in a different
way every time it infect a system. File Infectors
When one of these programs is ran, directly
or indirectly, the virus is activated, producing damaging effect. Companion Viruses
Once they get into the system, they
“accompany” other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait inside the memory until the program is run or act immediately by making copies of themselves. FAT Viruses
This type of virus attack is especially
dangerous, by preventing access to certain sections of the hard drive where files are stored. Worms
It has the ability to self-replicate and can lead
to negative effects on your system. Trojan Horses
Another breed of malicious code which unlike
others do not reproduce by infecting other files, nor do they self-replicate like worms. Logic Bombs
Camouflaged segments of other programs that
has an objective to destroy data on the computer once certain conditions have been met. They go undetected until launched and the results can be destructive. Armored Viruses
Attempts to protect itself from anti-virus
software by making anti-virus believe it is located somewhere else. Phage Viruses
It is a very destructive virus that rewrites an
executable program with its own code, rather than just attaching itself to the file. Spyware
Computer software that is installed
surreptitiously on a personal computer to collect information about a user, their computer or their browsing habits without the user’s informed consent. Hackers
Someone who attempts to break into computer
systems.
☺ Proficient programmer or engineer
☺ understand the computer’s weak points ☺ Understands computer security Types of Hackers
Crackers (or Black Hat Hackers)
Blue Hat Hacker
Gray Hat Hacker White Hat hacker Script Kiddies Hacktivist How to know when you’ve been Hacked Webpage Defacement