Wednesday, 3 April 2013

Types of Computer Virus

Computer Virus

A computer virus is a program that can replicate itself and spread from one system to another. Not all PC viruses behave, replicate, or infect in identical way. There are different types of computer viruses and Malware. Below I have listed number of the foremost common kind of computer viruses. 

Types of Computer Virus

Trojan Horse Virus

A Trojan virus is one of the most common and destructive computer virus which has the appearance of having a useful function. It is different from a normal computer virus as Trojan horse virus does not replicate themselves. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. Trojan virus can also create a backdoor on your computer that gives malicious users access to your pc, allowing confidential or personal information to be compromised.

Trojan Virus can further divided into sub categories including:

• Remote access Trojans (RATs)
• Backdoor Trojans (backdoors)
• IRC Trojans (IRCbots)
• keylogging Trojans

Computer Worms
A worm is malicious software program that can make copies of it self, it is made to spread via computer networks. It is one of the most dangerous forms of computer virus. It is mostly found in spam email attachments or messages that have executable scripts. Worm is also known as malware.

Computer worms can be further classified into:

• Email Worms
• Instant Messaging Worms
• Internet Worms
• IRC Worms
• File Sharing Network Worms

Boot Sector Virus
A virus can attach itself to the first part of the hard disk which is read by the computer upon bootup. These type of virus is normally spread by floppy disks. This typically occurs when users inadvertently leave a floppy disk in drive A.

Macro Virus
Macro viruses are computer virus that uses another application macro programming language to distribute themselves. They can infect documents such as Word Files or Excel Files. It causes a sequence of actions performed automatically without users consent.

Memory Resident Virus
A memory resident virus can attach itself to the computer volatile memory that is RAM. They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes.

Computer Virus

Rootkit VIrus
Rootkit virus is undetectable computer virus. Its main purpose is to gain control over your system. This virus is installed by Trojan virus and are normally disguised as operating system files.

Malware
Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.
 
 If you are facing any virus problems and don't know know how to get rid of it then contact AAA Techies offering online virus removal services and online tech support solutions.

11 comments:

  1. Congratulation for the great post. Those who come to read your article will find lots of helpful and informative tips.

    Samsung - 14" Laptop - 4GB Memory - 500GB Hard Drive - Titan Silver

    ReplyDelete
  2. Quite informative post regarding viruses.. Thanks for sharing.. So as to keep your PC secure one should opt for effective antivirus support services.

    ReplyDelete
  3. Normally I do not read post on blogs, but I would like to say that this write-up very forced me to try and do it! Your writing taste has been amazed me. Thank you, very nice post. https://adamfantacy.tumblr.com/

    ReplyDelete
  4. Während das Streamen von Filmen auf Portalen wie movie4k sich in der rechtlichen Grauzone befindet, ist der Download solcher nicht lizenzierten Streams definitiv illegal, dessen solltet ihr euch bewusst sein. olienmark.ampedpages.com

    ReplyDelete
  5. If there’s an extremely low level of risk involved, fees can be as low as 1 percent of the invoice amount. However, with invoice factoring you usually get access to other services. The primary difference between recourse factoring and non-recourse factoring is the party who is at risk if your customer does not pay the invoice. My Blog http://blockbtheatre.myfreesites.net/

    ReplyDelete
  6. Pretty nice post. I just stumbled upon your weblog and wished to say that I have really enjoyed browsing your blog posts. After all I will be subscribing to your rss feed and I hope you write again soon! My Blog http://subscene.pen.io/

    ReplyDelete
  7. Tsohost already makes use of quite a lot of information centres throughout the UK including Equinix LD5 in Slough and Telehouse East in London's Docklands. My Blog http://www.checkmycloset.com/members/profile/4254/blog-view/blog_53596.htm

    ReplyDelete