Virus: Your enemy, hacker's friend Part 3

What is the virus, how can it drop you in a very awkwardness and in the face of dire danger and understand that your device is viral - know this, let's see the difference in viruses.
The virus is the virus, its re-alteration - you, I think this is what technology experts say but it is worth it! According to them, 11 types of computer viruses have been found so far.

Here are the names of some categories of those categories and each of the following:

1.Boot Sector Virus
The boot sector name comes from MS-DOS, which is known as Master Boot Record (the first part of a partitioned device) on modern operating systems.
The boot sector virus came in the floppy, when the four-disk disc was used to boot the computer. However, with the development of computer, with the changes in the virus spreading radically, there is a sudden floppy disk virus.

2.Browser Hijacking
Let's talk about this generation of viruses. You may go to the Internet to find a song, picture or video on a computer or a smartphone. Google found out that the desired thing was found. But clicking on your browser does not just go to another site where you see a special product or service advertisement.
These types of viruses are called browser hijacking.

Although it appears to be very silly and polite, it is not just the main purpose of this virus, but this is the main purpose of the virus. After all, their mission started! Whether you want or not, whether or not the mobile is in the MB or not (if necessary, even if the money is cut from the original account), the virus will now drop your device into all anonymous programs that bring the real Risk Factors.
Also, the browser hijacker virus automatically pulls you into your browser with the notable search engine toolbar - and it slows down your Internet surfing.

3.Worm
This kind of virus is made by targeting large corporate networks. Their job is to tweak the scripting language. Examples of warm water, such as Halva Margate, F. I Love U, etc.

4.Direct Action Virus
Although these viruses do not start their own work, you may have gone into hiding for a long time on your device. Then, one day, when the infected file is executed it starts its destruction.
In 1988, the virus virus that was blocked in every computer in Brazil was the virus virus in 1988.

5.File Infactor
The number of viruses in this category is the highest. Once these viruses take refuge in one of the files on the infected PC, overwrite the file as soon as it is executed and then spreads itself to the folders in the folder.
File Infact Virus usually attacks .exe type files.

6.Macro virus
Microsoft Office of Macro Viruses, Word, Excel, PowerPoint etc. When the device is infected, open the office file, instead of the original writing, there are some textbooks.
However, the horrifying aspect of this virus is that in the case of those who communicate via email to Outlook, the mail is sent to the website with the name of the pornographic website and all email addresses stored in it.

7.Trojan horse
The name 'horses' are there, but they do not run themselves, rather they make the owner of the computer or smartphone that makes the place of harassment.
The most horrifying aspect of the Trojan is that it can format hard disks at any moment, meaning that all your pictures, data or files will be deleted forever.
The special features of the Trojan that they can look like! For example, a computer user might like to play games, and these programs run more. Trojan will show itself as a gaming folder and click to wait. Forgetting the mind of the user, after clicking on that file, the defeat is what happens.

8.Multipurpose Virus
New categories of viruses in this category are available in this category. Generally a virus spreads and operates through any one - but, these categories of viruses use multiple media at a time.
Due to the use of multi-modal media and procedures, this type of virus is also more susceptible to damage.

9.Polymorphic virus
Another powerful virus-group Polymerphic. After the infection, code changes in each extension (usually by specifying the virus, by specifying the code of the virus - as a result of the code being changed, a virus can not be found again), they combine a joint attack on the infected device.

10.Resident Virus
The virus' most 'awkward' virus is undoubtedly the Resident Virus.
Other viruses take shelter in different files, which are stored in different folders of hard disks, but when the resident virus is operating on a hard disk while the operating system enters the computer or smartphone RAM in the main memory. The most frightening thing is that once you take shelter in a computer's memory, it becomes impossible to shock these viruses, but you can understand that it is a matter of time that the whole computer or smartphone is inappropriate to use.

11.Web scripting virus
We often find that some websites are asked to install different add-ons to see the videos or any other content appearing on their page. Web scripting virus spreads from Execution of such files.

The seven-seventeen viruses are known to know that in the next phase, we will know what is the way to escape from the virus.
Labels: Hacking

Thanks for reading Virus: Your enemy, hacker's friend Part 3. Please share...!

0 Comment for "Virus: Your enemy, hacker's friend Part 3"

Back To Top