The virus always infects encrypted or non - executable files such as
. Exe files (.EXE and .COM) within the operating systems of DOS and Windows or (ELF) in Linux and these files self-executing.
. File and data records VOLUME BOOT RECORD on hard disk, floppy and record 0 on hard disk MASTER BOOT
. BATCH and SCRIPT files in Windows and SHELL in Unix. These are general purpose files.
. Office files in Windows system that contain a macro file such as EXEL, WORD and ACCES
. OUTLOOK files because they have a big role in spreading the virus to many files because of the e-mail addresses
. BDF files and some HTML texts because they are likely to contain malicious code
. ZIP and RAR files
. MP3 files
Ways to spread the virus
. The virus spreads through the Internet because it is an environment that is suitable and easy to transfer from one device to another if it does not use protection systems such as firewall or anti-virus programs, and Syti mentioned God willing
. External storage discs such as FLASH MEMORY, CARD MEMORY or FLOPPY DISK DRIVE
3. When you receive an e-mail, the virus moves from files stored on hard disks or floppy disks
Symptoms of injury Virus
.PT Very slow operating system.
. Message not found enough space to save.
. The disappearance of some files from the computer.
. Duplicate error messages in more than one program.
. Reject some applications to execute the command.
When running the infected program, it may affect the rest of the files on the hard disk or floppy, so the virus needs to be entered by the user to spread, of course the intervention is run after being retrieved from e-mail or the Internet or exchange floppy disks.
Viruses, by nature, disrupt the work of the computer or destroy its files and programs. There are viruses that create annoying messages, types that run unwanted programs, and types that run on the processor, slowing the speed of the computer or stealing data from the user's computer such as account numbers, passwords or credit card numbers And other important data, these are the most important targets of modern viruses and spyware that are developed day by day.
Types of viruses
. Multiple file viruses: The virus starts in the computer in the initial format and then turns to other formats to infect other files.
. Macro viruses: a virus that writes in WORD and affects data files and Office files, which is the latest virus.
. The operating sector: These types of places are located in the places where the computer in the hard drive at take-off to click in memory and implement the virus.
. Versatile Versatility: The Phrase Generator is a dynamic ability to convert the code when moving from one file to another so that it is difficult to detect firs.
. Virus executables: These viruses interfere with executables such as WIN.COM and .COMMAND.COM
. Hidden viruses: The virus hides in memory and then addresses any scan or diagnosis to report that the operating system is infected.
. Advanced viruses: The virus changes its blade when moving from one hole to another.
- Boot sector viruses: The most dangerous types of viruses where it hits the operating section of the hard drive.
- Parasitic viruses: The virus interferes with the executable files to settle in memory when an infected program is working and then wait in memory until the user occupies another program and then infect and infect him.
Examples of some types of viruses
. COMPUTER WORM COMPUTER WORM: A small program that has a high capacity for reincarnation, rapid spread and difficult to get rid of, because of its superior ability to reincarnation and discoloration within the computer and computer intervention by browsing the Internet. The danger of worms lies in their independence and does not depend on other programs to join them. It makes her free movement spread quickly and her debut was in October 2002.
. Keyboard monitoring software KEYLOGGING: It is one of the spyware is a hidden program sent via email or downloaded from one of the sites or be a free program, where it transfers everything you write to the keyboard to other remote devices as long as you are connected to the Internet and this is one of the most dangerous viruses because it transmits Password numbers, account numbers, login words, and credit card numbers. The fraudster sends you the word PHISHING
Its task is to steal your data and transfer it to certain people. Once the virus infiltrates the device and is hidden and beware when you are in a public place and want to conduct a related to your bank accounts, for example on the net there is a piece of computer access to transfer your data and store it and when the device closes the fraudster reveal your confidential data
SPAM: a program that sends multiple messages to people you know or do not know, without asking them and the biggest problems SPAM SPAM
Difficulty reading private mail and therefore not reading important mail.
. Spend time sorting messages and deleting unwanted messages.
. Adding an unethical and immoral character to the messages and text.
. PHISHING Messages An attempt by a fraudster to get your personal information through e-mails and often come to you by Google to companies, banks and known sites will come to you and they are not false.
. TROJAN HORSE
Why is the virus named by this name? Ancient legends also say that the Trojan horse carries out its attack in a neat social engineering way and presents itself as not enemies
It is a kind of malicious software that does not replicate on its own because the virus presents itself as a valid and harmless program in order to convince you to download it, and the virus is eliminated in downloads of games from the Internet, search engines or some applications that you use
These are some examples of some of the most famous viruses that harm our computers. Whatever your use of the Internet, your computer does not recognize the presence of viruses, but the seriousness of the virus lies in the extent of your use of the Internet, the nature of your work and the extent of your information on the hard disk